logo

Network Devices Security: Threats, Potential Damages, and Mitigation Strategies

   

Added on  2023-06-07

6 Pages1897 Words178 Views
Running Head: NETWORK DEVICES SECURITY
0
Network devices security

Network devises Security
1
Executive Summary
Network devices are defined as a system
which is used for communication
purpose and they produce a platform
where users can interact with electronic
devices. This is very important for any
organization and it also impacts many
business communities [1]. The network
device is a combination of computer
systems and other peripheral devices
and security of these networks are a
very common problem for any
organization. The main objective of this
report is to evaluate various types of
threat and risks of networks devices,
and potential damage of these devices
[2]. There are many attacks and threats
of network devices detected which are
explaining in this report.
Identification of threats and attacks
There are various threats and attacks on
network devices identified which are
following
Spoofing
Trajan’s
DOS and DDOS
Hijacking
Mapping
Sniffing
Spoofing [3].
Any network device transfer IP database
which consist of data packets and these
data packets send IP address to user
mobile device [3]. If any hacker is able
to control their running software’s then
they can easily enter into users personal
servers. It is a type of network attack
through which an attacker can control a
user’s peripheral devices and accounts.
Network devices consist of routers and
computer chips that can be easily
hacked by the attacker and they install
their algorithm into user personal
system and control their all data
systems [4].
Hijacking
It is also called a man in the middle
attack that attacks TCP or IP network
protocols. Hacker performs hijacking by
monitoring and controlling user
network devices and communication
system and when any user
communicates with another then
hackers control their signals [4]. Many
hackers can re-route user peripheral
devices and they can easily find which
person communicate with the user. It is
a very serious problem for the
communication system an attacker can
easily control our personal database
system [5].

Network devises Security
2
Trojans
This is a type of malicious process which
also called as legitimate software and
many hackers’ uses this to hack user
personal information. In which
attackers produce an algorithm
program which inserts into TCP routers
and they control human personal
servers [6]. A Trojan process will block,
control and monitor user personal
peripheral devices and this problem can
be avoided by using cryptography
technique.
Sniffing
Packet sniffing is a kind of system which
is used to interfere with user network
devices and many attackers use this to
control signal transferring system into
routers. The sniffer process will store all
communication data packets and
transfer to near the host site [6]. This
type of attack listen all data links and
hackers can detect user personal
information’s. This type of problem can
be reduced by encryption technique and
this process converts the signal into the
form of code.
Mapping
Before attacking a network device any
hacker identifies and investigates
various information for example, IP
address, operating system, and the
servers that they use. Using all these
data any hacker can be easily focused on
their targets and they can encrypt all
personal information of users. The
process of all information collecting is
also called as mapping program [6].
DOS and DDOS
It is a special kind of attack which is
increased rapidly in the last few years
and it attacks the web services of
business organizations. This type of
attack uses flooding program to encrypt
all personal data's and also use the
illegitimate program to enter into
computing devices. There are main
three processes of this attack such as
Consumption of computational
resources
Disruption of configuration
information
Disruption of physical computer
networks [7].
Potential Damages
Business disruption
An organization may be unable to
perform their daily task due to threats
and attacks on network devices. Hackers
attack their personal database by which
they cannot share their information or
files to customers [8].

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Session Hijacking is a type of cyber-attack
|5
|849
|92

CSI2102 - Information Security: Assignment
|17
|1220
|277

Distributed Denial of Service
|10
|2237
|162

Challenges and Approaches to Overcome Session Hijacking and Intrusion Detection Systems
|4
|603
|263

Man-In-The-Middle Attack
|18
|3456
|309

Introduction to Information Assurance and Information Security Assignment 2022
|4
|529
|16