0% found this document useful (0 votes)
38 views14 pages

Common Mobile Device Security Threats

The document outlines various threats to network security, including malware, phishing, and denial of service attacks, as well as factors that make networks vulnerable such as weak passwords and outdated software. It also discusses threat precursors that indicate potential security risks and emphasizes the importance of message integrity and confidentiality. To combat these threats, the document highlights key network security controls like firewalls, encryption, and multi-factor authentication.

Uploaded by

estelitachenglim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views14 pages

Common Mobile Device Security Threats

The document outlines various threats to network security, including malware, phishing, and denial of service attacks, as well as factors that make networks vulnerable such as weak passwords and outdated software. It also discusses threat precursors that indicate potential security risks and emphasizes the importance of message integrity and confidentiality. To combat these threats, the document highlights key network security controls like firewalls, encryption, and multi-factor authentication.

Uploaded by

estelitachenglim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Threats In Network

Introduction
What Are Threats in Network?

Threats are potential dangers or


activities that aim to exploit weaknesses
in a network's security. These activities
can harm the network, steal or damage
data, or disrupt services.
The most common types of network threats
include:

• Malware: Malicious software, such as viruses, worms, and ransomware, designed to


damage, disrupt, or gain unauthorized access to systems.

• Phishing: Fraudulent attempts to steal sensitive information, such as usernames,


passwords, or credit card numbers, by pretending to be a trusted entity (e.g., through
fake emails or websites).

• Denial of Service (DoS) Attacks: Attacks designed to overwhelm and make a


network or website unavailable by flooding it with excessive traffic.

• Man-in-the-middle (MITM) Attacks: Attacks where a third party intercepts and


possibly alters the communication between two parties without their knowledge.

• SQL Injection: A type of attack where malicious code is inserted into an SQL query to
manipulate databases or steal data.
What makes a network
vulnerable

A network is considered vulnerable


when it has weaknesses or flaws that
can be exploited by attackers to gain
unauthorized access, disrupt services,
or compromise sensitive information.
These vulnerabilities can arise from various factors, including:

 Weak Passwords:
Use of simple or default passwords that are easily guessable.
 Outdated Software:
Lack of regular updates can leave known vulnerabilities exposed.
 Unsecured Devices:
IoT devices and personal devices without proper security measures can be entry points
for attackers.
 Poor Network Configuration:
Misconfigurations can create exploitable vulnerabilities.
 Human Error:
Mistakes such as accidentally sharing sensitive information or falling for phishing attacks.
Threats Precursors

• Threat precursors are early indicators or warning signs that suggest a


potential security threat or attack may occur in the future. These
precursors can manifest in various forms and often provide valuable
insights that can help organizations proactively identify and mitigate risks
before they escalate into actual incidents. Understanding these
precursors is crucial for effective threat detection and response.
Some common precursors
include:
[Link] Network Traffic: A sudden surge in network traffic or connections
from suspicious IP addresses can indicate that an attack is being prepared.
[Link] User Behavior: Employees accessing sensitive data they don’t
normally use or attempting to access restricted areas of the network could
signal a potential security threat.
[Link] Emails or Attachments: Unexpected or strange emails with
attachments or links could be phishing attempts or malware delivery.
[Link] Failed Login Attempts: A high number of failed login attempts
can be a sign of a brute-force attack, where an attacker tries to guess
passwords repeatedly.
[Link] Configuration Changes: Unauthorized changes to network
settings or device configurations may suggest a system compromise or
preparations for an attack.
Message Integrity and Confidentiality Threats

• Message integrity refers to ensuring that


data transmitted over a network remains
unchanged and uncorrupted during transit.
Confidentiality ensures that sensitive data is
only accessible to authorized users.
Threats to both integrity and confidentiality
include:
Man-in-the-Middle Attacks (MITM):
In this attack, an attacker intercepts and may alter communication between two
parties, compromising message integrity and confidentiality.

Eavesdropping:
Unauthorized users may intercept network communications to steal sensitive data
like passwords, credit card information, or personal details.
Data Breaches :
occur when an attacker successfully accesses and extracts sensitive data,
compromising its confidentiality. This could include stealing personal information,
intellectual property, or financial data.
Data Corruption:
Intentional or accidental changes to data during transmission or storage can
compromise the integrity of the information.
Network Security Controls

• To protect networks from threats and vulnerabilities,


organizations implement various network security controls.
These are measures designed to prevent, detect, and respond to
security incidents.
Key network security controls
include:
1. Firewalls:
A firewall is a network security device that monitors and filters incoming
and outgoing network traffic based on security rules.
2. Encryption:
Encryption ensures that data is scrambled and unreadable to anyone who
doesn’t have the proper decryption key. This protects data during
transmission (e.g., over the internet) and at rest (e.g., on a hard drive).

3. intrusion Detection Systems (IDS):


IDS tools monitor network traffic for signs of malicious activity.
4. Intrusion Prevention Systems (IPS):
IPS tools go a step further by actively blocking potentially harmful traffic
in real-time.
Key network security controls
include:
5. Multi-factor Authentication (MFA):
To access a system, MFA requires users to provide two or more
authentication factors (e.g., password and a one-time code sent to their
phone).
6. Patch Management:
Regularly updating software and hardware to fix known vulnerabilities
and security flaws is critical for keeping a network secure. Attackers often
exploit unpatched systems.
7. Virtual Private Networks (VPNs):
A VPN creates a secure connection between a user's device and the
internet, often used by remote workers to access the company network
safely.
THANK YOU

You might also like