- A network security breach is also known as a security violation.
- It is any incident that results in unauthorized access to data, applications, services, networks or devices through their underlying security mechanisms.
- This occurs when illegally user or application can access a private, confidential or unauthorized IT perimeter. Once they can access the network, they can steal data, compromise software or install viruses.
2. Two examples of Network Security breach
- Phishing
- Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials and more.
- It is fraudulent use of electronic communications to deceive and take advantage of users.
- By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions - like clicking on a malicious link or attachment - or willfully divulging confidential information.
- Types of Phishing Attacks:
- Spear Phishing
- Clone Phishing
- Whaling Phishing
- Prevention Steps:
- To prevent Phishing attacks, organizations should educate employees on how to recognize suspicious emails, links and attachments.
- Never entertain unsolicited emails, calls or SMSs.
- Your bank will never ask you for confidential information via emails, calls or texts. If you do receive any such communication, report it to your bank.
- Avoid accessing websites via links in email messages, especially those asking for personal information. It is always safe to type the URL manually into the web browser.
- Do not fill any kind of form that comes along with an email.
- Denial of service (DDoS attacks).
- It is occur when a website is overwhelmed with requests, which blocks other users from the site.
- E.g. GITHUB: 1.35 TBPS on 28th February 2018.
- They have doubled their transit capacity to withstand certain number of attacks.
- Prevention Steps:
- Buy more bandwidth (not an actual solution).
- Configure your network hardware (e.g. firewall and router).
- Protect the DNS server by building redundancy in the system (spread the data center far away and connected to different networks).
References:
No comments:
Post a Comment