Networks running on TCP/IP are vulnerable to a vast number of attacks. These result in account compromise, root compromise, denial of service, exploitation of trust and internet infrastructure attacks. These are done through manual or automated means like probes, robots, packet sniffers and various types of malicious code.
- Network probes are an unusual attempt to gain entry into a system. Attempts are like gaining entry into an account that has weak passwords, using other programs to gain information about the network or data sent on the network. Network Probe gives you information on protocols being used, active hosts, conversations and network traffic statistics.
- A scan is basically done by an automated tool which is usually a program that uses a large number of probes or scans each port of the computer independently to find which can be intruded into. If it is a continuous scan it can be noticed and so some of these automated scans operate on stealth mode to avoid suspicion. A port scan is usually a prelude to a more direct attack on the system.
- Account compromise is the use of a computer account by some one else. This can be done on a standalone computer or even between two computers. The user account is usually an entry point for greater access to the system. This compromise can lead to loss of privacy and data of user.
- Root Compromise is compromise that happens on a UNIX system. The root is an account on the UNIX system that has super user or administrator privileges. Once this is compromised then intruders can do anything on the compromised system.
- Packet Sniffer captures information from packets as they travel over any network. This is due to the weakness of IP that inserts data into packets as plain text. These packets then traverse the network. If sniffed these may contain user names and passwords or business crucial information.
- Denial of Service is denying a legitimate user a given service he usually has access to. This is more related to email and network usage. Attackers flood the network with large volumes of data to slow down the network. It may also be in physical disruption of components or manipulation of data in transit
- Exploitation of trust is forging of an identity to gain access. Attackers thus appear to be using trusted accounts to gain entry into others computers. IP spoofing is said to be a technique where the malicious host claims to have the IP address of a trusted host.
- Malicious code is programs that are hidden in legitimate programs or files and does undesired things in the computer. These later may cause either a denial of service or undue damage to the system it resides in.
Please subscribe, leave a comment, follow this blog and share this article with your friends and colleagues.
by: http://kedirizone.blogspot.com
0 comments:
Post a Comment