Wednesday, November 30, 2011

Nice Overview of Network Attacks

From Deb Shinder Network Encroachment Methodologies:

In this article, we will go over several of the more common network encroachment and attack methods that can be used alone, or in conjunction with each other or with additional attacks to compromise a network.


There are a number of methods that persons wishing to circumvent your network security can use in order to gain access to information. In order to protect against them, it’s important for you to understand what each is, how they work, and the threats that they present for your network. While not comprehensive, here is a list of some of the more common methods used by intruders and attackers:

  • Snooping
  • Spoofing
  • Password Compromise
  • Denial of Service Attacks
  • Man in the Middle Attacks
  • Application Level Attacks
  • Key Compromise

No comments:


Related Posts Plugin for WordPress, Blogger...