Traditional Culture Encyclopedia - Traditional culture - What are the main threats to network security?
What are the main threats to network security?
1 eavesdroppers obtain sensitive information by monitoring network data, which leads to information leakage. The main performance is that the information on the network is eavesdropped. This kind of network infringer who only eavesdrops without destroying the information transmitted in the network is called passive infringer. Malicious attackers usually use this as a basis and then use other tools to carry out more destructive attacks.
2 The retransmission attacker obtains some or all information in advance, and then sends it to the receiver.
Tampering attackers modify, delete and insert the communication information between legitimate users, and then send the forged information to the receiver, which is pure information destruction. This kind of network infringer is called active infringer. Active infringers intercept online data packets, change them to make them invalid, or deliberately add some information that is beneficial to them, which plays a misleading role. Active attackers do the most damage.
Denial-of-service attackers slow down or even paralyze the system response in some way, preventing legitimate users from obtaining services.
5 Behavior Denial The communication entity denies the behavior that has happened.
Electronic deception attacks the network by pretending to be a legitimate user, thus covering up the true identity of the attacker and framing others.
Unauthorized access to network or computer resources without prior consent is regarded as unauthorized access. There are mainly the following forms: impersonation, identity attack, illegal users entering the network system for illegal operation, and legal users operating in an unauthorized way.
Spreading viruses spread computer viruses through the network, which is very destructive and difficult for users to guard against. As we all know, CIH virus, love bug virus, red team virus, Nimda virus, cover letter, happy hour virus and so on are extremely destructive and can seriously paralyze the whole network.
- Related articles
- How to exercise for lumbar disc herniation? How to treat lumbar disc herniation?
- Geomantic omen of China ancient tomb
- Comprehensive Overview of Wengyuan County
- What are the mainstream frameworks for java learning?
- 2022 Qingming Festival Theme Activity Planning Program Selected 5 Articles
- Introduction to the content of Chinese furniture map
- How to beat sesame dry powder with a wall-breaking machine
- What's the difference between intercity distribution and traditional logistics distribution?
- I want to learn sculpture. Where can I learn?
- What are the investment banks in Kunming