Types of attacks -Network security
Types of attacks
Passive
- Difficult to detect,
because the attacker isn’t actively sending traffic (malicious or otherwise).
- Just install the
virus and let the virus work by own.
Active
- Easier to detect
because the attacker is actively sending traffic that can be detected.
Close-in
- It occurs when
the attacker is in close physical proximity with the target system.
Insider
- Legitimate
network users leverage their credentials and knowledge of the network in a
malicious fashion.
Distribution
Intentionally
introduce “back doors” to hardware or software systems at the point or
manufacture.
How to prevent that attack
Attack class
|
Primary layer of defense
|
Secondary layer of defense
|
Passive
|
Encryption
|
Application with integrated
security
|
Active
|
Firewall at the network edge
|
Host intrusion prevention
system(HIPS)
|
Insider
|
Protecting against
unauthorized physical access
|
Authentication
|
Close-in
|
Protecting against
unauthorized access
|
Video monitoring systems
|
Distribution
|
Secured software
distribution system
|
Real- time software
integrity checking
|
Steps to protect your network
1. Implement
- Create and
implement a network security system that provides protection and has sufficient
authorization policies.
2. Analyze
- The system need
to be analyzed to determine if the current security system is appropriate for
the network it is protecting.
3. Test
- conduct test to
make sure all of the securities are working and will completely protect your
network against any threats.
4. Modify
- collect the data
and enhance your protections. The results will reveal where your security
system is effective where it can be improved.
Comments
Post a Comment