Got it

Guide HCIP Security H12 722 Content Security Threat

Latest reply: Dec 19, 2021 21:48:07 548 1 2 0 0

Hi to all my friends.

This time, I am posting the following information about security, taken from the official study material.


CONTENT SECURITY THREAT


Common Security Risks of The TCP/IP Protocol Stack


145355xn7yvb7tw7ex2tkw.png?image.png

This picture describes the main security threats.



·        Design defects of the TCP/IP protocol stack include lack of data source authentication, confidentiality guarantee, and integrity check. These defects lead to various security threats on networks on networks. In most cases, simple protocols and mechanisms can defense against security risks at lower four TCP/IP layers. However, network threats (such as viruses, Trojan horses, and system vulnerability attacks) at the application layer integrate high technologies. It is difficult to defend against these threats. Content security threats directly affect working efficiency of enterprise users, and may cause leakage of enterprise users’ confidential information. Therefore, content security protection is especially important and necessary.


145428dzelol5hopplheph.png?image.png


·        Among current risks, malicious programs (viruses, worms, bots, rootkits Trojan horses, backdoors programs, vulnerability attack programs, and malicious program in mobile devices) share a large proportion, when the influence of grayware (spyware and mobile devices) is extending. Security threats related to illegal programs have become key factors that threaten network security.

·        Currently, users are faced with not only traditional virus attacks. Network threats are often mixtures of viruses, hacker attacks, Trojan horses, zombies, spywares, and other attacks. Therefore, is difficult to defend against these network threats  using only antivirus or hacker ´prevention technologies

 

Viruses and Malicious Software Security Threats

·        With the expansion of enterprise services, more services and applications depend on IT information systems. During running, services continuously face with viruses, Trojan horses, worms, spyware, and other serious threats.

145456l9llzp8xrkv1wqyk.png?image.png


Hacker Attacks

·        Hackers and malicious employees´ in enterprises exploit system and software vulnerabilities to attack servers, threatening security of enterprises’ key service data.

Ø Let’s see the following picture, it shows how the hackers attack the system of the enterprises.

145516v3uzx04bzmxaa3gb.png?image.png


·        Server vulnerabilities cause serious security threats to the enterprises.

§  Many application software programs on enterprises intranet may have vulnerabilities.

§  The internet enables fast spreading of applications software vulnerabilities, occupying network bandwidth and damaging critical data.

§  Hackers and malicious employees on the enterprise exploit vulnerabilities to attack or intrude enterprise servers to tamper with, damage, and steal confidential business information.

 

DoS Attack

What is DoS?

·        Distributed Denial of Service (DDoS) attacks targeting economic benefits threat enterprise operation, causing more severe impacts.

145539sv92ekkfurt8hbom.png?image.png

·        DDoS Attacks:

§  Driven economic benefits, the global black industry chain formed, and a large number of botnets exist

§  Extortions, blackmails, and malicious competition may cause enterprises to suffer from DDoS attacks.

§  When DDoS attacks occur, large network bandwidth is occupied and networks break down. Resources of attacked servers are exhausted and cannot respond to normal user request. This mat even cause system breakdown and enterprise service interruption

 

Threats Caused by Lack of Security Consciousness.

·        Affect the work efficiency.

·        Threat internal networks.

·        Disclose enterprise information

 

·        P2P and IM abuse seriously affects enterprise network bandwidth and operation efficiency. If web access of employees is not controlled, the following consequences may be caused:

 

§  Malicious code is embedded into insecure links or malicious download links, making enterprises networks become botnets or be infected with viruses.

§  Employees are spoofed by phishing websites that contain spoofing information, causing leakage of confidential information such as personal bank accounts and passwords.

§  Employees are attracted by entertainment content.

§  Web pages may contain illegal content (such as ****ographic and violence information), bringing a series of legal risks to enterprises.



Comment the post and share, ind click on ♥ if the post was useful

Very interesting knowledge, thanks!
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.