blog




  • Essay / Common Types of Network Attacks

    Common Types of Network Attacks:Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay Eavesdropping When an attacker listens to your communication, it is termed as sniffing or spying. The ability of an eavesdropper to monitor the system is essentially the biggest security issue that executives consider in an organization. Without the benefits of strong encryption that rely on cryptography, your information can be viewed by others as they navigate the system. Modification of data An attacker can modify the information contained in the packet without the knowledge of the sender or the recipient. Even if you don't require all communications to be confidential, you don't want any of your messages to be changed while traveling. For example, if you negotiate purchase orders, you do not need to adjust items, amounts, or billing data. Identity Theft (IP Spoofing) After accessing the system with a substantial IP address, the attacker can adjust, redirect or erase your information. The attacker can also direct different types of attacks, as described in the following sections. Password-based attacks When an attacker finds a valid user account, they have the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker can also create accounts for further subsequent access. After accessing your network with a valid account, an attacker can do one of the following: Obtain lists of valid users. and computer names and network information. Change server and network configurations, including access controls and routing tables. Change, redirect, or delete your data. Denial of service attack After accessing your network, the attacker can do one of the following: Randomize the attention of your internal information systems personnel so that they do not see the intrusion immediately, allowing the attacker to launch more attacks attacks during the hijacking. Send invalid data to applications or network services, causing applications or services to terminate or behave abnormally. Flooding a computer or the entire network with traffic until a shutdown occurs by due to overload.Block traffic, resulting in loss of access to network resources by authorized users.Man-in-the-middle attackFor example, the attacker can reroute a data exchange. When computers communicate at low levels of the network layer, they may not be able to determine with whom they are exchanging data. The person on the other end of the line may think it's you because the attacker might actively respond while you remain in contact. exchange and obtain more information. This attack is capable of the same damage as an application layer attack, described later in this section. Compromised Key Attack An attacker uses the compromised key to gain access to a secure communication without the sender or receiver being aware of the compromised key attack. key, the attacker can decrypt or modify the data and attempt to use the compromised key to calculate additional keys, which could allow the attacker to access other secure communications. and gain information that could possibly cause your network to be blocked or corrupted. Read your communications. , add, delete or modify your data or your operating system..