Common Types of Network Attacks: Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay Eavesdropping The moment an attacker is intercepting your communication, it is called sniffing or snooping. The ability of an eavesdropper to monitor the system is in most cases the biggest security issue that executives look at in an enterprise. Without strong encryption benefits that depend on encryption, your information can be examined by others as they navigate the system. Changing Data An attacker can change information in the packet without the sender or recipient's knowledge. While you don't require confidentiality for all communications, you don't want any of your messages to be altered during your trip. For example, if you are negotiating purchase orders, you do not need the things, sums or charge details to be changed. Identity Spoofing (IP Address Spoofing) After gaining access to the system with a substantial IP address, the attacker can modify, redirect, or delete your information. Likewise, the attacker can direct different types of attacks, as described in the following sections. Password-Based AttacksWhen an attacker finds a valid user account, he has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker can also create accounts for subsequent login at a later time. After gaining access to the network with a valid account, an attacker can do one of the following: Obtain lists of valid users and computer names and network information. Modify server and network configurations, including access controls and routing tables. Modify, redirect or delete data. Denial-of-Service Attack After gaining access to the network, the attacker can do one of the following: Randomize the attention of internal information systems personnel so that they do not immediately see the intrusion, allowing the attacker to carry out multiple attacks during the deflection. Send invalid data to applications or network services, which causes the applications or services to quit or behave abnormally. Flood a computer or the entire network with traffic until it crashes due to overload. Block traffic, with resulting in loss of access to network resources by authorized users.Man-in-the-Middle AttackFor example, the attacker can reroute a data exchange. When computers communicate at low levels of the network layer, they may not be able to determine who they are exchanging data with. The person on the other end may believe it's you because the attacker may respond actively while you maintain communication. exchange by going and get more information. This attack can cause the same damage as an application-level attack, described later in this section. Compromised Key Attack An attacker uses the compromised key to gain access to a secure communication without the sender or recipient being aware of the compromised key attack. key, the attacker can decrypt or modify the data and try to use the compromised key to calculate additional keys, which could allow the attacker to access other protected communications. Sniffer Attack Using a sniffer, an attacker can do one of the following: Scan the network and obtain information to possibly cause the network to crash or become corrupted. Read your communications..
tags