Definition of Network Attack
Basically any method, way or means that is used to intentionally compromise any form of network security can be considered as a Network Attack.
How many Network Attacks are there?
Honestly, too many for myself to read on the Internet and type here. So I'll just post about a few, hopefully in words you and I can understand.Moving on...
Any information after this sentence should pertain to the subject or topic that is "Common Network Attacks", do feel free to comment about anything on this blog or its posts as long as it is made in a polite and friendly manner. (:
Or else I will find you and hunt you down.
I'm serious.
I don't joke.
HAHAHA
Okay okay, I hope you're enjoying this post as much as I have typing this out for you all!
HAHAHA
Okay okay, I hope you're enjoying this post as much as I have typing this out for you all!
Back to work!
First
Data modification or data manipulation is a form of network attack where changes are made to private company data whether the data has been interpreted, modified or deleted. This network attack is considered properly completed when the sender doesn't realize that the data has been tinkered with.
Solutions:
1) Backup the important data (whether its yours or the company's) regularly.
2) Implementing Access Control Lists (ACLs) which would manage the users and only allow a few qualified people you trust to have permission to access your data.
3) Insert codes into your applications that can actually validate the data input to ensure that the information or data has not been tampered with.
Second
Eavesdropping is done when the perpetrator, like some sort of pervert, actually stalks and snoops in on your network traffic and just reading any data he can find. What he understands of course, depends entirely on the level of protection applied to your data.
Solutions:
1) Use Internet Protocol Security (IPSec) to grant some form of protection on your data through encryption before the data gets sent over the network.
2) Security policies and procedures are also another way to defend your data from getting a sniffer on the network.
Note: Sniffer is a type of software or hardware that allows the user to log or record down moving traffic and intercept them on a network.
Third
IP address spoofing, in simple terms, identity theft but in IP style. The attacker masquerades his IP as one which belongs to a valid IP address to the company targeted. Upon doing so, the attacker would do his utmost best to discover the other computers on the network. Since most IP networks associate users with their specific IP addresses, this fake packet gets through the routers and lands up where ever the attacker wishes. He can then choose to change the flow of traffic or start a Denial of Service (DoS) attack.
Solutions:
1) Set up encryption at the traffics between routers and external hosts.
2) Implement ingress filters to block any inbound packets with source addresses coming from trusted users within the internal network.
The End
I have come to the end of my first post, and I do hope you all have enjoyed reading this little brief introduction on a few network attacks.
No comments:
Post a Comment