In: Computer Science
What are some of the common types of attacks against networks and devices on networks? apa format
What Is a Network Attack?
A network attack is an attempt to gain unauthorized access to an organization’s network, with the objective of stealing data or perform other malicious activity. There are two main types of network attacks:
---obtain message
contents
---monitor traffic
flows
----masquerade of one
entity as some other
----replay previous
messages
----modify messages in transit
----denial of service
Following are the Common Types of Network Attacks:
1. Unauthorized access
Unauthorized access refers to attackers accessing a network without
receiving permission. Among the causes of unauthorized access
attacks are weak passwords, lacking protection against social
engineering, previously compromised accounts, and insider
threats.
2. Distributed Denial of Service (DDoS)
attacks
Attackers build botnets, large fleets of compromised devices, and
use them to direct false traffic at your network or servers. DDoS
can occur at the network level, for example by sending huge volumes
of SYN/ACC packets which can overwhelm a server, or at the
application level, for example by performing complex SQL queries
that bring a database to its knees.
3. Man in the middle attacks
A man in the middle attack involves attackers intercepting traffic,
either between your network and external sites or within your
network. If communication protocols are not secured or attackers
find a way to circumvent that security, they can steal data that is
being transmitted, obtain user credentials and hijack their
sessions.
4. Code and SQL injection attacks
Many websites accept user inputs and fail to validate and sanitize
those inputs. Attackers can then fill out a form or make an API
call, passing malicious code instead of the expected data values.
The code is executed on the server and allows attackers to
compromise it.
5. Privilege escalation
Once attackers penetrate your network, they can use privilege
escalation to expand their reach. Horizontal privilege escalation
involves attackers gaining access to additional, adjacent systems,
and vertical escalation means attackers gain a higher level of
privileges for the same systems.
6. Insider threats
A network is especially vulnerable to malicious insiders, who
already have privileged access to organizational systems. Insider
threats can be difficult to detect and protect against, because
insiders do not need to penetrate the network in order to do harm.
New technologies like User and Even Behavioral Analytics (UEBA) can
help identify suspicious or anomalous behavior by internal users,
which can help identify insider attacks.