Question

In: Computer Science

What are some of the common types of attacks against networks and devices on networks? apa...

What are some of the common types of attacks against networks and devices on networks? apa format

Solutions

Expert Solution

What Is a Network Attack?

A network attack is an attempt to gain unauthorized access to an organization’s network, with the objective of stealing data or perform other malicious activity. There are two main types of network attacks:

  • Passive: Attackers gain access to a network and can monitor or steal sensitive information, but without making any change to the data, leaving it intact.
  • types of passive attacks are:

    ---obtain message contents

  • ---monitor traffic flows

  • Active: Attackers not only gain unauthorized access but also modify data, either deleting, encrypting or otherwise harming it.
  • Some of the active attacks are:

    ----masquerade of one entity as some other

  • ----replay previous messages

    ----modify messages in transit     

  • ----denial of service

Following are the Common Types of Network Attacks:

1. Unauthorized access
Unauthorized access refers to attackers accessing a network without receiving permission. Among the causes of unauthorized access attacks are weak passwords, lacking protection against social engineering, previously compromised accounts, and insider threats.

2. Distributed Denial of Service (DDoS) attacks
Attackers build botnets, large fleets of compromised devices, and use them to direct false traffic at your network or servers. DDoS can occur at the network level, for example by sending huge volumes of SYN/ACC packets which can overwhelm a server, or at the application level, for example by performing complex SQL queries that bring a database to its knees.

3. Man in the middle attacks
A man in the middle attack involves attackers intercepting traffic, either between your network and external sites or within your network. If communication protocols are not secured or attackers find a way to circumvent that security, they can steal data that is being transmitted, obtain user credentials and hijack their sessions.

4. Code and SQL injection attacks
Many websites accept user inputs and fail to validate and sanitize those inputs. Attackers can then fill out a form or make an API call, passing malicious code instead of the expected data values. The code is executed on the server and allows attackers to compromise it.

5. Privilege escalation
Once attackers penetrate your network, they can use privilege escalation to expand their reach. Horizontal privilege escalation involves attackers gaining access to additional, adjacent systems, and vertical escalation means attackers gain a higher level of privileges for the same systems.

6. Insider threats
A network is especially vulnerable to malicious insiders, who already have privileged access to organizational systems. Insider threats can be difficult to detect and protect against, because insiders do not need to penetrate the network in order to do harm. New technologies like User and Even Behavioral Analytics (UEBA) can help identify suspicious or anomalous behavior by internal users, which can help identify insider attacks.


Related Solutions

the process used to attack networks and the devices on networks. APA FORMAT
the process used to attack networks and the devices on networks. APA FORMAT
One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The...
One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The goal is to introduce an attacker-controlled wireless access point near the “known good” WLAN network. This access point will advertise the exact same SSID as the authorized WLAN. Wireless users may accidently connect to this malicious access point thinking it is part of their authorized network. Once the connection is established, the attacker can initiate a man-in-the-middle attack and capture or relay traffic while...
The three major types of Backbone Networks are based on the devices used. In practice, it...
The three major types of Backbone Networks are based on the devices used. In practice, it is most common to use a combination of these architectures. In your opinion what best practices do you recommend in the following? (a) Architectures. (b) Technologies. (c) Implications for management
Use the Internet to research defenses against cross-site attacks (XSS and XSRF). What are the common...
Use the Internet to research defenses against cross-site attacks (XSS and XSRF). What are the common defenses? How difficult are they to implement? Why are these defenses not used extensively? Write you finding here in your original post. Minimum 150 words for your response.
Question 4: The three major types of Backbone Networks are based on the devices used. In...
Question 4: The three major types of Backbone Networks are based on the devices used. In practice, it is most common to use a combination of these architectures. In your opinion what best practices do you recommend in the following? (a) Architectures. (b) Technologies. ( 10 Marks) (c) Implications for management ( 6 Marks) TOTAL
"Social engineering attacks are not only becoming more common against enterprises and SMBs, but they're also...
"Social engineering attacks are not only becoming more common against enterprises and SMBs, but they're also increasingly sophisticated. With hackers devising ever-more clever methods for fooling employees and individuals into handing over valuable company data, enterprises must use due diligence in an effort to stay two steps ahead of cybercriminals." Digital Guardian (Links to an external site.) Read the article "Social Engineering Attacks: Common Techniques & How to Prevent an Attack (Links to an external site.)" on the Digital Guardian...
discuss the common types of networks with the required standards for management to make an informed...
discuss the common types of networks with the required standards for management to make an informed decision pls this question is banking and finance question
What are some benefits of Marketing with Social Networks?
What are some benefits of Marketing with Social Networks?
1)What are some common ethical issues for forensic scientists?. 2)What are the arguments against euthanasia?
1)What are some common ethical issues for forensic scientists?. 2)What are the arguments against euthanasia?
3. Name two types of common attacks on security and explain how we can test them.
3. Name two types of common attacks on security and explain how we can test them.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT