Classifying Network Security Threats CCNP

Classifying Network Security Threats

Network security threats can be classified into four broad terms:

1.1.1.1 Unstructured Threats

These initiate mostly from non familiar users by using easy existing hacking applications from the Internet. Some of the users in this class are inspired by malicious target but most are encouraged by the academic challenges are known as script kiddies. They are not the most experienced users, or programmers but they have the time and courage.

Trojan horse can be explained as software that executes a game on the user’s system. While the user is playing the game, it mails a copy of itself to every client in the user’s contact book. Then other clients get the game and play it, in this case, the Trojan horse spreads.[5]

1.1.1.2 Structured Threats

These initiate from users that are motivated and technically competent than script kiddies. They capable of understanding network systems design and the threat of those systems. They have the ability to create hacking scripts that can penetrate those network systems. A user who presents a structured threat basically targets a desired destination or group. These threats are involved with the major fraud and theft cases that are reported to law enforcement society. These hackers are appointed by organized crime and industry competitors etc.

1.1.1.3 External threat

These initiate from individuals working outside the company, who cannot gain authorized access to the systems or network. They usually gain access to network from the Internet or dialup access servers.

1.1.1.4 Internal threats
These threats start off from individuals who have approved access to the network. These clients either have an account on a server or can gain physical access to the network. This threat may arise from dissatisfied employees. The majority of security incidents come from internal threats.

Popular posts from this blog

History of Labor Day

Relationships Ruined by the Internet