Figure 1.1: internet crime statistics of IC3.As such, the amount of crime raises would lead to reciprocal attacks rose to dizzy. This is understandable, because an entity has always existed both sides mutually. The development of information technology and engineering will be the lucrative prey of hackers break out vigorously.In short, the internet is an insecure place. That not only is the internet network types, such as LAN, to a computer system may also be compromised. Even, telephone networks, mobile networks also do not fall outside the. So we say that the scope of the huge security, says no longer wrapped in a computer to an agency that is global1.1.1.2 attackers are?Attackers commonly known as hackers. Is that the attacker on the network with many different purposes. Before Hackers are divided in 2 types but currently it is divided into 3 types: the Black Hat HackersThis is the genuine thief, with the experienced Hackers are particularly dangerous for the network. Our goal is to break into the network of the object to obtain the information, nefarious purposes. Black hat hackers are the true criminals in need of punishing by law. the white hat HackerThey are the home security and protection system. They also penetrate into the system, the goal is to find the loophole, the fatal flaw and then find ways to patch them again. Of course, the white hat hacker also has the ability to penetrate and can also become a black hat hacker. Grey Hat HackerThis category is a combination of the two types on. Usually they are the ones who are young, want to express themselves. In a moment, they break into your system for trouble. But in another moment they can submit to the administrator the information about a security flaw and proposed a patch.The border distinguishes the hackers are very fragile. An attacker is white-hat Hackers in the moment but at other times they leave is a professional thief.1.1.1.3 security flaw?Các lỗ hổng bảo mật trên một hệ thống là các điểm yếu có thể tạo ra sự ngưng trệ của dịch vụ, thêm quyền đối với người sử dụng hoặc cho phép các truy nhập không hợp pháp vào hệ thống. Các lỗ hổng cũng có thể xuất hiện ngay trong hạ tầng mạng hoặc nằm ngay trên các dịch vụ cung cập như Sendmail, Web, Ftp,... Ngoài ra các lỗ hổng còn tồn tại ngay chính các hệ điều hành như: Windows XP, 7, Linux,... hoặc trong các ứng dụng mà người sử dụng thường xuyên sử dụng như: Office, trình duyệt,...Theo bộ quốc phòng Mỹ, các lỗ hổng bảo mật một hệ thống được chia như sau: Lỗ hổng loại ACác lỗ hổng này cho phép người sử dụng ở ngoài có thể truy nhập vào hệ thống bất hợp pháp. Lỗ hổng này rất nguy hiểm, có thể phá hủy toàn bộ hệ thống. Lỗ hổng loại BCác lỗ hổng này cho phép người sử dụng thêm các quyền trên hệ thống mà không cần thực hiện kiểm tra tính hợp lệ. Mức độ nguy hiểm trung bình. Những lỗ hổng này thường có trong các ứng dụng trên hệ thống, có thể dẫn đến mất hoặc lộ thông tin dữ liệu. Lỗ hổng loại CThe vulnerability of this type allow the method of attacking by DoS. Dangerously low levels, only affect the quality of the service, may cause delays, interruptions, the system does not damage data or gain access illegally.1.1.2 reviews safety issues, security of the networkTo ensure security for the network, the need to build a number of criteria to rate security, safety of the network. A number of criteria were admitted as security measure of the network1.1.2.1 physical aspects Have a hot backup devices for sudden failure situations. Have the ability to replace partially or totally hot (hot-plug, hot-swap). Security security where host servers. the ability to update, upgrade, additional hardware and software. the power requirements, have backup in situations of sudden power loss. the requirements consistent with the surrounding environment: temperature, humidity, lightning, explosions, etc.1.1.2.2 the logical aspects confidentiality (Confidentiality)Is limited to the objects that are the right to access to information. Object information can be human, computers and software. Depending on the nature of the information that the extent of the secret of them may vary.For example, User A sent email to User B, then email that only User A and User B knows the content of the mail leaves, and the other User cannot know. Suppose there is a third User knows the content of leaves at this mail, the confidentiality of the email no longer exists. verification (Authentication)To ensure that an exchange of information is reliable between the sending and recipient.In the case of an interaction is happening, for example the connection of a Terminal to the server, there are two problems: first, at the time of connection initialization, the service ensures that the two entities are reliable. Each of them is an entity is validated. Second, the service needs to ensure that the connection is not interference by a third entity could forge is one of two legal entities to transfer or receive are not allowed. the integrity (Integrity)Data integrity ensures the existence of information, excluding any change of information with intent to damage or loss of information due to the problem device, or software.For example, User A sent email to User B, User A sends the content as the User B will definitely get the right medicine so content means that User A sent you User B receives y so no change. As undeniable (Non repudiation)Computer does ensure that the sender and the recipient cannot deny a handout was passed. So, when a newsletter is sent, the recipient can prove is that the newsletters that really sent from legitimate senders. Exactly, when a bulletin is received, the sender can prove to be a real right it is received by the recipient is valid.For example, User A sent email to User B, User A cannot deny that A don't tell B. availability (Availability)A system of guaranteed availability means can access data at any time within a desired time interval allows. Different attacks can create the loss or lack of availability of the service. The availability of the service demonstrates the ability to prevent and restore the damage of the system due to the attacks caused.For example, the web Server is active every day to serve the web client means any time, where the web Server is also available to cater to the web client. the ability to control access (Access Control)In a network system is considered safe and secure then the administrators to control access to the network, can allow or prevent a visit would do in the system.For example, In company with other departments, to secure the company's inside information, the administrator can prevent some offices send information out and from there on in.1.2 OVERVIEW of the WEB APPLICATION1.2.1 about this siteThe website is a "site" is stored in the servers or hosting activities on the Internet. This is where the introduction of information and images about the business, the products and services of the business or introduce any weird information so that customers can access any where, at any time.The website is a set of web page. When the Enterprise website construction company that is building several pages of information about products, services or referrals, ... to create a website needs to have the three following factors: domain name (domain)Essentially a website does not need the domain name it can still function normally because it is also the site's IP address, we simply type into your browser the site's IP then immediately the browser will load that site on your browser. Gems of course we need to have the domain name instead of the IP is because IP is each decimal number string, the IP addresses are very easy to remember but the majority of IP addresses are very difficult to remember. As it is very close to the natural language of the people should be very catchy as well so that they changed the domain name to IP and DNS technology since its inception.Simple example to understand the features of domain names: in our phone book if we save the phone numbers that are not assigned with a name then surely one thing is we can't remember everything is each person's phone number and I don't know whose phone number is this but if we save of someone with a name, then later on when you need to call that person will find in contacts easier. website hosting (hosting)Where to store the website compelled us to have, it might be a server for hosting or a hosting we rent from providers of services. content websites (web page)Contents PAG
đang được dịch, vui lòng đợi..