In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes.
Inhaltsverzeichnis (Table of Contents)
- INTRODUCTION
- RELATED WORK
- NETWORK SECURITY THREAT MODELS
- FLOODING
- PHISHING
- DOS (Denial of service attacks)
- Data interception and theft
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This technical report explores the various threats and attacks facing network security in the age of global connectivity and e-commerce. The document aims to provide an overview of common network security vulnerabilities and to guide readers in developing security measures to prevent attacks.
- Common network security threats and attacks
- Vulnerabilities in typical network components
- Real-life scenarios and causes of network attacks
- Classification of network attacks
- Security measures to prevent network attacks
Zusammenfassung der Kapitel (Chapter Summaries)
- INTRODUCTION: The chapter introduces the topic of network security threats and attacks in the context of increasing global connectivity and e-commerce. It highlights the vulnerability of systems and the potential for malicious actors to exploit these vulnerabilities.
- RELATED WORK: This chapter reviews existing research on network security threats, focusing on classifications of attacks and mitigation techniques. It discusses various attack types, including passive, active, distributed, insider, and close-in attacks. Additionally, it examines attacks at the infrastructure level, such as cloud attacks, DDoS attacks, and router attacks.
- NETWORK SECURITY THREAT MODELS: The chapter discusses various threat models, including flooding, phishing, denial of service (DoS) attacks, and data interception and theft. It explores the mechanisms behind these attacks and the potential vulnerabilities they exploit.
Schlüsselwörter (Keywords)
The key topics and concepts explored in this technical report include network security threats, attacks, vulnerabilities, mitigation techniques, flooding, phishing, denial of service attacks, data interception, and theft. The report also discusses various attack classifications, such as passive, active, distributed, insider, and close-in attacks, as well as infrastructure-level attacks targeting cloud systems, routers, and DDoS attacks.
- Quote paper
- Santosh Malhotra (Author), Amit Kumar (Author), 2018, Survey on Network Security Threats and Attacks, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/445068