Network Threats

 

 

 


Below is a list of common network attacks:

Distributed Denial of Service (DDoS)
DNS poisoning
ARP poisoning
Domain hijacking
MAC flooding
MAC cloning
Man-in-the-Middle
Explain two of these network attacks and discuss methods/techniques for protecting the network against them.
 

Sample Answer

 

 

 

 

 

 

 

To protect a modern network, it is essential to understand both how attackers manipulate core protocols and the specific technical defenses available to neutralize those threats.

Below are explanations of Man-in-the-Middle (MitM) and ARP Poisoning, along with mitigation strategies.

1. Man-in-the-Middle (MitM)

A Man-in-the-Middle attack occurs when a malicious actor positions themselves between two communicating parties (such as a user and a web server) to intercept, read, or alter the data being exchanged. The two parties believe they are talking directly to each other, unaware that the attacker is "relaying" the conversation.

How it works: In a digital context, this often happens on unsecured public Wi-Fi. The attacker uses software to capture data packets, allowing them to steal login credentials, session cookies, or financial information in real-time.

The Danger: If the data is not encrypted, the attacker can see everything in "plain text." Even with encryption, attackers may use "SSL Stripping" to force a browser to use an unencrypted HTTP connection instead of HTTPS.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS