3.3 THREATS TO NETWORK SECURITY
There are various threats identified for network security. Let us discuss few of them in brief:
Viruses: Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event. Viruses reproduce themselves by attaching themselves to other files that the user does not realize are infected. Viruses spread today mainly through Email attachments. The attachment may be a file that is a legitimate file but the virus may be attached as a macro program in the file. An example is a Microsoft word file. These files can contain macro programs which can be run by Microsoft Word. A virus may infect these files as a macro and when they get on the next user's computer, they can infect other files. These virus programs normally take advantage of a security vulnerability of the running application. Viruses can directly affect executable files or Dynamic
Link Library (DLL) files that the operating systems and applications use to run. Usually the virus will spread before it will do anything that may alert the user of its presence.
Unauthorized Access
“Unauthorized access'” is a very highlevel term that can refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that your machine should not provide the attacker.
Trojan Horse Programs
Trojan horse software is the software that appears to have some useful function, but some hidden purpose awaits inside. This purpose may be to send sensitive information from inside your organization to the author of the software.
To prevent Trojan horse programs from infiltrating your organization is to implement the countermeasures. Allowing only approved software with proper testing to be run in the organization will minimize the threat of these programs. The organizational security policy can help ensure that all members of the organization operate in compliance with this countermeasure.
Data interception: It involves eavesdropping on communications or altering data packets being transmitted.
Social engineering: Social engineering is concerned with obtaining confidential network security information through no technical means, such as posing as a technical support person and asking for people's passwords.
DoS (DenialofService) Attacks
DoS (DenialofService) attacks are probably the nastiest, and most difficult to address. These are the nastiest, because they're very easy to launch, difficult (sometimes impossible) to track, and it isn't easy to refuse the requests of the attacker, without also refusing legitimate requests for service. The premise of a DoS attack is simple: send more requests to the machine than it can handle.
Comments
Post a Comment