SYSTEM fragility (vulnerability)

| Selasa, Oktober 27, 2009
Hi friends, what tale. Glad to see you in good health. Now we will discuss about the vulnerability.
Fragility of the system more meaningful to what extent protection can be applied to networks owned by someone from outside the system who try to gain illegal access to computer networks and the possibility of people from within the system provides access to the outside world which is damaging the network system.
To analyze a global information network system as a whole about the level of reliability and safety is not something easy to implement. Analysis of a network system must be detailed information ranging from policy level to the level of practical application.
For starters, it's good we see a network system that has become the main target point of the efforts of the burglary attempt. In general, the world's computer networks using the Unix operating system as a platform. Unix has become an operating system that has high reliability and good performance level. However, Unix is basically composed of the functions that are quite complicated and complex. As a result, Unix also has several drawbacks such as bugs (programming algorithm mismatch) sometimes small is not recognized by Unix programmers. In addition, utilities that use Unix as a platform, often has its own bugs as well. Well, these things are often exploited by hackers and intruders in an automated in the world.
To prevent successful exploits of hackers and intruders in an automated it, developed a concept known as Unix Network Security Architecture.
This architecture includes 7 layers of security at the network level. The seven layers are as follows:
• Layer to-7: Wisdom
• Layer to-6: Personnel
• Layer 5: Local Area Network
• Layer 4: Limit the Network
• Layer the 3: Gateway
• Layer the 2: Package Filtering
• Layer 1: Outer Limits Network

That's all. thank you.

0 comments: