Backtrack is a linux distro which is derived from slackware which is a merger of whax and auditor security collection. Backtrack two released on 6 March 2007 which include more than 300 security tools while the beta version of BackTrack 3 was released on 14 December 2007 on the third release is more focused on hardware support. While the version of backtrack 3 released on 19 June 2008 on backtrack 3 versions of this saint and the inserting nessus maltego while not included as well stick with kernel version 2.6.21.5. And the most recent backtrack 5.
example of using backtrack:
- networking
- security
- auditing
- hacking
and still much more . . . .
Senin, 16 April 2012
Cybercrime
cybercime as defined as : "Offense that are commited againt individual or group of individuals with a criminal motive to intentionally harm the reputation of victim or cause or physical or mental harm to the victim directly or indirectly, using modem telecommunication network suck as internet (Chat rooms, emails, notice boards and groups) and mobile phone.
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
Cyber Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
This type of crime to interfere with or harass a person by using a computer
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
The crimes of piracy hijacking other people's work.
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft,
and other cross-border crimes. Activity crossing international borders
and involving the interests of at least one nationstate is sometimes
referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
Types cybercrime
A. cybercrime is based targeting crime. cybercrime can be devided become 3 types :
1. Cybercrime Against Person :
This type of crimes, targeted attacks directed against individuals or individuals who have given their nature or according to objective criteria such attacks
2. Againts Property
Cybercrime committed to disrupt or attack the property of others. Some examples of these types crimes such as illegally accessing a computer through the cyber world, possession of unauthorized electronic information / information theft, carding, cybersquating, hijacking, data forgery, and all activities that are detrimental to other people's property
3. Againts Government
Cybercrime Against Government done with special purpose attacks against the government. These activities such as cyber terrorism as an act that threatens the government as well as cracking to the official website of the government or military sites.
B. Based on the pattern of activities that do, cybercrime can be classified into two types as follows:
1. Cybercrime as a purely criminal act
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
2. Cybercrime as a crimes "gray"
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
C. Based on the type of activities done, cybercrime can be classified into several types as follows :
1. unauthorized Access
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
2. illegal Contents
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
3. Deliberate spread of virus
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
4. data Forgery
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
5. Cyber Espionage, Sabotage, and Extortion
Cyber Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
6. cyberstalking
This type of crime to interfere with or harass a person by using a computer
7. carding
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
8. Hacking and Cracker
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
9. Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
10. hijacking
The crimes of piracy hijacking other people's work.
11. cyber terrorism
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites
Business Continuity Planning
Business Continuity Management (BCM) is the process of planning to ensure that your business can return to "business as usual" as quickly and painlessly as possible in the event of a major disruption.
We’ve pulled together some simple information on how to plan for
business disruptions - whether you’re a micro-business or an
international company, you should find the information you need to help
keep your business running.
Why should I plan for business disruptions?
A disaster can strike any organisation, large or small. It can arrive
in the shape of storm, flood, fire, a terrorist bomb, action by
pressure groups, or product contamination.
How should I plan for business disruptions?
This is a five-step guide to get you started on business continuity planning - use the links below to go to each section
Step 1: Analyse your business
Step 2: Assess the risks
Step 3: Plan and prepare
Step 4: Communicate your plan
Step 5: Test your plan
How should I respond to a business disruption?
Check out our information on responding to business disruption, and what actions you can take in the short and long term to minimise the impact on your business.
It is not the 'headline-making' major disasters that are responsible for the majority of business continuity problems. More mundane and common occurrence can have a potentially costly effect.
These include:-
- Information security incidents
- Data loss or integrity issues
- IT equipment or system loss
- Communication services failure
- Availability of key staff
Cryptografi
Cryptografi is method of securing data that can be used to maintain data confidentilty, authenticity or integrity of the data and authenticity (authentication) sender. This method is intended of important that is retricted or confidential information send of the public communication can no be know and used by unauthorized parties. Criptografi is studi of learning the system in which confidentiality and authentiticity data can be guaranteed.
Cryptografi is the science and art to keep the message to be safe .. The actors or practitioners are called cryptographers cryptography. A cryptographic algorithm (a cryptographic algorithm), called a cipher, a mathematical equation that is used for encryption and decryption. Usually these two equations (for encryption and decryption) has a mathematical relationship is quite close.
The process undertaken to secure a message (called plaintext) into a hidden message (called ciphertext) is encrypted (encryption). Encryption is used to encrypt the data or information that can not be read by unauthorized people. By encrypting your data is encoded (encrypted) using a key (key). To open (decrypt) data were used also a key that can be the same as the key to encrypt (for the case of private key cryptography) or with a different key (for the case of public key cryptography).
Hash
They provide a mapping between an arbitrary length input, and a (usually) fixed length (or smaller length) output. It can be anything from a simple crc32, to a full blown cryptographic hash function such as MD5 or SHA1/2/256/512. The point is that there's a one-way mapping going on. It's always a many:1 mapping (meaning there will always be collisions) since every function produces a smaller output than it's capable of inputting (If you feed every possible 1mb file into MD5, you'll get a ton of collisions).
encryption
They provide a 1:1 mapping between an arbitrary length input and and output. And they are always reversible. The important thing to note is that it's reversible using some method. And it's always 1:1 for a given key. Now, there are multiple input:key pairs that might generate the same output (in fact there usually are, depending on the encryption function). Good encrypted data is indistinguishable from random noise. This is different from a good hash output which is always of a consistent format.
reference : http://stackoverflow.com
Cryptografi is the science and art to keep the message to be safe .. The actors or practitioners are called cryptographers cryptography. A cryptographic algorithm (a cryptographic algorithm), called a cipher, a mathematical equation that is used for encryption and decryption. Usually these two equations (for encryption and decryption) has a mathematical relationship is quite close.
The process undertaken to secure a message (called plaintext) into a hidden message (called ciphertext) is encrypted (encryption). Encryption is used to encrypt the data or information that can not be read by unauthorized people. By encrypting your data is encoded (encrypted) using a key (key). To open (decrypt) data were used also a key that can be the same as the key to encrypt (for the case of private key cryptography) or with a different key (for the case of public key cryptography).
Hash
They provide a mapping between an arbitrary length input, and a (usually) fixed length (or smaller length) output. It can be anything from a simple crc32, to a full blown cryptographic hash function such as MD5 or SHA1/2/256/512. The point is that there's a one-way mapping going on. It's always a many:1 mapping (meaning there will always be collisions) since every function produces a smaller output than it's capable of inputting (If you feed every possible 1mb file into MD5, you'll get a ton of collisions).
encryption
They provide a 1:1 mapping between an arbitrary length input and and output. And they are always reversible. The important thing to note is that it's reversible using some method. And it's always 1:1 for a given key. Now, there are multiple input:key pairs that might generate the same output (in fact there usually are, depending on the encryption function). Good encrypted data is indistinguishable from random noise. This is different from a good hash output which is always of a consistent format.
reference : http://stackoverflow.com
Langganan:
Postingan (Atom)