Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Survey on Network Security Threats and Attacks

Title: Survey on Network Security Threats and Attacks

Academic Paper , 2018 , 10 Pages , Grade: 1

Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporation's through openly documented software codes.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • INTRODUCTION
  • RELATED WORK
  • NETWORK SECURITY THREAT MODELS
    • FLOODING
    • PHISHING
    • DOS (Denial of service attacks)
    • Data interception and theft

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This technical report explores the various threats and attacks facing network security in the age of global connectivity and e-commerce. The document aims to provide an overview of common network security vulnerabilities and to guide readers in developing security measures to prevent attacks.

  • Common network security threats and attacks
  • Vulnerabilities in typical network components
  • Real-life scenarios and causes of network attacks
  • Classification of network attacks
  • Security measures to prevent network attacks

Zusammenfassung der Kapitel (Chapter Summaries)

  • INTRODUCTION: The chapter introduces the topic of network security threats and attacks in the context of increasing global connectivity and e-commerce. It highlights the vulnerability of systems and the potential for malicious actors to exploit these vulnerabilities.
  • RELATED WORK: This chapter reviews existing research on network security threats, focusing on classifications of attacks and mitigation techniques. It discusses various attack types, including passive, active, distributed, insider, and close-in attacks. Additionally, it examines attacks at the infrastructure level, such as cloud attacks, DDoS attacks, and router attacks.
  • NETWORK SECURITY THREAT MODELS: The chapter discusses various threat models, including flooding, phishing, denial of service (DoS) attacks, and data interception and theft. It explores the mechanisms behind these attacks and the potential vulnerabilities they exploit.

Schlüsselwörter (Keywords)

The key topics and concepts explored in this technical report include network security threats, attacks, vulnerabilities, mitigation techniques, flooding, phishing, denial of service attacks, data interception, and theft. The report also discusses various attack classifications, such as passive, active, distributed, insider, and close-in attacks, as well as infrastructure-level attacks targeting cloud systems, routers, and DDoS attacks.

Excerpt out of 10 pages  - scroll top

Details

Title
Survey on Network Security Threats and Attacks
Grade
1
Authors
Santosh Malhotra (Author), Amit Kumar (Author)
Publication Year
2018
Pages
10
Catalog Number
V445068
ISBN (eBook)
9783668818347
ISBN (Book)
9783668818354
Language
English
Tags
survey network security threats attacks
Product Safety
GRIN Publishing GmbH
Quote paper
Santosh Malhotra (Author), Amit Kumar (Author), 2018, Survey on Network Security Threats and Attacks, Munich, GRIN Verlag, https://www.grin.com/document/445068
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  10  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint