Common network based attacks (4)
What is an eavesdropping attack?
An eavesdropping attack, also known as network sniffing, occurs when a hacker captures network packets that workstations connected to your network send and receive.
Eavesdropping attacks can compromise your organization’s sensitive data, such as passwords, which can lead to other, more damaging attacks.
What is a denial of service (DoS) attack?
This is a type of attack that limits the function of a network app, or renders an app or network resource unavailable.
Hackers can initiate a DoS attack in several ways, and often are aware of vulnerabilities in the target app that they can exploit to render it unavailable. Hackers typically perform Dos attacks by overloading a service that replies to network requests, such as Domain Name System (DNS), with a large number of fake requests in an attempt to overload and shut down a service or the server that hosts the service. A distributed denial of service (DDoS) attack is a version of a DoS attack.
How can you tell if an email is legitimate?
What are some examples of cyberattacks?
What’s is a Port scanning attack?
This is an attack where hackers exploit a network to query hosts for open ports on which they listen for client requests and use other attack techniques to access the services that are running on the computer.
What is a Man-in-the-middle (MITM) attack?
This is an attack where the attacker uses a computer to impersonate a legitimate host on the network with which your computers are communicating.
Notes:
The attacker intercepts all of the communications that are intended for a destination host. The attacker might wish to view the data in transit between the two hosts, but also can modify that data before forwarding the packets to the destination host.
What are some of the types of malware
What are some of the ways to help prevent cyberattacks?
How can a hacker get someone’s password?
What is a strong password?
Name the types of cyber security threats (MAPRIS)