Free Essay

Lan Network

In:

Submitted By afrye26
Words 323
Pages 2
Do you know what are black hat and white hat hacking? If you do, or do not, explain what they are and how they are different. Do you consider white hat hacking essential? Why or why not?

I don’t really know much about hacking. From what I’ve read is that A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, courseware, classes, and online training covering the diverse arena of ethical hacking.
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).[9] Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[10] Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or the manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.

Similar Documents

Premium Essay

Lan, Man and Wan Network Topologies

...There are many different types of network topologies, but the three most common types are LANs, MANs, and WANs. The LAN topology is probably the most common of the three. The MAN and WAN topologies are used but not nearly as much as the LAN topology is, although the WAN is starting to be used more and more because of the growing population of networks. The LAN (Local Area Network) is used so much because it is used in small areas. Small businesses use LANs a great deal because they are small and they wouldnt need a WAN or a MAN because there business is usually ran out of one or maybe two buildings. You will usually find LANs in buildings, schools, and even in homes at times. Some buildings even have multiple LAN's in them for certain purposes. When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization. A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN. A WAN is basically...

Words: 522 - Pages: 3

Free Essay

Hjdfjjsfj

...I. Introduction: Wireless Local Area Network (WLAN) is the linking of two or more computers without using wires. WLAN makes use of the spread spectrum technology based on radio waves to enable communication between two devices in a limited area. Wireless local area networks (WLANs) based on the Wi-Fi (wireless fidelity) standards are one of today's fastest growing technologies in businesses, schools, and homes, for good reasons. They provide mobile access to the Internet and to enterprise networks so users can remain connected away from their desks. These networks can be up and running quickly when there is no available wired Ethernet infrastructure. They are reported to reduce setting up costs by 15%. But, with these benefits come the security concerns. WLANs have very little security. An attacker can listen to you, take control of your laptops/desktops and forge him to be you. He can cancel your orders, make changes into your databases, or empty your credit cards. a. The 802.11 Wireless LAN Standard: In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports...

Words: 2926 - Pages: 12

Free Essay

Finance for Christiana

...A wireless local area network (WLAN) is a wireless machine organize that connections two or more gadgets utilizing a wireless dispersion system (regularly spread-range or OFDM radio) inside a constrained region, for example, a home, school, machine research centre, or office building. This gives clients the capacity to move around inside a nearby scope zone & still be joined with the system, & can give an association with the more extensive Internet. Most present day WLAN’s are focused around IEEE 802.11 norms, showcased under the Wi-Fi brand name. Advantages of WLAN:- * Client versatility * Voice & information administrations * Versatile structural engineering * Accessibility of all Hipath Voip system administrations * Access to focal applications * Handover between access focuses * Vigorous model for industry * Temperate access focuses * Fitting and-Play construction modelling * Hearty controller * Security on the level of altered systems * "Little Enterprise" alternative with own controller * "Extension Office" alternative for little extensions where wireless controller is utilized. Issue’s & Solution:- There has been a genuine issue with security issues since the initiation of Wireless LAN, we studied the current wireless local area network confront a portion of the real security issues, & portrays the relating arrangements. As of late, with the ubiquity of an assortment of wireless gadgets &...

Words: 590 - Pages: 3

Free Essay

Wifi

...Wi-FiFrom Wikipedia, the free encyclopediaJump to: navigation, search For the radio station, see WIFI (AM). Wi-Fi logoWi-Fi ( /ˈwaɪfaɪ/, also spelled Wifi or WiFi) is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network, including high-speed Internet connections. The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in general English as a synonym for "WLAN". A device that can use Wi-Fi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area as small as a single room with walls that block radio waves or as large as many square miles — this is achieved by using multiple overlapping access points. "Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE 802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark. Wi-Fi has had a checkered security...

Words: 2476 - Pages: 10

Free Essay

Network and Protocols

...          The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being used in 802.11 wireless networking?      1. Direct Sequence Spread Spectrum (DSSS)      2. Frequency Hopping Spread Spectrum (FHSS)      3. Infrared      4. Orthogonal Frequency Division Multiplexing (OFDM) 6. Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking....

Words: 1687 - Pages: 7

Free Essay

Bd Steel

...2G Network | GSM 850 / 900 / 1800 / 1900 | 3.5 mm Jack | Yes | 3G Network | UMTS 900 / 2100 | Alert types | Vibration, MP3 ringtones | Battery Performance | No official data | Battery Type | Li-Ion 1600 mAh battery | Bluetooth | v4.0 | Camera Features | LED flash, auto focus | Camera pixels | - | Camera Resolution | 5 Megapixel | Colors Available | White, Black | Data Speed | HSPA+ | Dimensions | 126 x 64 x 9.1 mm | Display Resolution | WVGA, 480 × 800 pixels | Display Size | 4.0 inches | Display Type | Capacitive touchscreen | EDGE | Yes | Front Camera | VGA | GPRS | Yes | GPS Function | Yes, with A-GPS support | Graphics processing unit (GPU) | Mali 400 | Internal Memory | ROM 8 GB | Loudspeaker | Yes | Memory Card Slot | MicroSD, up to 32 GB | Messaging | SMS(Threaded view), MMS, E-mail | Multitouch | Yes | Operating System | Android OS, v4.2.2 (Jelly Bean) | Other Features | - Mp3 / MP4 - Shake to change music - Overtune mute (Flip phone to mute call ring) - Scroll up desktop to setting - Scroll down to notification bar | Processor | Dual-core, 1.3 GHz | Radio | FM Radio with recording | RAM | 1 GB | Release Date | June 2014 | Sensors | Accelerometer (3D), light, compass, proximity, orientation | SIM Card Type | Dual SIM (dual stand-by) | USB | MicroUSB | Video | HD video playback & recording | Web Browser | HTML | Weight | 123.5 g | Wireless LAN | Wi-Fi 802.11 b/g/n, WLAN Hotspot | 7770tk...

Words: 554 - Pages: 3

Free Essay

Werfwtwe Er Q

...minimum downtime possible.To accomplish that, we should re-pulling new cables and isolate place with label every connectionDowntime was 15 MinutesNumbers of circuits:1 x MPLS4 X IP VPN35 X Telephone lines | Clean and organize server room | In Progress | Head Office Server room last organize was before 10 years, challenge was to clean and organize all the patch cords and cables with zero downtime.This is the active server room organizing projectNumbers of Racks= 5 Number of Patch Panel= 25 | Connection Documentation, Design layout | Not Started | Building High level design with all L2 and L3 information.Create backup configuration library for network devices in server room | Refurbishment Project Phase 2 | Finished (Following) | Refurbishment project to the entire building including IT infrastructure: * Wireless LAN * LAN * IP Telephone * Switches * Desk Top setupThe roll was to lead all moving and setup activity, and assure of service delivery on the entire building | Description of the accomplished work In the six weeks I spent in this company I experienced a lot of work which I did not expect to work in the IT Services. I did learn a lot of stuff which also the collage will never teach me it. In the first week there were a lot of induction and information to be learned. I learned how to deal with users and how to talk with them and satisfy him. I learned how the servers work and...

Words: 701 - Pages: 3

Free Essay

Networking

...wireless networking. User mobility in the workplace, and cost effective networking media for use in areas that are difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard? Physical Layer (PHY): The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.) Medium Access Control (MAC): The reliability of the data service, access control to the shared wireless medium, protecting the privacy of the transmitted data. MAC management protocols and services: Authentication, association, data delivery, and privacy. 3. What is an ad hoc network? In this network, the wireless clients (stations) communicate directly with each other. 4. What is the purpose of an Extended Service Set? By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended. 5. What are the four physical layer technologies being used in 802.11 wireless networking? Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS); Infrared, and Orthogonal Frequency Division Multiplexing (OFDM) 6. Describe the frequency spectrum for the DSSS channels in 802.11b wireless networking. It implements 14 channels (each consuming 22 MHz) over approximately 90 MHz of RF spectrum in the 2.4 GHz ISM (industrial, scientific, and medical) band. 7. Define a pseudorandom sequence as it applies to FHSS. Pseudorandom means the sequence appears to be random but in fact...

Words: 1208 - Pages: 5

Free Essay

Wireless Lan Security

...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...

Words: 4933 - Pages: 20

Premium Essay

Introduction to Networking

...the following is true about the distance limitations in this LAN? c. All Ethernet user devices can be up to 100 meters away. (but no farther), while WLAN devices can typically be farther away than 100 meters. 2. Which of the following answers matches a particular standard to its maximum bit rate? a. 802.11g: 54 Mbps 3. Which of the following answers list a condition that could have affected the speeds that the engineer observed when testing the WLAN? b. The current radio noise d. The distance between the client device and the AP 4. Which of the following statements are true when comparing the wired and wireless LANs on this floor? b. The wireless LAN has a larger capacity d. A single transmission from the AP to a WLAN user device goes faster than the transmission from the Ethernet switch to a wired user device. 5. Which of the following answers describes the most accurate method the engineer can use to determine the coverage area? a. Do a wireless site survey. 6. Which of the following plays the biggest role in testing and certifying products to prove that they work with other products that have already been certified? c. Wi-Fi Alliance 7. Which of the following answers define a wireless LAN physical layer standard that was originally ratified by the IEEE before the year 2000? a. 802.11a b. 802.11.b 8. Which of the following locations is the least likely place to find a wireless LAN? b. As a link between two Ethernet switches on two different...

Words: 915 - Pages: 4

Free Essay

Data Communications

...transmits using MIMO or multiple in multiple out technique. * These frequencies are important when choosing which protocol you want to use. The lower frequencies can transmit longer distances and require less battery while the lower frequencies transmit longer distances but can drain the battery of the workstation. 2. Your wireless LAN device has just sent a request to send (RTS). What happens next? * A timer is set and then, hopefully a clear to send (CTS) will be received from the access point before the timer runs out. 3. Your company wants to create a wireless network for the entire office building. The building is 10 stories high, and the company wants to incorporate IEEE 802.11a by placing one access point on the tenth floor. Will this layout work? Explain. * No because the 5 GHz protocols have a short transmission distance (approximately 30 meters) and this frequency has trouble transmitting through walls and floors. If you wanted to use the IEEE 802.11 a you would need multiple access points which would increase costs. 4. You want to create a local area network that protects the contents of the network server’s hard disks from disk crashes. List all the different techniques for providing this protection that have been presented thus far. * These are all RAID (Redundant Array of Independent Disks) techniques. * RAID 0-Stripping- Data is broken into pieces and each piece stored on different disk drives * RAID 1-Disk...

Words: 741 - Pages: 3

Free Essay

Caso Lan Expansion

...Latam in its internationalization process, first as Lan Chile (Chile) and TAM SA (Brazil). The basis on which this process takes place is not only the enabling environment that has offered Latin America in the last 20 years in economic stability and growth, are also given in the context of privatizations, deregulation in various aspects of the economies of the region, openness to international trade and policies gradually adopted by most economies in the region, with flexible exchange rates, mostly autonomous central banks acting under inflation targeting and counter-cyclical fiscal policy, all this in accordance with the acceptance the so-called "Washington Consensus". LAN’s raising and its expansive through Latin America. LAN Chile born as a state enterprise in 1929. In 1946 opens its first international route to Buenos Aires; in 1956 it expanded its operations to Lima; Miami in 1958 and in 1970 to Europe. After a privatization process is consolidated locally in Chile, then position in Latin America and assist its internationalization. In 1985 the government of the time transformed the company into a public limited company to start its privatization. In 1989 the sale of 51% to domestic investors and SAS (Scandinavian Airlines System) is specified, until in 1994 the Chilean government sold all the shares held by it, at Piñera and Cueto group become owners LAN majority. The business starts a second phase in 1997 when LAN acquires 99.5% stake in the Chilean airline LADECO...

Words: 3899 - Pages: 16

Free Essay

Save Documents and Software of Video Meeting

...The company is a greeting card manufacturers and exporter. The office is unit 6, 7 and 10 on the 17th floor in Fortress Tower Center. There are around 12clerical staffs, 10sales representatives and 5 managers. The company has some issues for their existing systems. One is that staffs are using USB flash drive to store sensitive documents for work at home and it is easy to lose. Second is to reduce the number of business trips. Third is to reduce communication expense. Fourth is that some clients cannot send and receive large drawing. Fifth is that all engineering drawings and proposals are important assists should be retaining from disaster. Sixth is to found a way to minimize the effort and loan procedures. Seventh is that full wireless network coverage is required in all office areas. 2. Solutions to the addressed issues 2.1. Save documents 2.1.1. Dropbox Dropbox is a free service that lets you bring all your photos, documents, and videos anywhere. Any file you save to your Dropbox will also automatically save to all your computers, phones, and even the Dropbox website. This means that you can start working on your computer at school or the office, and finish on your home computer. Never email yourself a file again!(1) 2.1.2. Drop Box (for business) The space is 1,000 GB when you start to use it. If you run out, tell them and they will increase it for free. It support WORD、EXCEL、POWER POINT、PDF etc. The files are stored using 256-bit AES(Advanced Encryption Standard)encryption...

Words: 2947 - Pages: 12

Free Essay

Wlan Security

...security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today that you’r able to connect to wireless networks. However, with the rising accessibility...

Words: 4798 - Pages: 20

Free Essay

Study Guide

...WLAN Troubleshooting IN ThIs chApTer, you WILL LeArN AbouT The foLLoWINg: ÛÛ Layer 2 retransmissions NÛ RF interference Multipath Adjacent cell interference Low SNR Mismatched power settings Near/far Hidden node NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ 802.11 coverage considerations NÛ Dynamic rate switching Roaming Layer 3 roaming Co-channel interference Channel reuse/multiple channel architecture Single channel architecture Capacity vs. coverage Oversized coverage cells Physical environment NÛ NÛ NÛ NÛ NÛ NÛ NÛ NÛ ÛÛ Voice vs. data ÛÛ Performance ÛÛ Weather Copyright © 2009 John Wiley & Sons, Inc. Diagnostic methods that are used to troubleshoot wired 802.3 networks should also be applied when troubleshooting a wireless local area network (WLAN). A bottoms-up approach to analyzing the OSI reference model layers also applies to wireless networking. A wireless networking administrator should always try to first determine whether problems exist at layer 1 and layer 2. As with most networking technologies, most problems usually exist at the Physical layer. Simple layer 1 problems such as nonpowered access points or client card driver problems are often the root cause of connectivity or performance issues. Because WLANs use radio frequencies to deliver data, troubleshooting a WLAN offers many unique layer 1 challenges not found in a typical wired environment. The bulk of this chapter discusses the numerous potential problems that can occur...

Words: 16450 - Pages: 66