Network attack can be defined as an attempt to breach the security of a computer network in order to gain unauthorized access to the targeted device or exploit the vulnerabilities in the software applications. Without proper security measures, your network is vulnerable to different types of security threats, eventually causing it to crash. A network attack can either be passive (wherein the hacker may simply monitor and steal data stored on the computer) or passive (in which the information may be altered or destroyed).
Given below are some of the common types of network attacks:
IP Spoofing
A corporate or home network uses the IP address of a device to identify its entity and allow access. In a spoofing attack, the hacker may use a forged IP address to breach into a network in the guise of a legitimate user. He may alter, delete or destroy the data being shared in the network. He may also modify the source of the data packets so that they appear to be originating from another computer on the same network.
Sniffing
Network sniffing is the process of monitoring, capturing and intercepting the data packets traveling through an internet network. If the data is not properly encrypted and sent as cleartext, it can be easily read by the hacker. On the other hand, an encrypted data packet cannot be accessed unless the hacker has the key to open it.
Buffer Overflow
A buffer overflow attack occurs when the target computer receives more data/traffic than it is capable to hold, thus creating a lot of temporary files that overwrite the already existing valid data. The excess files usually contain a malicious code designed to carry out specific actions, such as deleting files, altering data or transmitting confidential information to the hacker.
Man In The Middle Attack
This is a form of session hijacking attack in which the hacker actively monitors, captures and controls the flow of information between the source as well as the destination computer on a network. The attack may be simply aimed at getting access to the information being shared or modifying it before being transmitted to the other end. In some forms of man in the middle attacks, the hacker may even disconnect the other user and completely take over the session to acquire sensitive information.
Centex Technologies is a leading IT company providing network security solutions to the business firms in Dallas, TX. For more information, feel free to call us at (972) 375 – 9654.