Identifying Potential Malicious Attacks, Threats, and Vulnerabilities

1132 words 5 pages
For a better understanding of the situation in the network of the company I decided to start the analysis by the vulnerabilities that this one presents. Many of these vulnerabilities are the cause for different types of network attacks. It should be noted that while many of these vulnerabilities may be mitigated or eliminated the possibility of an attack always exists.
The first vulnerability is the email server. Although very well controlled for been within the Demilitarized Zone (DMZ), this is always a vulnerability with which most companies have to deal with. This vulnerability opens the way for phishing attack. One way to mitigate this vulnerability is configuring the email server so that only authorized email may enter. This is
…show more content…
If this attack is successful, the attacker has access to the internal network of the company so in this case we can be under the three types of threat; it all depends on the intentions of the attacker. The most advisable is to change the password at least every 30 days and if possible relocating the WAP to a most protected location of the network.
Another possible attack that we can face when dealing with WAP is Address Spoofing. This attack consists of trying to seem at something that really is not. Is normally present a false network address to pretend to be an authorized machine of the system. If the WAP is not configured to filter out traffic with internal external addresses, the attack may be successful. The main objective of this attack is the destruction and / or alteration of the system and the information; although it remains the possibility of disclosure.
The last segment of analysis is the one were the users and data servers are located. The only visible attack in this area is Insider Attack. This type of attack is usually carried out by disgruntled or corrupt employees to take advantage of a situation. Although on a smaller scale, is always present in all companies and is more difficult to detect because the attacker has access to the system without having to perform any suspicious operation.
Eavesdrop, steal, or damage information, use information in a fraudulent manner, and deny accesses to other

Related

  • How Real Is the Terrorist Threat
    1635 words | 7 pages
  • Cmgt 400 Week 2 Common Information Security Threats
    1028 words | 5 pages
  • An Essay on Denial of Service Attack
    1005 words | 5 pages
  • terrorist threat to commercial sector
    1678 words | 7 pages
  • Chemical Attack
    3120 words | 13 pages
  • Modern Day Attacks Against Firewalls and Vpns
    2432 words | 10 pages
  • A Day Not Forgotten, the Attack on Pearl Harbor
    1977 words | 8 pages
  • Ryanair: Its Vulnerability and Exposure to the Macroeconomic Environment
    2129 words | 9 pages
  • Web Server Application Attacks
    1667 words | 7 pages
  • Vulnerability Assesment
    1738 words | 7 pages