Please enable JavaScript.
Coggle requires JavaScript to display documents.
Network Threats - Coggle Diagram
Network Threats
-
Threat Actor Tools
-
Categories of attacks
Eavesdropping attack
Is when a threat actor captures and listens to network traffic. Also referred as sniffing or snooping
Data modification attack
Occur when a threat actor has captured enterprise traffic and has altered the data in the packets without knowledge of the sender or receiver.
-
Password-based attacks
Occur when a threat actor obtains the credentials for a valid user account to obtain lists of other users and network information
-
-
Compromised key attack
Occurs when a threat actor obtains a secret key that can be used to gain access to a secured communication without the sender or receiver being aware
Sniffer attack
Is an application or device that can read, monitor, and capture network data exchages and read network packets.
Malware
Types of Malware
Virus
Spreads by insterting a copy of itself into another program. After the program is run, viruses spread from one computer to another.
-
-
Trojan horse
Is a software that appers to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it
-
Ransomware
Renies access to the infected computer system or its data. Then cybercriminals demand payment to release the computer system
-
Common Networks attacks- Reconnaissance, Access, and Social Engineering
Types of network attacks
-
Access attacks
Exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information
-
-
-
-
-
-
-
-
Network attacks - Denial of Service, Buffer Overflows, and Evasion
DoS and DDoS attacks
-
-
-
DDoS attack
It originates from multiple, coordinated sources. A thread actor builds a network of infected hosts, known as zombies.
-