Network Security - types of threats and attacks in network security:
1. Types of Threats in Network Security
A threat is any potential danger that could exploit a vulnerability in a network to cause harm. Threats can be intentional (like hackers) or unintentional (like system failures).
a. Passive Threats
-
Involve monitoring or eavesdropping on network traffic without altering data.
-
Goal: gather sensitive information.
-
Examples:
-
Eavesdropping on emails or chat messages.
-
Traffic analysis (observing patterns of communication).
-
b. Active Threats
-
Involve actual attacks that modify, disrupt, or destroy data or network resources.
-
Examples:
-
Unauthorized access to systems.
-
Data tampering.
-
Denial-of-Service (DoS) attacks.
-
c. Insider Threats
-
Threats originating from within the organization (employees, contractors, or partners).
-
Can be intentional (malicious) or accidental.
-
Examples:
-
Employees stealing sensitive data.
-
Accidental deletion of critical files.
-
d. External Threats
-
Threats coming from outside the organization, such as hackers or malware authors.
-
Examples:
-
Phishing attacks.
-
Cybercriminals targeting company databases.
-
2. Types of Attacks in Network Security
An attack is a deliberate attempt to exploit a vulnerability to compromise network security. Attacks are usually classified as passive or active.
A. Passive Attacks
-
Goal: gain information without affecting system resources.
-
Difficult to detect because the attacker does not alter data.
-
Examples:
-
Eavesdropping – Listening to confidential communication.
-
Traffic Analysis – Observing the flow of messages to infer patterns.
-
B. Active Attacks
-
Goal: disrupt, modify, or destroy data or services.
-
Easier to detect than passive attacks.
-
Examples:
1. Denial-of-Service (DoS) and Distributed DoS (DDoS)
-
Makes a network or service unavailable to users.
-
DDoS involves multiple systems attacking simultaneously.
-
Example: Flooding a website with traffic so legitimate users cannot access it.
2. Man-in-the-Middle (MITM) Attack
-
Attacker intercepts communication between two parties.
-
Can eavesdrop, modify, or inject data without detection.
-
Example: Intercepting messages between a bank and a customer.
3. Phishing and Social Engineering
-
Trick users into revealing sensitive information.
-
Methods include emails, fake websites, or phone calls.
-
Example: A fake email asking for your bank password.
4. Malware Attacks
-
Malicious software designed to damage, disrupt, or gain unauthorized access.
-
Types of malware:
-
Virus – Infects files and spreads.
-
Worm – Self-replicates across networks.
-
Trojan Horse – Appears legitimate but hides malicious code.
-
Ransomware – Encrypts files and demands payment.
-
Spyware/Adware – Monitors user activity or displays unwanted ads.
-
5. SQL Injection and Web Attacks
-
Exploits vulnerabilities in web applications.
-
Examples:
-
SQL Injection – Injecting malicious queries into a database.
-
Cross-Site Scripting (XSS) – Injecting malicious scripts into websites.
-
6. Password Attacks
-
Attempt to crack or guess passwords to gain unauthorized access.
-
Methods: Brute force, dictionary attacks, credential stuffing.
7. Session Hijacking
-
Attacker takes control of a user’s session to impersonate them.
-
Example: Hijacking a logged-in online banking session.