From Deb Shinder Network Encroachment Methodologies:
In this article, we will go over several of the more common network encroachment and attack methods that can be used alone, or in conjunction with each other or with additional attacks to compromise a network.
Introduction
There are a number of methods that persons wishing to circumvent your network security can use in order to gain access to information. In order to protect against them, it’s important for you to understand what each is, how they work, and the threats that they present for your network. While not comprehensive, here is a list of some of the more common methods used by intruders and attackers:
- Snooping
- Spoofing
- Password Compromise
- Denial of Service Attacks
- Man in the Middle Attacks
- Application Level Attacks
- Key Compromise
No comments:
Post a Comment