Question

In: Computer Science

the process used to attack networks and the devices on networks. APA FORMAT

the process used to attack networks and the devices on networks. APA FORMAT

Solutions

Expert Solution

the process used to attack networks

1. Unauthorized access
Unauthorized access refers to attackers accessing a network without receiving permission. Among the causes of unauthorized access attacks are weak passwords, lacking protection against social engineering, previously compromised accounts, and insider threats.

2. Distributed Denial of Service (DDoS) attacks
Attackers build botnets, large fleets of compromised devices, and use them to direct false traffic at your network or servers. DDoS can occur at the network level, for example by sending huge volumes of SYN/ACC packets which can overwhelm a server, or at the application level, for example by performing complex SQL queries that bring a database to its knees.

3. Man in the middle attacks
A man in the middle attack involves attackers intercepting traffic, either between your network and external sites or within your network. If communication protocols are not secured or attackers find a way to circumvent that security, they can steal data that is being transmitted, obtain user credentials and hijack their sessions.

4. Code and SQL injection attacks
Many websites accept user inputs and fail to validate and sanitize those inputs. Attackers can then fill out a form or make an API call, passing malicious code instead of the expected data values. The code is executed on the server and allows attackers to compromise it.

5. Privilege escalation
Once attackers penetrate your network, they can use privilege escalation to expand their reach. Horizontal privilege escalation involves attackers gaining access to additional, adjacent systems, and vertical escalation means attackers gain a higher level of privileges for the same systems.

6. Insider threats
A network is especially vulnerable to malicious insiders, who already have privileged access to organizational systems. Insider threats can be difficult to detect and protect against, because insiders do not need to penetrate the network in order to do harm. New technologies like User and Even Behavioral Analytics (UEBA) can help identify suspicious or anomalous behavior by internal users, which can help identify insider attacks.


Related Solutions

What are some of the common types of attacks against networks and devices on networks? apa...
What are some of the common types of attacks against networks and devices on networks? apa format
The three major types of Backbone Networks are based on the devices used. In practice, it...
The three major types of Backbone Networks are based on the devices used. In practice, it is most common to use a combination of these architectures. In your opinion what best practices do you recommend in the following? (a) Architectures. (b) Technologies. (c) Implications for management
Question 4: The three major types of Backbone Networks are based on the devices used. In...
Question 4: The three major types of Backbone Networks are based on the devices used. In practice, it is most common to use a combination of these architectures. In your opinion what best practices do you recommend in the following? (a) Architectures. (b) Technologies. ( 10 Marks) (c) Implications for management ( 6 Marks) TOTAL
Why do we use APA format.
Why do we use APA format.
The Assignment is in a format of essay writing, and it must be submitted in APA...
The Assignment is in a format of essay writing, and it must be submitted in APA style of writing, and it requires no less than one (1) full page of writing with the proper reference page and writing text referenced, minimum 300 words.   cite at least two references from the FNC Electronic Library. What influences on personality development seem most important to you? and Why?
A proposal on sexual harassment at work place in Apa format.
A proposal on sexual harassment at work place in Apa format.
innovation at international foods case study in APA Format
innovation at international foods case study in APA Format
In essay format with at least two sources in APA format. Briefly describe your understanding of...
In essay format with at least two sources in APA format. Briefly describe your understanding of how and why managers use budgets. What types of budget approaches are typically used in for-profit companies as opposed to non-profit organizations? Explain at least two different budget methods. Describe a minimum of two ways in which a personal budget is similar to a business budget. Elaborate your response.
consumerization of technology at IFG mini case in detail in APA format
consumerization of technology at IFG mini case in detail in APA format
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b....
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b. Sniffer [5 marks] c. Spoofing [5 marks] d. Man-in-middle attack [5 marks] e. TCP/IP Hijacking [5 marks] You are expected to carry out an analysis and discuss on the nature of each threats by addressing the following elements; What it is all about? How can such attack/threats take place in the network? Why they do it? When normally such attack take place (i.e. any...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT