Types of attacks -Network security


Types of attacks

Passive
- Difficult to detect, because the attacker isn’t actively sending traffic (malicious or otherwise).
- Just install the virus and let the virus work by own.

Active
- Easier to detect because the attacker is actively sending traffic that can be detected.

Close-in
- It occurs when the attacker is in close physical proximity with the target system.

Insider
- Legitimate network users leverage their credentials and knowledge of the network in a malicious fashion.

Distribution
Intentionally introduce “back doors” to hardware or software systems at the point or manufacture.

How to prevent that attack

Attack class
Primary layer of defense
Secondary layer of defense
Passive
Encryption
Application with integrated security
Active
Firewall at the network edge
Host intrusion prevention system(HIPS)
Insider
Protecting against unauthorized physical access
Authentication
Close-in
Protecting against unauthorized access
Video monitoring systems
Distribution
Secured software distribution system
Real- time software integrity checking



Steps to protect your network

1. Implement
- Create and implement a network security system that provides protection and has sufficient authorization policies.

2. Analyze
- The system need to be analyzed to determine if the current security system is appropriate for the network it is protecting.

3. Test
- conduct test to make sure all of the securities are working and will completely protect your network against any threats.

4. Modify
- collect the data and enhance your protections. The results will reveal where your security system is effective where it can be improved.

Comments

Popular posts from this blog

Log Review

Organizational security types

Network planning - Proof of concept