Market analysis insecurity of building intercom systems
In science Technology Progress and people's movement Communicate Double the demand for services driven by building Access Control Intercom System is applied to each plot in. Currently building Access Talkback Mobile communication network will continue to move forward, the future will be more perfectly the majority of the building intercom communication services mobile users demand. Wireless interface not
Security Factor In the building intercom mobile communication networks, mobile stations and fixed network all the communication between the client are transmitted through a wireless interface, but the wireless interface is open, the perpetrators can be tapped through a wireless interface, which acquired the channel transmission of information, and even can modify, insert,MBT Baridi Schuhe, delete or re-transmission of wireless interfaces in the news,Nike Air Max 2011 Mesh Grå Orange Sort Kvinders Sko, to mobile users fake identity in order to deceive the purpose of the network terminal. According to the different types of attacks,NERO DONNA HOGAN REBEL HIP-TOP, can be divided into non-authorized visit to the Ministry data, unauthorized access to network services, three types of threats to data integrity.
1. Non-authorized access to data class attack
Unauthorized access to data class is the main purpose of attacking the wireless interface for transmission of user data / or signaling data. The method has the following categories:
Eavesdropping user data - information content for users
Eavesdropping signaling data - access to network management information and other information conducive to active attacks
Wireless tracking - for mobile user's identity and location information, wireless tracking
Passive transport stream analysis - guess the content and purpose of user traffic
Active transport stream analysis - get access to information
2. Non-authorized access to network service class attack
Unauthorized access to network services in the category attack,Hogan Scarpe donna 524 nabuk beige, the attacker through the fake identity of a legitimate mobile users to fool the network side, is authorized to access network services, and to avoid paying,Nike Shox Agent Kvinder Black Pink Running Shoe, but also by being a fake mobile users pay for the attacker .
3. Threaten data integrity class of attack
Threat to data integrity class of targets is a wireless interface to the user data flow and signaling data stream,Christian Louboutin chaussures Balota 150mmLivraison gratuite pour vous, an attacker modify,Nike Air Max 2012 Sko Sort Rød Hvid, insert, delete, or retransmit the data stream to achieve the purpose of deceiving the data receiver,Nike Shox NZ 2.0 SI Hvid Sølv Sko, to a certain attack intentions.
Network terminal insecurity The building intercom mobile communication network,Nike Dunk SB Lav Heels Hvid Sort, the network side that is more complex, it not only contains many functional units, and communication between different modules of different media. So ended the same mobile communication network security, there were some unsafe factors can not be ignored - such as wireless eavesdropping, identity counterfeiting, tampering with data and service denial and so on. According to the different attack types, the following four categories:
1. Non-authorized access to data class attack
Unauthorized access to data, the main purpose of attacking the network side for transmission of user data between units and / signaling data, there are several specific ways:
Eavesdropping user data - the content of communications for the user
Eavesdropping signaling data - access to safe management of data and other information that is conducive to active attacks
Fake communications receiver - for user data, signaling data and other information that is conducive to active attacks
Passive transport stream analysis - get access to information
Illegal access to the system stored data - the data acquisition system stored the legitimate users, such as Certification Parameters
2. Non-authorized access to network service class attack
Non-authorized access to network services
I am a professional writer from ,MBT Tunisha Silber verkaufen, which contains a great deal of information about , , welcome to visit! t!
相关的主题文章:
没有评论:
发表评论