Skip to main content

Major threats to A network


In terms of security a threat is an action or tool, which can exploit and expose vulnerability and therefore compromise the integrity of the given system. Not all threats are equal in terms of their ability to expose and exploit the vulnerability. In this regard the main threat to a network comes from malicious hackers and from intruders.
The following are some of the major attacks which are known to be the major threats to any particular network.
  • Exploit attack: In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.

  • Social engineer attack: With a social engineer attack, the attacker compromises the network or system through social interaction with an individual (such as through email or phone can) and tricks the individual into divulging information that can be used in a subsequent attack. For example, a hacker may call the employee, impersonate the network administrator, and try to obtain the user's password.

  • Eavesdropping attack: This widely used type of attack typically involves the use of network monitoring tools to analyze and read communications on the network.

  • Spoof attack: In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be attempted to try to bypass your firewall rules.

  • Hijack attack: In a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. You still believe that you are talking to the original party and may send private information to the backer unintentionally.

  • Denial of service: A denial of service (DOS) is a type of attack that causes the system or its services to crash. As a result, the system cannot perform its purpose and provide those services.

  • Distributed denial of service (DDOS): The hacker uses multiple systems to attack a single target system. A good example is the SMURF attack, in which the hacker pings a number of computers but modifies the source address of those packets so that they appear to come from another system (the victim in this case). When all of these systems receive the ping request, all systems will reply to the same address, essentially overburdening that system with data.

  • Password attack: An attacker tries to crack the passwords stored in a network account database or a password protected file. To use this method hackers use many freeware software applications which can be easily download from the web.

One of the most effective ways of all times, in protecting against these kinds of attacks is, awareness! Having a current knowledge about security and having heard the most commonly adopted ways that people use to fool around people may save your network!

Comments

Popular posts from this blog

Google dialogflow - How to train a chatbot to answer questions related to your office and how to make it better than just a Q&A bot?

  First lets look how to do it the basic way. To train a conversational AI chatbot for answering office-related queries using Dialogflow, you will need to follow these steps: Create a new agent in Dialogflow. Collect a dataset of office-related queries and their corresponding answers. This dataset can be obtained through various means, such as scraping websites, conducting surveys, or manually creating a dataset. Create intents in Dialogflow for the queries in your dataset. An intent represents a user's intention, such as asking for office hours or requesting a vacation day. Add training phrases to each intent, which are examples of how a user might ask the question. Provide responses for each intent, which will be the chatbot's answer to the user's query. Test the chatbot using the "Try it now" feature in Dialogflow. Once the chatbot is working well, you can deploy it to a platform of your choice, such as a website or mobile app. However, if you follow the basic ...

Have you ever wished that if you could hide your personal user account from the Windows Welcome screen?

One of the unfortunate side effects of the Welcome Screen is the listing of all of the user accounts on the computer. What if there is an account that you do not want the whole world to see? Using the same features that Microsoft uses to hide system accounts from the Welcome Screen. You can hide user accounts as well. Hiding user accounts can be done by a simple hack in the registry. Hidden away in the local system settings is a list of accounts that Microsoft does not want to appear on the Welcome screen. These accounts are primarily system accounts under which different processes that run in the background use to execute. To hide a user from the Welcome screen, all you have to do is create an entry on the list for the user you want to hide. Removing a user account from Welcome Screen Before You make any changes to registry , please create a restore point in your computer, so incase if anything goes out of hand you can always restore your computer to the earlier state and another the ...

What if we combine Scrum and DevOps?

To understand how an agile project management methodology like scrum and the DevOps mindset work together, let's look into an arbitrary software development team called the dream team. I will tell you how they use scrum with their DevOps practices like a small story so that it wouldn't feel like you are trying to learn these concepts by reading an article.  The dream team was tasked with building an online bookstore. Their vision was to create a platform where readers could easily browse and buy books. In the team, there was a Product Owner, a Scrum Master, a UI/UX designer, a couple of developers, and a database engineer. They started their journey with a meeting led by the Product Owner, who had a clear idea of the features needed for this platform. This list of features, known as the product backlog, included user authentication, a book database, a search function, a shopping cart, and a payment system. The Product Owner, the Scrum Master, and the rest of the team then held ...