Network-based security attacks on Internet users

Network-based security attacks

The network is a collection of nodes connected to each other. These nodes can be a computer or computing devices (such as mobile devices and PDAs), peripheral devices (such as printers, scanners), other networks (connected via bridges or routers), or any service (such as directory service, mail service). , etc. As the rise of networks has brought the whole world together in a network called the Internet, we have also come together with many new problems. These are due to the malicious activity of people who, intentionally or not and with or without profit, try to harm us. To be protected and safe it is necessary to understand how they act. This little note will help you understand these attacks.

Types of attack –

Network-based security attacks can be classified as follows. This list is based on a server, a user who accesses the data on the server, and the data the server contains.

1. Attack on availability – make part or all of the network unavailable to users. Distributed Denial of Service (DDOS) is one of the best examples of network attacks. In this, the server gets clogged in such a way that the server starts denying services to legitimate users.

2. Attack on confidentiality – unauthorized access to any data. It can be active or passive. Eavesdropping is one of the best examples of this type of attack. This network line is intercepted or accessed.

3. Attack on integrity – attack confidentiality and then modify any part or all of the data. One of the most famous attacks in this category is to change the secure HTTP content by using some local proxy.

4. Attack on authenticity – create data and send it to users posing as authentic. Nowadays, a very famous spam technique called scams is fooling users all over the world. In this an email is sent that is believed to have been sent from any authorized bank. The email requests a data request and gives a link that seems authentic in the text of the url. The url can be like http://www.xyzbank.com/register/user.php but the url is something like [http://221.211.2.222/.http://www.xyzbank.com] which is incorrect. Many users get trapped by these scammers.

5. Access control attack – impersonate a genuine user and use all resources provided to that user. It is very common, sometimes active, sometimes passive, many users try to break into server computer and also many hackers got access to computers from defense labs to PCs. A new case of this is the use of robots. These are small programs that were entered into the victim’s computer. These programs are capable of taking commands from the network and then executing them on the victim’s computer. A group of adolescents has been infected, since they disintegrate in the computers of the ICU of a hospital and damage the vital schedules of the same.

6. Attack on privacy – Gain access to the user’s computer and spy on its use and then sell this information to many commercial bodies, so they can target their customers. Now it is becoming one of the most common attacks. Spyware gets installed on the victim’s computer and all the browsing information is uploaded to some desired marketing site. This is then used as a weapon of mass publicity.

How to protect our data

There is no panacea solution for this. A security best practice can help. Some attacks can be reduced by using software and others by being careful.

Handle your mail carefully – whenever you receive a mail related to – provide any vital information like account number. and password, don’t jump to any conclusions. Send the responsible authority a copy of that mail and get what you have to do. Verify that the provided link and the typed URL text are the same. If you find anything fraudulent, immediately contact the police or the responsible certificate authority.

When you are about to buy something over the Internet, make sure that the seller is certified by a CA (certifying authority) like VeriSign or any other recognized CA in your country. Also read the certificate and check if the certificate is not invalid and is not invoked by the CA.

Software that can help you

There are many free programs and patches for vulnerabilities available. It is best to have a good virus scanner like the AVG Free Virus Scanner, which runs on your computer in real time. You should also know that the virus scanner works on the basis of currently available viruses, so any old virus scanner will not find newly created viruses. To do this, you must install updates from time to time.

In addition to virus scanners, there are many other programs that work against network-based security attacks. I won’t give any software names, but I will give you types of software that can be used. You can find them at http://www.download.com.

firewall – There are many types of firewalls that can be run, but here we are concerned with proxy-based firewalls. Such a firewall sets up a proxy server on your computer, this proxy scans all outgoing requests and incoming responses from your computer. This way they block any unauthorized access to your computer.

spyware sweeper – Spyware can be small software installed on your computer or a cookie-based online spy on your system. A spyware sweeper first looks for all possible locations of spyware, such as cookies, your system registry, the Windows startup folder, and the system root. After finding that, they ask what action they should take like removing, protecting or blocking such spyware. If you browse the Internet using low-security software such as Internet Explorer, it is highly recommended that you use a spyware detector.

network block – even if your computer is secure and has viruses – Spyware free, another computer connected to your computer network can set them up. This can be cured by using network jammers. This is a firewall software that runs in real time and notifies you of all LAN-based packets arriving on your system. Such software also gives you the ability to unblock some parts of your network.

conclusion

Finally, I can say that never curse others who damaged your computer or information, curse yourself for not being able to block them.

“If you don’t actively attack them, they will actively attack you.”

Be careful, stay up to date and know all the moves of your opponents (malware) even before they have taken a step. If you want to be a simple user of a web-based system, you are also a candidate to be a victim. A smart move can frustrate your opponents and help you stay unscathed in a swamp of malware.

Leave a Reply

Your email address will not be published. Required fields are marked *