Monday, October 7, 2019

Network Security

1. What are Network Security breaches?
  • A network security breach is also known as a security violation.
  • It is any incident that results in unauthorized access to data, applications, services, networks or devices through their underlying security mechanisms.
  • This occurs when illegally user or application can access a private, confidential or unauthorized IT perimeter. Once they can access the network, they can steal data, compromise software or install viruses. 
2. Two examples of Network Security breach
  • Phishing 
    • Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials and more.
    • It is fraudulent use of electronic communications to deceive and take advantage of users.
    • By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions - like clicking on a malicious link or attachment - or willfully divulging confidential information.
    • Types of Phishing Attacks:
      • Spear Phishing
      • Clone Phishing
      • Whaling Phishing
    • Prevention Steps:
      • To prevent Phishing attacks, organizations should educate employees on how to recognize suspicious emails, links and attachments.
      • Never entertain unsolicited emails, calls or SMSs.
      • Your bank will never ask you for confidential information via emails, calls or texts. If you do receive any such communication, report it to your bank.
      • Avoid accessing websites via links in email messages, especially those asking for personal information. It is always safe to type the URL manually into the web browser.
      • Do not fill any kind of form that comes along with an email. 

  • Denial of service (DDoS attacks).
    • It is occur when a website is overwhelmed with requests, which blocks other users from the site.
    • E.g. GITHUB: 1.35 TBPS on 28th February 2018.
      • They have doubled their transit capacity to withstand certain number of attacks.
    • Prevention Steps:
      • Buy more bandwidth (not an actual solution).
      • Configure your network hardware (e.g. firewall and router).
      • Protect the DNS server by building redundancy in the system (spread the data center far away and connected to different networks).
References:

  • Forcepoint. (2018). What is Phishing?. [online] Available at: https://www.forcepoint.com/cyber-edu/phishing-attack [Accessed 9 Oct. 2019].
  • Google.com. (2019). how to prevent phishing attack - Google Search. [online] Available at: https://www.google.com/search?q=how+to+prevent++phishing+attack&rlz=1C1LENP_enBN725BN726&sxsrf=ACYBGNQeAixozqKMuIFkpfTLIj1e-cxSmA:1570665414083&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiR18TQsJDlAhXBLI8KHVq2ArEQ_AUIEigB&biw=712&bih=772#imgrc=ayYsxVVvlieFqM: [Accessed 9 Oct. 2019].
  • profile, V. (2017). Tips to Identify and Avoid Phishing Scams. [online] I-techgeeks.com. Available at: https://www.i-techgeeks.com/2017/10/tips-to-identify-and-avoid-phishing-scams.html [Accessed 9 Oct. 2019].



No comments:

Post a Comment