Got it

Topic discussion | Network attacks you have encountered Activity

Latest reply: Aug 11, 2021 21:30:16 3209 39 16 0 1

Hello everyone,


Network security has always been the top priority of the Internet. The rapid development of network technology, not only brings convenience to people but also makes network security risks more and more serious. 


Launching network attacks has become easier and cheaper, and the impact caused by them is getting bigger and bigger. Common network attacks in life are Trojan horse, DDoS attack, ARP attack, phishing, etc.


Network-attacks


In this topic discussion, let’s talk about the network attacks that you have encountered and how to prevent these attacks.


  • x
  • convention:

wissal
wissal Created Aug 2, 2021 08:02:21 (0) (0)
Thank you, my friend  
Unicef
Unicef Created Aug 2, 2021 08:22:54 (0) (0)
 
andersoncf1
andersoncf1 Created Aug 2, 2021 12:23:39 (0) (0)
 
user_4326135
user_4326135 Created Aug 3, 2021 07:28:31 (0) (0)
 
smileymind
smileymind Created Aug 4, 2021 04:39:33 (0) (0)
 
shakeela
shakeela Created Aug 4, 2021 18:04:59 (0) (0)
 
shakeela
shakeela Created Aug 4, 2021 18:05:05 (0) (0)
 
Serges_armel
Serges_armel Created Aug 4, 2021 18:44:17 (0) (0)
 
nochhie
nochhie Created Aug 6, 2021 04:53:22 (0) (0)
 
Whether via the spread of malware, spyware or viruses, insiders can do as much damage as outside attackers, 10 ways to prevent computer security threats from insiders.

1. Security policy first
2. Don't neglect physical security
3. Screen new hires
4. Use strong authentication
5. Secure your desktops
6. Segment LANs
7. Plug information leaks
8. Investigate anomalous activities
9. Refocus perimeter tools and strategies
10. Monitor for misuse

It's not just malicious actors, either. Employees can unwittingly sabotage systems and create computer security threats through sheer ignorance. Simple mistakes such as clicking rigged links in emails, messaging apps and advertisements invite hackers to surveil companies and organizations with massive consequences.
View more

Rating

Number of participants 1HiCoins +5 Collapse Reasons
DDSN DDSN + 5 Good!

View All scores

  • x
  • convention:

DDSN
DDSN Created Aug 3, 2021 09:32:48 (0) (0)
What you said makes sense, the strongest castles were breached from the inside.  
Network security typically consists of three different controls: physical, technical and administrative. Here is a brief description of the different types of network security and how each control works.

Physical Network Security
Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.

Technical Network Security
Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network. Protection is twofold; it needs to protect data and systems from unauthorized personnel, and it also needs to protect against malicious activities from employees.

Administrative Network Security
Administrative security controls consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure
View more

Rating

Number of participants 1HiCoins +5 Collapse Reasons
DDSN DDSN + 5 Good!

View All scores

  • x
  • convention:

DDSN
DDSN Created Aug 3, 2021 09:35:24 (0) (0)
Has your network been attacked, like phishing emails?  
Unicef
Unicef Reply DDSN  Created Aug 3, 2021 12:28:10 (0) (0)
Yes for sure, at my work place was phishing mail 33% among all.
Note: it was testing by IT security team  
nochhie
nochhie Created Aug 6, 2021 04:53:31 (0) (0)
 
hemin88
Moderator Author Created Aug 2, 2021 10:25:45

Network attacks includes:

Denial of Service (DoS) attack
Distributed Denial of Service (DDoS) attack
SYN attack
Sniffer Attack
Man-In-The-Middle (MITM) attack
IP Address Spoofing Attack
ARP (Address Resolution Protocol) Spoofing Attacks or ARP flooding or ARP poisoning
DNS (Domain Name System) Spoofing Attacks
Phishing and Pharming attacks
Backdoor Attacks
Password Guessing Attacks, Brute Force Attack, Dictionary Attack
SQL injection attacks


To defense these attacks, I have posted an article about it:
https://forum.huawei.com/enterprise/en/defense-against-network-attack/thread/743713-867




View more

Rating

Number of participants 1HiCoins +5 Collapse Reasons
DDSN DDSN + 5 Good!

View All scores

  • x
  • convention:

DDSN
DDSN Created Aug 3, 2021 09:34:24 (1) (0)
I've read it.  
hemin88
hemin88 Reply DDSN  Created Aug 3, 2021 13:05:59 (0) (0)
appreciate it  
zaheernew
MVE Author Created Aug 2, 2021 17:08:58

VA and Penteset
View more
  • x
  • convention:

Saqib123
Saqib123 Created Aug 2, 2021 17:12:47 (0) (0)
 
thanks
View more
  • x
  • convention:

My experience - Insider threats Top 4 real world insider threats are:

-1- Complacency or "good intentioned" insiders - bypassing security policies in order to expedite a task.(we have all done it ) but many times these one time use emergency tasks that should be approved by security and done under the table and become the unwritten SOP for departments.

-2- A non-technical VIP being granted higher level permissions then needed, and to be blunt a dangerous level of permissions for their skill level, leading to security policies violations , leading to a compromise. a common example is a PM managers being granted full System admin rights to his departments email, SharePoint, database servers, etc. If his/her account is compromised the company network is at high risk.

-3- Management overriding good security practices to complete a task due to project resource or time limitations. This will almost always lead to a repeated violations, and adds risk to the security of the organization.

-4- The number one security threat that I have seen over the last 15 year in Cyber security is :
Misuse ( abuse) of elevated accounts. largely from lower level techs using admin accounts to perform lower level functions. an example : NEVER go to the internet while logged into a device with an admin account.

View more

Rating

Number of participants 1HiCoins +5 Collapse Reasons
DDSN DDSN + 5 Good!

View All scores

  • x
  • convention:

DDSN
DDSN Created Aug 3, 2021 09:37:28 (0) (0)
So we should keep the super account password safe. Avoid loss and leakage. The administrator must change the password periodically to ensure password security.  
Agreed DDSN,

Thank you for making the additional comment.
View more
  • x
  • convention:

nice topic
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.