Articles Service - Marketing And Unique Articles - Online Directory - Quick Promotion - Free Contents


   

Understanding IP Crime



[Valid RSS feed]  Category Rss Feed - http://www.look4articles.com/rss.php?rss=268
By : Lawrence J.    99 or more times read
Submitted 2009-12-19 13:57:29
IP crime has been around as long as the internet because the IP, or Internet Protocol, is the tool by which the internet is allowed to work. We should also distinguish IP crime – Internet protocol crime is where criminal misuse of Internet Protocol is used in the commission of a crime whereas, Intellectual Property Crime (also confusingly known as “IP Crime”), refers to the criminal misuse of intellectual property such as illegal duplication of compact or digital video disks.

To understand IP Crime, we need to understand what an IP address is and how the internet and the machines and hardware which go to form the infrastructure make use of them.

Every machine connected to the internet; computers, laptops, cell phones, routers, printers and many more, all have an assigned IP address. You may have already seen an IP address and they typically look like this:

255.12.36.99

Four sets of numbers separated by three dots – the dots have no significance and are there to let humans read the numbers more easily. The computer does not use these numbers as we see them but uses their “binary” equivalent – without going into detail; this is simply a numbering system which uses only two digits, 0 and 1. Whenever machines are talking to each other or simply passing on information as part of the network which allows the internet to operate, they do this by using IP addresses.

The issue is that IP addresses can very easily be replicated or “spoofed” – this means that a machine used by a criminal, can tell another machine, such as your laptop, that it has an IP address which the target knows is “friendly”. It therefore is happy to communicate and share some, and we stress only some information but this opens a chink in the security of the target. By allowing a criminal a small degree of access to a target machine, they can, if security is not tight enough or if the criminal’s technical expertise is up to the task, which allows greater exploitation.

This ability to “spoof” an IP address makes use of the weak authentication inherent in the IP system. This means that your computer or network security must be imposed at a higher level than the IP address, and typically this involves cryptographic techniques which are embedded into applications which you use.

By sending spoof IP information, the criminal may be able to get the target machine or network to perform some action which allows further entry or stops other security protections from operating. Some applications still rely on IP address information and they are susceptible to coming under the control of an attacker with that information. Examples include where login information is processed at the IP address level and where the hacker is given access to the system or an application simply because they possess the IP address which unlocks their security.

IP Session Hacking is another form of IP crime which requires a greater degree of sophistication than IP spoofing. Nevertheless, it is a very dangerous form of attack because the user is unaware that they have now had control of their machine taken away from them. An example is where a user is writing an email, in the middle of the email the session is hijacked by the criminal but what the user sees is they have been logged off or lost a connection. This happens, so they simply log back on again and continue, blissfully unaware that everything they do on the machine can now be done by the hijacker, such as accessing online banking or opening sensitive documents.

Author Resource:

Lawrence Reaves works for PLANIT Technology Group, a leading provider of Richmond IT Services such as Richmond enterprise storage and Richmond network security. PLANIT can be found online at: http://www.planittech.com .

Related Articles


HTML Ready Article. Click on the "Copy" button to copy into your clipboard.




Firefox users please select/copy/paste as usual


New Members
select
Sign up
select
Learn more
ASK It!
ASK It!

 
Directory Menu
Home
Login to Directory
Submit Articles
Submission Guidelines
Top Articles
Link Directory
About Us
Articles Directory Advertisement
Articles Directory Advertisement Media Kit
Contact Us
Privacy Policy
RSS Feeds


Categories

Accessories
Advice
Aging
Arts
Arts and Crafts
Automotive
Break-up
Business
Business Management
Cancer Survival
Career
Cars and Trucks
CGI
Cheating
Coding Sites
Computers
Computers and Technology
Cooking
Crafts
Culture
Current Affairs
Databases
Death
Education
Entertainment
Etiquette
Family Concerns
Film
Finances
Food and Drinks
Gardening
Healthy Living
Holidays
Home
Home Management
Internet
Jobs
Leadership
Legal
Medical
Medical Business
Medicines and Remedies
Men Only
Motorcyles
Opinions
Our Pets
Outdoors
Parenting
Pets
Recreation
Relationships
Religion
Self Help
Self Improvement
Society
Sports
Staying Fit
Technology
Travel
Web Design
Weddings
Wellness, Fitness and Di
Women Only
Womens Interest
World Affairs
Writing
 
Actions
Print This Article
Add To Favorites
[Valid RSS feed]

Copyright LOOK 4 ARTICLES FREE DIRECTORY - 2005-2012 - Powered By: HYIP