Question2 The followings are the most common security threats in networks. a. TC
ID: 3718954 • Letter: Q
Question
Question2 The followings are the most common security threats in networks. a. TCP/IP Hijacking b. Network Sniffer c. Password Hackers d. Server Hijacking e. DoS Attack [5 marks] [5 marks] [5 marks] [5 marks] [5 marks] You are expected to carry out an analysis and discuss on the nature of each threats by addressing the following element like; i. What it is all about? ii. How can such attack/threats take place in the network? iii. Why they do it? iv. When normally such attack take place (i.e. any specific time of the year, time of the day) v. Where is such attack targeted?Explanation / Answer
Answer)
TCP/IP Hijacking:
It is the most dangerous technique to get the access to internet services.
For this threat and attack to take place in the network the intruder needs to gather the information about the current value of the identifiers of the TCP packet for that specific telnet. So as make the intruder packet valid intruder tries to send the packet from hosts which are internet connected.
They do it to fetch the confidential information and access the server from the trusted hosts even without the authentication and authorization process.
Such attacks can take place at any time.
R-Service Program gives the attacker the chance to make an unauthorized entry.
Network Sniffer:
It is defined as a s/w which sniffs and keeps an eye on the data which is flowing in the computer n/w.
They intend to take screen shot copies of the data’s without modifying it.
The target is with the TCP/IP Packet and other network protocol at lower level with Ethernet frames also.
This happens mostly during the traffic time and can control the interface as well.
Password Hackers:
When an individual without any prior knowledge of the password makes a gateway to connect to the system and gain access is called password hacking. It can happen when the passwords are weak. These attacks can happen at an point of time but mostly when the given password is weak enough to be hacked. This is mostly targeted in hospitals, officials etc where there are confidential information.
Service Hijacking:
The attacker gets all the access to the user’s credentials and can keep an eye on the user’s activities, manipulate the data, provide false information, redirect the user, etc.
This takes place mostly in cloud based network.
The hacker doesn’t look for any specific time to hack but a secure time to hack the system before manipulating the data.
This is targeted mostly in bank and business organization where data’s are saved to the cloud.
Dos Attack:
Denial of service attack which makes the system unavailable on a temporary basis or indefinitely disrupts the services to the internet.
This attack takes place by flooding the target machine by requests to overload the system.
The most targeted areas are bank, credit card gateways, activism etc.
Can happen when the user is detected using the system.
All of the above are meant to hack a system to capture the confidential or personal information from one’s PC.
Hope this answer helps. :) Happy to help.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.