This document discusses network security principles and threats. It outlines the three primary goals of network security which are to maintain confidentiality, integrity, and availability. It then describes the typical steps a hacker may follow, including reconnaissance, identifying applications and OS, gaining access through social engineering or credentials, escalating privileges, creating additional accounts, configuring a backdoor, and finally abusing the system. Examples of security threats mentioned include Trojan horses, packet captures, key loggers, brute forces, dictionary attacks, DoS, DDoS, TCP SYN floods, ICMP attacks, and physical attacks on a system's environment.
This document discusses network security principles and threats. It outlines the three primary goals of network security which are to maintain confidentiality, integrity, and availability. It then describes the typical steps a hacker may follow, including reconnaissance, identifying applications and OS, gaining access through social engineering or credentials, escalating privileges, creating additional accounts, configuring a backdoor, and finally abusing the system. Examples of security threats mentioned include Trojan horses, packet captures, key loggers, brute forces, dictionary attacks, DoS, DDoS, TCP SYN floods, ICMP attacks, and physical attacks on a system's environment.
This document discusses network security principles and threats. It outlines the three primary goals of network security which are to maintain confidentiality, integrity, and availability. It then describes the typical steps a hacker may follow, including reconnaissance, identifying applications and OS, gaining access through social engineering or credentials, escalating privileges, creating additional accounts, configuring a backdoor, and finally abusing the system. Examples of security threats mentioned include Trojan horses, packet captures, key loggers, brute forces, dictionary attacks, DoS, DDoS, TCP SYN floods, ICMP attacks, and physical attacks on a system's environment.
Why network security is Necessary. Types o T!reats: Internal Threats External Threats Three Primary Goals of Network Security: Steps which a Hacker will typically follow : 1) Perform Reconnaissance !oot " printin# ) $) %&entify 'pplication an& (S on the system. )) Gain 'ccess to the system throu#h social en#ineerin#. *) +o# in throu#h the o,taine& user cre&entials an& escalate his pri-ile#es. .) /reate a&&itional username an& passwor&s ,y some utilities or tools. 0) /onfi#ure a ,ack&oor. 1) !inally : 2se the system