Potential Malicious Attacks, Threats, And Vulnerabilities

Read Complete Research Material



Potential Malicious Attacks, Threats, and Vulnerabilities

Potential Malicious Attacks, Threats, and Vulnerabilities

Introduction

The network of any Organization or firm has an essential part to play in the management of both the information and the communication system of that Organization. Hence, a network is vital for establishing, running and maintaining an internal communication system within the Organization. However, it is important to note that the network in any Organization is vulnerable to various threats from both within and outside. Therefore, an assessment of the possible threats is essential to deal with them accordingly and preventing the possible damage to the network.

Discussion

Assessment of Potential Malicious Attacks and Threats to the Network

With the introduction and development of different security tools for ensuring the network security and reliability, there also has been observed constant development in the technology to breach these security measures. Therefore, any Organization with a data to protect is vulnerable to various threats from inside and outside the network by the hackers.

The first initial component to attack is the firewall. These hackers can access the firewall as it at best secures the internal network from the undesired access of users from the Internet. Hence, it is important to note that the firewalls do not offer any security to all the legitimate communication taking place between the outside and the inside of the firewall. In addition, a firewall does not possess the capability to limit the messages between the hosts whicgh are located inside the firewall. Hence, an adversary who can manage to run the code internal to the site can simply access all the local hosts (Tankard, 2011)

For instance, the hacker can be any past frustrated worker who has a legitimate access to the network. The adversary can also be individuals from other rival organizations trying to penetrate through the firewall. The software of the adversary can be hidden in any of the software installed from any CD. The software can also be hidden from any file downloaded or uploaded from the Web. Telephone dial-up connections or wireless communication can also be used by the adversary to bypass the firewall and access the network.

The DMZ network is another tool that includes a few of the servers with highest risks in the organization. It is essential to note that the DMZ networks are directly connected to the firewall. Hence, weak security rules and codes set by the administrators exposing the firewalls to the threats ultimately expose the DMZ network to these threats as well (Tankard, 2011).

Potential Impact on the Network and the Organization

Therefore, it will be fair to say that the components mentioned within the network structure are all vulnerable to the various threats and vulnerabilities. Therefore, the hackers and the attackers will always try to breach the network of this organization.

In fact, there can be a number of occasions when the intranet of the Organization will encounter traffic that is suspicious, such as spam, adware, malware phishing and spyware, through the ...
Related Ads
  • Online Fraud
    www.researchomatic.com...

    Blended Threat : a combination of the characte ...

  • Cyber Security
    www.researchomatic.com...

    The number of cyber attacks against U.S. has ...

  • Software Engineering
    www.researchomatic.com...

    A potential occurrence " malicious or ...

  • Unified Threat Management
    www.researchomatic.com...

    There are firewalls, anti- virus , spam and con ...

  • Scada Worm
    www.researchomatic.com...

    SCADA has been recognized to be most affected by ...