-
Essay / Types of Attacks
IntroductionWithout security measures and protocols in place, some data can be exposed to attacks. Some attacks are “passive,” which is reflected by the data observed; other attacks may be active, implying that data is modified with the intention of corrupting or destroying the information or the network itself. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay Every network is vulnerable to one of the listed forms of attack if the appropriate security procedures and defenses have not been put in place. Eavesdropping Typically, almost all network communications take place in an insecure or "plain text" configuration, meaning that it is possible for an attacker who has bypassed certain defense measures and has access to the network to "paths "data" network to "listen" or decipher (or in other words "read") the information/traffic. When this happens and an attacker eavesdrops/eavesdrops on certain communications, it is often referred to as spying/sniffing. The threat of an attacker eavesdropping to observe a network is considered one of the top security issues administrators face in an enterprise. /business. Without reliable encryption services primarily based on cryptography, company/business information can be intercepted and interpreted by other users such as attackers as it travels over the network. Types of Attacks Data Modification Once an attacker has interpreted and intercepted information, the next step would be to modify it. An attacker can modify the intercepted information in the data packet without the sender or recipient knowing. Although privacy is not required for all communications between users, any company would not want their employees' communications to be tampered with while in transit. For example, if a company changes its purchase requisitions, neither company wants the data, which could include item counts, billing information, amounts, or other data, to be changed by an attacker . Identity Theft (IP Spoofing) The majority of networks and operating systems use a device's IP address to identify a valid entity. In some scenarios, it is possible for an IP address to be falsely assumed – this is called “spoofing”. An attacker could also use proprietary programs/applications whose sole purpose is to create IP packets that appear to come from valid addresses within a corporate intranet. When an attacker has accessed a network with a legitimate IP address (constructed from special software/applications), they can modify, delete or redirect information. The attacker can also carry out other types of attacks from this list in addition to spoofing. Password-Based Attacks A very common feature in most operating system and network security plans is password access control. This means that a user's access rights to a device and network resources are limited to each user, that is, the username and password used to log in. Older applications do not always protect identity data when it is transmitted over the network for authentication purposes. This could allow an attacker/eavesdropper to illegally access a network by pretending to be a valid user. When an attacker obtains an accountvalid, he then has the same privileges as the user whose identity he is impersonating. Therefore, if the user account he has access to is an administrator with administrator-level privileges, the attacker is also able to create accounts that he could use at a different time. If an attacker manages to gain access to a network, even through a normal user account without administrator rights, then they are able to perform the following operations: Obtain lists of authorized users and device names as well only network information. Modify, redirect or delete user data. Is able to change server and network settings. , such as access controls and routing. Denial of Service Attack A denial of service attack prevents valid users from using any device or network that users could normally access. If an attacker gains access to a network, it can do any of the following: Is able to randomize the attention of internal information systems personnel so that personnel are not immediately aware of the intrusion, thus allowing more attacks during this confusion, which can cause internal chaos for a targeted company. override information about network services or applications, which in turn triggers interruption or irregular performance of targeted services or applications. Bombard an entire network or device with traffic until the targeted device or network triggers a shutdown due to excess traffic. traffic flow, which in turn completely blocks access to network resources, even by authorized users. Man-in-the-Middle Attack A man-in-the-middle attack occurs when one person between two communicating users vigorously monitors, captures, and manages the communication without either communicating individual knowing that their information is being intercepted. When computers exchange information at low levels of the network layer, it can be difficult to determine with whom they are actually exchanging data. Man-in-the-middle attacks can be seen as someone impersonating you and your identity in order to be able to read your message. The person the attacker is communicating with, while pretending to be another user, may believe that the attacker is truly someone else, as the attacker could actively respond while pretending to be someone else else to ensure the exchange continues and can verify more information.Compromised Key AttackA key is a secret number or code required to decode secure/encrypted data. Although obtaining a key is challenging and resource intensive from an attacker's perspective, it is still feasible. Once an attacker has obtained a key, it is then called a “compromised key”. An attacker can then use the compromised key to illegally access a secure communication without the sender or recipient knowing that their communication is being attacked. A compromised key also allows an attacker to decrypt or modify data and attempt to use the key to calculate more keys, potentially allowing the attacker access to other secure communications. Sniffer AttackA "sniffer" is a device or application that can interpret, monitor, and understand network information exchanges and read network packets. If network packets are not encrypted, the sniffer application/device provides a full view of the information contained in the data packet. Encapsulated packets are not safe from.