IP crime has been around as long as the Internet, because the IP or Internet Protocol, is the tool of the Internet should work. We also need to distinguish the crime IP - Internet Protocol offense that uses the criminal abuse of the Internet Protocol in the commission of a crime, crimes against property rights (also confusingly known as "IP Crime"), refers to criminal abuses intellectual property as illegal video compact discs or digital double.
To understand IP crime, we must understand what an IP address and how the Internet and machinery and hardware that form the infrastructure use.
Each machine is connected to the Internet, computers, laptops, cell phones, routers, printers and others, all have an assigned IP address. You may have seen an IP address and usually look like this:
255.12.36.99
Four sets of numbers separated by three points - the points have no meaning and there are people to read the figures easier. The computer does not use these numbers as we see them, but uses the equivalent "binary" - without going into details, this is just a numbering system, that only two digits, 0 and 1 are used. When machines are talking to each other or simply provide information as part of the network that allows the Internet to operate, they do it based on IP addresses.
The problem is that IP addresses can be easily replicated or "spoofing" - this means that a car used by a criminal, another machine, such as your laptop, which has an IP address can be said that the objective is "friendly". It is therefore proud to communicate and parts, and highlights some of the details, but there is a rift in the Security Target. By participating in a criminal a small degree of access to a target computer, may, if security is not tight enough or if the criminal jurisdiction to the technical task, which can best be used permits.
This ability to address "spoof" IP Authentication using IP weakness inherent in the system. This means that your computer or network security should be established at a level above the IP address, and usually involves cryptographic techniques that are embedded in applications.
By sending information to IP spoofing, criminals are able to target computer or network to an action that further access or other protection from arrest for action. Some applications still depend on the IP address and are prone to fall under the control of a forward with this information. Examples are where login information is processed at the IP layer and where the hacker gains access to the system or an application simply because they have the IP address that unlocks their safety.
IP Session Hacking is another form of IP crime with greater sophistication of IP spoofing is necessary. Yet it is a very dangerous form of attack, because the user does not know that they now have control over their car had been private. An example is when a user writes an e-mail, in the middle of the mail session is hijacked by a criminal court, but what the user sees is that they are disconnected or lost a connection. This happens to log on again and continue, blissfully unaware that everything they do on the machine can now be done by the hijacker, such as access to online banking services or access to sensitive documents.
No comments:
Post a Comment