‡bUIqvK© wbivcËvq wewfbœ SuywK
we,G,†K gvgyb
†bUIqvK©
G wbivcËv SuywK Av‡m wewfbœ Drm †_‡K|‡bUIqvK© GWwgwb‡÷ªUi wn‡m‡e Avcbvi
DwPZ Gme SuywK kbv³ K‡i Dchy³ cÖwZ‡iva e¨e¯’v M‡o †Zvjv,ewn¯’ I
Af¨š—ixY Dfq Drm †_‡K| óªvKPviW I AvbóªvKPviW Dfq ai‡bi Avµgb Avm‡Z
cv‡i|
evB‡ii †bUIqvK© †_‡K óªvKPviW Avµgb Pvwj‡q _v‡K AwfÁ n¨vKviiv, hv‡`I Ávb I `¶Zv A‡bK †ewk, hviv Avcbvi network Gi cÖ‡e‡ki †Póv K‡i Ges †bUIqv‡K©i wbqš¿b wb‡Z AMÖnx|
AvbóªvKPviW
Avµgb mvavibZ bweb‡`i Øviv cwiPvwjZ nq, G ai‡bi Avµgb eyS‡Z cvivI mnR|
Ab¨w`‡K óªvKPviW Avµgb kbv³ Kiv KwVb n‡q `uvovq| ewnt¯’ Avµgb Av‡m
cÖvB‡fU †bUIqv‡K©i evB‡i †_‡K| Ab¨w`‡K e¨enviKvix KviI KvQ †_‡K-‡hgb
†Kv¤úvbxi Kg©Pvix wKsev Ggb KviI Kv‡Q †_‡K hvi nq‡Zv network mvf©v‡i mivmwi cÖ‡ek Kiv hvq| wb‡P wewfbœ wbivcËv SuywKi cwiPq †`Iqv n‡jv -
Gwc‡Kkb †jqvi AvµgY
mvf©v‡i Pjgvb wewfbœ
Gwc‡Kkb G ai‡bi Avµgb Pvjv‡bv nq| Gme Gwc‡Kkb Gi g‡a¨ Av‡Q (HTTP,sendmail,FTP) mvf©vi| Gme mvwf©m Pj‡Z †hme Account wba©vib K‡i †`Iqv n‡jv †m¸‡jvi cwigvb we‡kl ¯—‡ii n‡j mgm¨vi m„wó Ki‡Z cv‡i|
A‡Uvi“Uvi (autorooters)t
G‡K
Zzjbv Kiv †h‡Z cv‡i n¨vKvi A‡Uvwgkb wn‡m‡e| wKš‘ w¯Œë Pvwj‡q we‡kl
†Kv‡bv Kw¤úDUvi Gi `Lj †bIqv nq Ges †mLvb †_‡K cy‡iv †bUIqvK© Gi wbqš¿b
†bIqvi †Póv Kiv nq|
e¨vK‡Wvi t (Backdoors) t
†Kv‡bv computer network G †XvKvi weKí c_, mvavibZ †Kv‡bv i“UwKU wKsev Ab¨ †cÖvMÖvg GK ev GKvwaK computer G install K‡i GiKg e¨vK‡Wvi m„wó Kiv nq, hv‡Z weKí c‡_ †mB network XyK‡Z cv‡i|
wWbvqvj Ae mvwf©m t (DOS) t
G ai‡bi Avµgb cy‡iv †bUIqvK©‡K A‡K‡Rv I bó K‡i w`‡Z cv‡i| G‡Z GB mvwf©‡mi Kv‡Q µgvMZ request cvVv‡bv nq| hvi d‡j †mB service A‡K‡Rv n‡q c‡i|
AvBwc ¯úywds t (IP spoofing) t
†Pviv‡MvWv nvgjvi Ab¨Zg n‡jv IP spoofing, T.e.p c¨v‡KU †nWv‡i Mš—e¨¯’vb I Dr†mi wVKvbv _v‡K| IP spoofing Avµgb G †KD †Kv‡bv network Gi cÖwZwU WvUv c¨v‡K‡Ui AvMgb-wbM©gb ch©‡e¶b K‡i hZ¶b ch©š— bv IP c¨v‡KU Dr†mi IP Address Rvbv hv‡”Q| Gfv‡e dvqviIqv‡ji Af¨š—i¯’ †Kv‡bv †gwk‡bi IP Address Rvbv n‡q †M‡j AvµgbKvixi c‡¶ IB †gwk‡bi m‡½ ms‡hvM Mov Zzjbvg~jKfv‡e Lye mnR n‡q hvq|
Man-in-the-middle attack t
G ai‡b‡i Avµgb G `ywU network device Gi g‡a¨ WvUv Av`vb-cÖ`v‡bi mgq gvSLvb †_‡K Z_¨ Rv‡b, Gi Rb¨ c¨v‡KU wmœdvi RvZxq Uzj e¨envi Kiv nq Ges GwU‡K packet sniffing Avµgb e‡j|
cvmIqvW© AvµgY t
G ai‡b‡i Avµg‡b cvmIqvW© Rvbvi †Póv Kiv nq Ges cvmIqvW© Rvbvi ci †m¸‡jv e¨envi K‡i network wi‡mv‡m© cÖ‡ek
Kiv nq| †ek K‡qKfv‡e cvmIqvW© AvµgY n‡Z cv‡I, Z‡e me‡P‡q cÖPwjZ c×wZ
n‡jv cvmIqvW© Abygvb Kiv| †Kv‡bv †bUIqv‡K© e¨eüZ cvmIqvW©mg~n RwUj bv
n‡j Abygv‡bi gva¨‡gB †m¸‡jv †ei Kiv m¤¢e| Gici e¨envi Kiv nq eª“U †dvm©
AvµgY I wWKkbvwiwfwËK AvµgY|
eª“U †dvm© t(brute force) t
G ai‡bi Avµg‡Y †Kv‡bv software e¨envi
Kiv nq hv wewfbœfv‡e cvmIqvW© I Gbwµckb f½vi †Póv K‡i| h‡_ó mgq †c‡j
GiKg Avµg‡Y †h †Kv‡bv cvmIqvW© fv½v †h‡Z cv‡i| Gi GKwU c×wZ n‡jv
wWKkbvwiwfwËK AvµgY †hLv‡b GKwU wj‡ó _vKv me cvmIqvW© w`‡q cÖ‡e‡ki †Póv
Kiv nq|
‡UªvRvb nm©/fvBivm AµgY t
G
ai‡bi AvµgY Pvjv‡bv n‡q _v‡K †Kv‡bv ¶wZKi †cÖvMÖvg †Kv‡Wi gva¨‡g| †`L‡Z
AvcvZZ fv‡jv †Kv‡bv †cÖvMvg n‡jI †mwU †Mvc‡b e¨vK‡Wvi †Zwi Ki‡Z cv‡i
wKsev GKwU wbw`©ó mg‡q †bUIqvK© wi‡mv‡m©i ¶wZmvab Ki‡Z cv‡i| ¯^vfvweK
Ae¯’vq GwUi ¶wZKi cÖfve m¤ú‡K© Rvbv hvq bv|, hZ¶Y bv GwU mwµq n‡q I‡V|
ARvbv Drm †_‡K cvIqv †Kv‡bv †cÖvMÖvg Pvjv‡j GiKg Avµg‡Yi gy‡L covi
m¤¢vebv †ewk|