close
test_template

Common Types of Network Attacks

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 582 |

Page: 1|

3 min read

Published: Dec 18, 2018

Words: 582|Page: 1|3 min read

Published: Dec 18, 2018

Common Types of Network Attacks:

Eavesdropping

At the point when an attacker is eavesdropping on your communication, it is alluded to as sniffing or snooping. The capacity of an eavesdropper to monitor the system is for the most part the greatest security issue that executives look in an undertaking. Without solid encryption benefits that depend on cryptography, your information can be perused by others as it navigates the system.

Data Modification

An attacker can modify the information in the packet without the knowledge of the sender or receiver. Regardless of whether you don’t require confidentiality for all communications, you don’t want any of your messages to be altered in travel. For example, if you are trading buy orders, you don’t need the things, sums, or charging data to be adjusted.

Identity Spoofing (IP Address Spoofing)

After gaining access to the system with a substantial IP address, the assailant can adjust, reroute, or erase your information. The attacker can likewise direct different kinds of attacks, as described in the following sections.

Password-Based Attacks

When an attacker finds a valid user account, the attacker has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.

After gaining access to your network with a valid account, an attacker can do any of the following:

Obtain lists of valid user and computer names and network information.

Modify server and network configurations, including access controls and routing tables.

Modify, reroute, or delete your data.

Denial-of-Service Attack

After gaining access to your network, the attacker can do any of the following:

Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.

Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.

Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Block traffic, which results in a loss of access to network resources by authorized users.

Man-in-the-Middle Attack

For example, the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data.

The person on the other end might believe it is you because the attacker might be actively replying as you to keep the exchange going and gain more information. This attack is capable of the same damage as an application-layer attack, described later in this section.

Compromised-Key Attack

An attacker uses the compromised key to gain access to a secured communication without the sender or receiver being aware of the attack with the compromised key, the attacker can decrypt or modify data, and try to use the compromised key to compute additional keys, which might allow the attacker access to other secured communications.

Sniffer Attack

Using a sniffer, an attacker can do any of the following:

Analyze your network and gain information to eventually cause your network to crash or to become corrupted.

Read your communications.

Application-Layer Attack

The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following:

Read, add, delete, or modify your data or operating system.

Introduce a virus program that uses your computers and software applications to copy viruses throughout your network.

Introduce a sniffer program to analyze your network and gain information that can eventually be used to crash or to corrupt your systems and network.

Abnormally terminate your data applications or operating systems.

Get a custom paper now from our expert writers.

Disable other security controls to enable future attacks.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Common Types of Network Attacks. (2018, December 17). GradesFixer. Retrieved November 20, 2024, from https://gradesfixer.com/free-essay-examples/common-types-of-network-attacks/
“Common Types of Network Attacks.” GradesFixer, 17 Dec. 2018, gradesfixer.com/free-essay-examples/common-types-of-network-attacks/
Common Types of Network Attacks. [online]. Available at: <https://gradesfixer.com/free-essay-examples/common-types-of-network-attacks/> [Accessed 20 Nov. 2024].
Common Types of Network Attacks [Internet]. GradesFixer. 2018 Dec 17 [cited 2024 Nov 20]. Available from: https://gradesfixer.com/free-essay-examples/common-types-of-network-attacks/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now