Lagos, Nigeria

Top 5 things to know about network attacks

DDoS, SQL injection and man-in-the-middle are just a few of the attacks that can compromise your network. Tom Merritt lists five things to know about network attacks.

Your network needs to be accessible–it’s how your business operates and how your company’s workflow stays efficient. Your network also needs to be closed off from the bad folks.

Network attacks are on the rise. Sometimes intruders want to steal data, sometimes they just want to cause havoc (possibly to get you to pay a ransom) and other times they don’t even want you to know they’re there–they just want to spy. Whatever they’re up to, you don’t want them there. Here are five things to know about network attacks.

SEE: Social engineering: A cheat sheet for business professionals (free PDF) (TechRepublic)

  1. Distributed denial of service attacks (DDoS). An oldie, but a goodie, that doesn’t even need to get into your network to have the desired effect. Whether it’s flooding your server with packets or forcing your databases to perform complex SQL queries, it can bring your network to its knees.
  2. Stolen accounts. This is the one most people think about. The attackers either get into an account or figure out how to create one. This can be caused by weak passwords that get brute forced or social engineering like a phishing scheme that unwittingly hands over access. Privilege escalation builds on this by elevating what an account can do.
  3. SQL injection attacks. Malicious code is used to exploit a vulnerability in your code to access or damage your data. It’s a juicy target with so much software still operating on SQL queries. Keep your accounts patched and don’t share databases between websites.
  4. Man-in-the-middle attacks. Whether the attacker is in your network or not, if encryption isn’t end-to-end, they can intercept traffic. That means they can possibly hijack sessions and obtain user credentials.
  5. Insider threats. These are hard. Somebody you trusted didn’t deserve that trust and abused their access. You need some kind of behavior analytics to detect suspicious user behavior to defend against the insider.

Knowing is half the battle, so just knowing about threats like these gets you part way to making your network more secure–you know, when you do something about it.

Subscribe to TechRepublic Top 5 on YouTube for all the latest tech advice for business pros from Tom Merritt.

Also see 

Internet and online network security system. Laptop computer with lock icon on screen and application programming interface icons

Image: Getty Images/iStockphoto

This post was written by and was first posted to TechRepublic

Do you find this article helpful? Your Friend might too. So, please Share it with them using the Share button above.
Will you like to get notified when I post new updates? Then Follow me on any of my social media handles: Google News, Telegram, WhatsApp, Twitter, Facebook, Pinterest.
You can also drop your email address below if you wish to be notified by mail.

Tags: ,

%d bloggers like this: