Course Hero Logo

List three different types of network attacks and

Doc Preview
Pages 23
Identified Q&As 13
Solutions available
4.List three different types of network attacks and defensivemeasures to mitigate the same. Provide an explanation of eachas part of your answer.While there are many different types of network attacks, a few can be regarded as the morecommonly performed network attacks. These network attacks are discussed in this section of theArticle:Data modification or data manipulationpertains to a network attack where confidentialcompany data is interpreted, deleted, or modified. Data modification is successful whendata is modified without the sender actually being aware that it was tampered with.A few methods of preventing attacks aimed at compromising data integrity are listedhere:oUse digital signatures to ensure that data has not been modified while it is beingtransmitted or simply stored.oImplement access control lists (ACLs) to control which users are allowed toaccess your data.oRegularly back up important data.oInclude specific code in applications that can validate data input.Eavesdropping:This type of network attack occurs when an attacker monitors or listensto network traffic in transit then interprets all unprotected data. While users needspecialized equipment and access to the telephone company switching facilities toeavesdrop on telephone conversations, all they need to eavesdrop on an Internet Protocol(IP) based network is a sniffer technology to capture the traffic being transmitted. This isbasically due to the Transmission Control Protocol/Internet Protocol (TCP/IP) being anopen architecture that transmits unencrypted data over the network.A few methods of preventing intruders from eavesdropping on the network are:Implement Internet Protocol Security (IPSec) to secure and encrypt IP data before it issent over the network.Implement security policies and procedures to prevent attackers from attaching a snifferon the network.Install anti-virus software to protect the corporate network from Trojans. Trojans aretypically used to discover and capture sensitive, valuable information such as usercredentials.
Course Hero Badge

Want to read all 23 pages?

Previewing 14 of 23 pages Upload your study docs or become a member.
Course Hero Badge

Want to read all 23 pages?

Previewing 14 of 23 pages Upload your study docs or become a member.
Course Hero Badge

End of preview

Want to read all 23 pages? Upload your study docs or become a member.