Question The followings are the most common security threats in networks. a. TCP
ID: 3740326 • Letter: Q
Question
Question
The followings are the most common security threats in networks.
a. TCP/IP Hijacking [5 marks]
b. Network Sniffer [5 marks]
c. Password Hackers [5 marks]
d. Server Hijacking [5 marks]
e. DoS Attack [5 marks]
You are expected to carry out an analysis and discuss on the nature of each threats by
addressing the following element like;
i. What it is all about?
ii. How can such attack/threats take place in the network?
iii. Why they do it?
iv. When normally such attack take place (i.e. any specific time of the year,time of the day)
v. Where is such attack targeted?
Explanation / Answer
a) TCS/IP Hijacking: This kind of hijacking happens when an authorized user grabs access to another user network. This kind of attacks takes place using the approach of man-in-the-middle which a type of network sniffing. THey do it grab access to the network and to ruin the data. There is no specific time to perform that attack usually this attack can take place any time, any day, any year. This attack targets the network connection of another user.
b) Network Sniffer: Network sniffer is also one kind of attack where the intruders gain access to the network and eavesdrop all the transaction. This can also happen at any time and the target of this attack is the network.
c) Password Hackers: Password hackers hack the password data and collect sensitive information of the users. These attacks occur in the networks. They perform this to obtain secret information from the users. This can also occur at any time.
d) Server Hijacking: Server hijacking is a major form of attacks where the server has been hacked and all the server data is compromised. These attacks can place at any time. In this attack, the server has been targeted.
e) DoS Attack: Denial of service attack is all about restricting a particular service to a user. These attacks are in the network. They do it to hijack the system by giving its services. This attack also occurs at any time. The targeted one is a server and the network.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.