Check other parts:
- Types of Network Damage
- Why in the heck do I get attacked?
- Malware Part 1
- Malware Part 2
- Malware Part 3
- Botnets Part 1
- Botnets Part 2
I decided to start the course with the most fundamental stuff “Know your enemy” !! So this post is about the first thing that you need to know, which is what are the types of Network attacks?
Don’t under estimate this knowledge, as knowing what you are facing is the first step towards protecting your network.
Network attacks can be divided to:
- Passive Attacks: simply listening to your network traffic and may capture sensitive information, or scanning your IP ranges without doing an action.
- Active Attacks: an attacker is actively going after your protected resources and trying to get access to it, by modifying or injecting traffic.
We can also divide attacks to two categories:
- Automated Attacks: Nowadays, we have the automated attacks. The vast majority of attacks that we hear about are automated attacks, where the attacker creates a tool that attacks the network by itself. Those tools can get so intelligence.
To give a simple example, worms are the famous type of automated attacks. Those automated attacks uses vulnerability in a system and use it, so the best way of defense against those automated attacks are patching your systems and to monitor your network for suspicious events.
- Manual Attacks: the attacker is actively analyzing your network and act accordingly. Those types of attacks are much rarer and the most dangerous types of attacks.
Moving to a New Blog Platform
This post is now moved to my new blog platform at https://blog.ahasayen.com. To continue reading this blog post, please click here
References: sessions and theories from Steve Riley and Jesper Johansson