Get an expert to write your essay, starting at just $13.90 /page
Pssst… we can write an original essay just for you.
Any subject. Any type of essay.
We’ll even meet a 3-hour deadline.Get your price
121 writers online
Without security measures and protocols that have been set in place, certain data can be exposed to attack. Certain attacks are “passive”, which translates to the data being observed; other attacks can be active, implying that the data is changed with the intention of corrupting or destroying the information or actual network itself.
Every network is vulnerable to any of the listed forms of attacks if the correct security procedures and defenses have not been put into place. Eavesdropping Typically, nearly all of network communications take place in an unsecured or “clear text” configuration, this means it’s possible for an attacker who has gotten through certain defense measures and has access to the network to “data paths” in the network to “listen in” or decipher (or in other words “read”) the information/traffic. When this happens and an attacker is spying/listening in on certain communications, it is often called snooping/ sniffing. The threat of an attacker eavesdropping to observe a network is regarded as one of the main security problems that administrators are challenged with in a company/business. Without reliable encryption services mainly based on cryptography, company/business information can be intercepted and interpreted by other users such as attackers whilst it goes around the network.
After an attacker has interpreted and intercepted any information, the next stage would be to modify it. An attacker can alter the intercepted information in the data packet without the sender or receiver even knowing about it. Even if confidentiality is not required for all communication between users, any enterprise would not want any of their employee’s communications to be altered in transit. For example, if a company is switching purchase requests, neither of the companies would want any of the data which could include number of items, billing information, amounts or other data to be altered by an attacker.
The majority of networks and OS’s utilize the IP address of a device to identify a valid entity. In some scenarios, it is feasible for an IP address to be falsely assumed – this is what is known as “identity spoofing”. An attacker could also utilize exclusive programs/applications which sole purpose is to create IP packets that seem to derive from valid addresses inside a corporate/business intranet.
When an attacker has gained access to a network with a legitimate IP address (constructed from special software/applications), they can alter, delete or reroute information. The attacker can also direct other sorts of attacks from this list alongside Spoofing.
A very common feature to most OS and network security plans is password-based access control. Meaning a user’s access rights to a device and resources on the network is limited to each user, meaning the user name and password used to log on.
Older applications don’t always guard identity data as it is transmitted around the network for authentication. This could allow an attacker/eavesdropper to gain unlawful access to a network by impersonating a valid user.
When an attacker obtains a valid account, they then have the same privileges as the user they are impersonating. Consequently, if the users account that they have got access to happen to be an admin with administrator level privileges, the attacker is also able to create accounts that he/she could utilize at a different time.
If an attacker is able to gain access to a network even through a normal user account without admin rights then they are able to perform the following:
A denial-of-service attack stops valid users from utilizing any device or network of which users would normally be able to access.
If an attacker is able to gain access to a network, they can perform any of the following;
A man-in-the-middle attack transpires when a person between two users who are communicating is vigorously monitoring, seizing, and managing the communication without either of the two individuals communicating knowing that their information is being intercepted. When computers are exchanging information at low levels of the network layer, it can be difficult to determine who they are actually exchanging data with.
Man-in-the-middle attacks can be thought as somebody impersonating you and your identity so that they are able to read your message. The person who the attacker is communication with, whilst impersonating another user, may believe the attacker is genuinely someone else as the attacker could be actively replying whilst impersonating as someone else in order to ensure that the exchange continues so that they may be able to ascertain more information.
A key is a secret number or code required to decode secured/encrypted data. Whilst getting hold of a key is a challenging and uses a lot of resources from an attacker’s point of view, it is still achievable. After an attacker has got a key, it is then known as a “compromised key”.
An attacker can then use the compromised key to unlawfully gain access to a secured communication without either the sender or receiver knowing their communication is under attack. A compromised key also allows an attacker to decrypt or modify data, and attempt to utilize the key to compute more keys, potentially allowing the attacker to access other secured communications.
A “sniffer” is a device or application that can interpreted, monitor, and apprehend network information exchanges and read network packets. If network packets are not encrypted, the sniffer application/device offers a full view of the information inside the data packet. Encapsulated packets are not immune to this type of attack and can be cracked and read unless they are encrypted and the attacker hasn’t got access to the key.
If an attacker is using a sniffer then they are able to perform any of the following actions:
This form of attack targets application servers by intentionally instigating an error in a server’s OS or applications. This consequently provides the attacker with the ability to bypass normal access controls. Thus, meaning that the attacker exploits the situation, acquiring control of the system, application or network, and is capable of performing any of the following: Alter, add, Read or delete company/enterprise data or operating system. Introduce a virus program that utilizes company devices and software applications to duplicate viruses throughout the network. Introduce a sniffer program to analyze the network and gather valuable data that could ultimately be utilized to corrupt or crash any systems and the entire network. Irregularly close operating systems or data applications. Deactivate additional security protocols to allow attacks in the future.
To export a reference to this article please select a referencing style below:
Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.
Your essay sample has been sent.
Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.Order now
Are you interested in getting a customized paper?Check it out!