百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitations on Data Centre Management

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */  
 
 
Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are illustrated below:
 

1.   Back Door

Data centre procedures developed by the IT staff that may have flaws that can create back door vulnerabilities. Exploitation on such weakness can inadvertently introduce security breaches and result in financial loss or repartition damage to universities.

A backup operation provides a good example of how data centre management can be exploited by insecure backup process. IT staff usually overlook the security of tape backup infrastructures, which may contain vulnerabilities and can be exploited to create disastrous consequences. Since the execution of the backup task that usually requires escalated system privileges at the operating systems, network, data repository and application system levels. Malicious parties can take advantage of this security weakness through penetrating flawed backup infrastructure to gain access to universities' sensitive data.

2.  Attacks on Remote Access to Data Centre Management

Exploitations on remote access technologies used for data centre management are in many forms. Known attacking techniques include:

  • Use of Virtual Private Network (VPN) access of terminated staff to gain access to data centre systems or management tools
  • Offline password cracking through decrypting the hash data received from VPN servers with Internet Key Exchange (IKE) Aggressive Mode Shared Secret Hash Leakage Weakness
  • Denial of Service (DoS) attack on Secure Sockets Layer (SSL) -based VPN can be achieved by using hidden attack packets, which was undetectable by Intruder Detection Systems (IDS). For example, disguise malformed Internet Security Association and Key Management Protocol (ISAKMP) headers as standard IKE headers
  • Login guess attack on Windows Remote Desktop by hackers

 3.  Social Engineering Social Engineering

As of today, social engineering still remains as the biggest cyber threats to information security. As opposed to DoS and other remote hacking techniques, social engineering involves obtaining physical or logical access to data centre assets via manipulating IT staff relevant to data centre management, rather than by breaking in or using technical cracking approaches. Some social engineering techniques frequently used by hackers include piggybacking, penetrating data centre by getting a job within the data centre management team, and disguising as vendor support personnel for performing maintenance services inside data centres.

 

References:

http://www.computereconomics.com/article.cfm?id=1112

http://www.ncp-e.com/fileadmin/pdf/techpapers/NCP-Attack-Vectors-WP.pdf

http://www.ee.co.za/wp-content/uploads/legacy/Securing%20remote%20data.pdf

http://www.nta-monitor.com/posts/2005/01/VPN-Flaws-Whitepaper.pdf

http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html

[Previous section][<Next section]

?

在线百家乐官网纸牌游戏| 大发888手机版客户端| 保单百家乐官网游戏机| 微信百家乐官网群规则大全| 威尼斯人娱乐场色| 开心8百家乐官网现金网| 娱乐城百家乐可以代理吗 | 利来娱乐开户| 百家乐游戏如何玩| 合乐娱乐| 澳门百家乐下注最低| 陆川县| 百家乐赌场网| 百家乐官网牌机的破解法| 百家乐出千的方法| E世博百家乐官网娱乐城| 大发888 大发娱乐城| 24山方向上| 百家乐官网试玩平台| 百家乐投注方法新版| 大冶市| 威尼斯人娱乐棋牌平台| 百家乐软件购买| 德州扑克大赛视频| 百家乐官网五铺的缆是什么意思| 机器百家乐心得| 网络百家乐官网骗局| 大发888线上娱乐加盟合作| 百家乐路纸发表区| 百家乐官网投注方法网| 德州扑克保险| 百合百家乐的玩法技巧和规则| 百家乐官网路单破解器| 大发888娱乐场玩什么| 百家乐二代皇冠博彩| 百家乐官网出千方法技巧| 香港六合彩开奖记录| 网上百家乐赌城| 曼哈顿百家乐官网的玩法技巧和规则| 百家乐官网补牌规律| bet365提款要多久|