DCN-Unit III
DCN-Unit III
Unit-III
Security Vulnerabilities and Threats
All data breaches and cyber-attacks start when a threat exploits weaknesses in your infrastructure. As a result,
your network security vulnerabilities create opportunities for threats to access, corrupt, or take hostage of your
network.
Any potential danger to your network must be considered a network security threat – however, security
risks often begin with your infrastructure and its security.
1. Viruses
Viruses are malicious programs written to change the way your software or computer system operates. They are
designed to spread between hosts, from one computer to another – if one computer in your network becomes
infected, your entire network is at risk.
Often, this malicious software is a result of the user downloading infected application files. The subsequent
infected code can spread throughout the system and completely alter the system operations
Viruses are most commonly downloaded from:
Email attachments, Internet advertisements, Updating software and programs, Infected software, Malicious
websites, Pirating music, movies, and software
Viruses are cybersecurity threats that will typically threaten your network when there are vulnerabilities to
exploit. This includes using outdated antivirus software, or a lack of anti-spyware, firewalls, and backup
systems.
Without adequate security measures, your network is consistently open to threats and vulnerabilities that may:
Damage or disable programs, Copy your passwords and send them back to their sender/creator, Create
fake traffic in your network leading to massive downtime, Take over your computers’ processing power and
memory
Security Vulnerabilities and Threats
2. Insider Threats
Insider breaches typically occur as a result of actions from employees, former employees,
or contractors.
Although some of these breaches can occur from malicious attacks by employees,
approximately 64% of insider threats are a result of employee negligent behavior or human
error.
In order to block potential security threats within small businesses, business owners must
establish a strong culture of security awareness in their organization.
This includes creating employee cybersecurity policies, security threat training, and the
implementation of additional security software to ensure that threats are identified and
stopped before a potential breach occurs.
Security Vulnerabilities and Threats
3. Spyware
Spyware is the malicious software (malware) that is designed to spy on your activities.
These programs embed deep into your computer files and programs, collecting sensitive
information, including passwords, financial information, and employee identifications.
Like worms and viruses, spyware slows down your bandwidth and takes over other
computing resources. It is categorized into Trojans, Adware, and tracking cookies.
Trojans are the seemingly legitimate programs that may be downloaded for your critical
business functions. However, these programs may carry embedded malware that breaches
security and clones sensitive data.
Conversely, Adware is the malicious and unsolicited advertising that shows us pop-ups on
your computer or mobile device. Clicking on these advertisements allows the advertiser to
track your online activities – additionally, it slows down your computer and can open the
door for future attacks.
Security Vulnerabilities and Threats
4. Ransomware attacks
Ransomware, much like viruses and worms, can replicate itself across the network. This
malicious program has the ability to lock you out of your computer applications, or
alternatively, out of your entire computer system until a stated ransom demand is met.
One of the ways Ransomware gets into your network is through phishing and spam
attachments that can automatically open on your computer. This network security
threat encrypts your files, computer, or network – if this escalates, your computer files can
no longer be opened without a program key. The key is only granted when the attacker is
paid.
5. Phishing attacks
Phishing is one of the most common network security threats where a cyber-threat gains
access to your sensitive information through a social engineering scheme, and is often
disguised as a fake email from a recognizable source. By clicking on it, you may
inadvertently share your credentials and other critical data.
Occasionally, the attackers may send Ransomware or a worm through these emails, linking
to a website that has the ability to harvest sensitive or encrypted information. A weak email
security structure is the most significant vulnerability exploited by phishing scammers.
Security Vulnerabilities and Threats
6. Rogue security software
This software misleads users into believing that there is a malicious attack on your network. As a
form of ransomware, rogue security software often convinces users to pay a fee to have their
network cleared of the false “attack.”
These programs will also offer to clean up your system using a fake antivirus software. Once this
is downloaded, you may end up installing malware on your computer.
7. DOS and DDOS attack
A denial-of-service DDoS attack happens when a threat overwhelms your network resources with
traffic, preventing users from accessing crucial applications. A DOS attack eventually takes down
your network through:
Excessive amounts of false traffic directed to your network address (Buffer overflow)
Multiple and fictitious connection requests to your server (SYN flood)
Confusing data routing in your network, causing it to crash (Teardrop attack)
DOS attacks don’t steal or damage your data. Instead, they aim to cause massive downtimes and
extensive damage to your quality of service.
A DDOS or distributed denial of service attack is a DOS attack that happens through the use
of several devices in your network. The damage scope in a service DDOS attack is broader, given
Security Vulnerabilities and Threats
8. Rootkit
A rootkit is a threat in the form of computer software that is designed to give the attackers
unauthorized remote access to your computers and network. Rootkits work subtly, copying
passwords and disabling antiviruses until it is completely through to your network.
A rootkit can arrive in your system through legitimate software. This malicious software
can make its way into your network when you install the software and cause
severe cybersecurity risks.
9. SQL Injection attacks
SQL injection is among a form of network security threats where the attacker sends
information to websites or web applications that are overlooked by other security
measures. The attackers are then able to delete, modify, or add data into your SQL
database. SQL attacks affect websites and web apps that use an SQL database.
The attack compromises individual machines, but can also affect the entire network. SQL
and other injection flaws happen when there is insufficient or unreliable scanning of data
in the database query.
Security Vulnerabilities and Threats
10. Man-in-the-middle attacks
This is a vulnerability that allows attackers to spy on or alter the communication between
devices in your network. A man-in-the-middle attack could lead to the installation of viruses,
warms, or Ransomware. Cybercriminals can carry out MITM through:
IP spoofing, DNS spoofing, HTTPS spoofing ,SSL hijacking, Wi-Fi hacking, Machine
learning
11. Hidden backdoor programs
A computer device manufacturer or software designer can develop tools to allow your system
to be accessed via a backdoor. Usually, this is for use in technical support and diagnostic
purposes. However, attackers can take advantage of this vulnerability to access your computer
and networks illegally.
12. Superuser accounts
Superuser accounts can turn into network vulnerabilities. These accounts have unlimited
privileges, data, and devices and are often used for administrative purposes by IT team
leaders.
The user can create, modify, and delete files, install software, or copy information. If a
cybercriminal gets hold of such an account, the damage to your network and your business
Classification of Security Services
Classification of Security Services
1. Message confidentiality
It means that the content of a message when transmitted across a network must remain
confidential, i.e. only the intended receiver and no one else should be able to read the
message.
The users; therefore, want to encrypt the message they send so that an eavesdropper on the
network will not be able to read the contents of the message.
2. Message Integrity
It means the data must reach the destination without any adulteration i.e. exactly as it was
sent.
There must be no changes during transmission, neither accidentally nor maliciously.
Integrity of a message is ensured by attaching a checksum to the message.
The algorithm for generating the checksum ensures that an intruder cannot alter the
checksum or the message.
Classification of Security Services
3. Message Authentication
In message authentication the receiver needs to be .sure of the sender’s identity i.e. the receiver has to make
sure that the actual sender is the same as claimed to be.
There are different methods to check the genuineness of the sender :
1. The two parties share a common secret code word. A party is required to show the secret code word to
the other for authentication.
2. Authentication can be done by sending digital signature.
3. A trusted third party verifies the authenticity. One such way is to use digital certificates issued by a
recognized certification authority.
4. Message non-reproduction
Non-repudiation means that a sender must not be able to deny sending a message that it actually sent.
The burden of proof falls on the receiver.
Non-reproduction is not only in respect of the ownership of the message; the receiver must prove that the
contents of the message are also the same as the sender sent.
Non-repudiation is achieved by authentication and integrity mechanisms.
5. Entity Authentication
In entity authentication (or user identification) the entity or user is verified prior to access to the system
resources .
Encryption principles