Types of network security threats: Malware, DoS attacks, etc.
🦠 1️⃣ Malware (Malicious Software)
Malware refers to any software intentionally designed to cause damage to a network, system, or device.
- Types of Malware:
- Viruses: Attach to files and spread when executed.
- Worms: Self-replicate and spread without user interaction.
- Trojans: Disguise as legitimate software to trick users.
- Spyware: Secretly monitors user activity and steals information.
- Ransomware: Encrypts data and demands payment for decryption.
- Adware: Displays unwanted ads, sometimes with hidden malware.
- How It Spreads:
- Infected email attachments, downloads, malicious websites, USB drives.
- Prevention:
- Use antivirus software, keep systems updated, avoid clicking suspicious links.
🌊 2️⃣ Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
These attacks flood a network or server with excessive traffic, making services unavailable to legitimate users.
- Types of DoS/DDoS Attacks:
- Volumetric Attacks: Overwhelm bandwidth (e.g., UDP floods).
- Protocol Attacks: Exploit weaknesses in network protocols (e.g., SYN floods).
- Application Layer Attacks: Target web apps (e.g., HTTP floods).
- Prevention:
- Use firewalls, rate limiting, and DDoS protection services like Cloudflare or AWS Shield.
🕵️ 3️⃣ Man-in-the-Middle (MitM) Attacks
Attackers secretly intercept and potentially alter communications between two parties.
- Common MitM Techniques:
- Session Hijacking: Stealing session tokens to gain unauthorized access.
- Eavesdropping: Listening to unencrypted data transmission.
- SSL Stripping: Downgrading secure HTTPS connections to HTTP.
- Prevention:
- Use end-to-end encryption (SSL/TLS), secure Wi-Fi, and VPNs.
💉 4️⃣ SQL Injection (SQLi)
Attackers insert malicious SQL queries into input fields to manipulate databases.
- Impact:
- Unauthorized data access, data modification, or deletion.
- Example:sql
' OR '1'='1';
- Prevention:
- Use prepared statements, parameterized queries, and input validation.
🕳️ 5️⃣ Zero-Day Exploits
Attacks that target vulnerabilities in software before developers release a fix.
- Why Dangerous:
- No known defense exists at the time of the attack.
- Prevention:
- Apply security patches promptly, monitor for unusual activity, and use threat intelligence tools.
📧 6️⃣ Phishing & Social Engineering
Tricks users into revealing sensitive information by pretending to be a trustworthy entity.
- Types of Phishing:
- Email Phishing: Fake emails with malicious links or attachments.
- Spear Phishing: Targeted attacks aimed at specific individuals.
- Whaling: Targets high-level executives.
- Smishing/Vishing: Phishing via SMS (smishing) or voice calls (vishing).
- Prevention:
- Educate users, verify suspicious requests, and implement email filters.