Skip to main content

Major threats to A network


In terms of security a threat is an action or tool, which can exploit and expose vulnerability and therefore compromise the integrity of the given system. Not all threats are equal in terms of their ability to expose and exploit the vulnerability. In this regard the main threat to a network comes from malicious hackers and from intruders.
The following are some of the major attacks which are known to be the major threats to any particular network.
  • Exploit attack: In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.

  • Social engineer attack: With a social engineer attack, the attacker compromises the network or system through social interaction with an individual (such as through email or phone can) and tricks the individual into divulging information that can be used in a subsequent attack. For example, a hacker may call the employee, impersonate the network administrator, and try to obtain the user's password.

  • Eavesdropping attack: This widely used type of attack typically involves the use of network monitoring tools to analyze and read communications on the network.

  • Spoof attack: In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be attempted to try to bypass your firewall rules.

  • Hijack attack: In a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. You still believe that you are talking to the original party and may send private information to the backer unintentionally.

  • Denial of service: A denial of service (DOS) is a type of attack that causes the system or its services to crash. As a result, the system cannot perform its purpose and provide those services.

  • Distributed denial of service (DDOS): The hacker uses multiple systems to attack a single target system. A good example is the SMURF attack, in which the hacker pings a number of computers but modifies the source address of those packets so that they appear to come from another system (the victim in this case). When all of these systems receive the ping request, all systems will reply to the same address, essentially overburdening that system with data.

  • Password attack: An attacker tries to crack the passwords stored in a network account database or a password protected file. To use this method hackers use many freeware software applications which can be easily download from the web.

One of the most effective ways of all times, in protecting against these kinds of attacks is, awareness! Having a current knowledge about security and having heard the most commonly adopted ways that people use to fool around people may save your network!

Comments

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Fortifying Cybersecurity: A NIST CSF Perspective on Zero Trust and Passkeys

Cybersecurity is like protecting a fortress from invaders. Traditionally, we built strong walls around our castle, trusting those inside and keeping potential threats outside. But in today's digital world, threats can come from within and outside, making traditional defences inadequate. This is where the concept of zero trust comes in. What is Zero Trust? Imagine your home. You don't blindly trust everyone who walks in, right? You might ask for identification or make sure they have a reason to be there. Zero trust is similar. It means not automatically trusting anyone or anything trying to access your digital "home" (like your network or data). Instead, it's about constantly verifying and monitoring every access attempt, regardless of where it comes from. Why Zero Trust Matters: Zero trust addresses three key goals in cybersecurity, often called the CIA triad: Confidentiality : Just like you wouldn't want strangers snooping through your person...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...