Posts In Category "Corporate WAN Threats"

Identity Theft

     -     Apr 22nd, 2014   -     Corporate WAN Threats, Uncategorized   -     0 Comments

What is Identity Theft? Identity theft is a crime whereby criminals impersonate individuals, usually for financial gain. In today’s society, you often need to reveal personal bits of information about yourself, such as your social security number, signature, name, address, phone number, cell number or even banking and credit card information. If a thief is […]

Read More →

Session Hijacking

Session Hijacking Attack Introduction   Also known as man in the middle attacks, session hijacking deceives a server or a client into accepting the upstream host as the actual legitimate host. Instead the upstream host is an attacker’s host that is manipulating the network so the attacker’s host appears to be the desired destination. Session […]

Read More →

Zero-day Attack

     -     Oct 3rd, 2013   -     Corporate WAN Threats, IT Threats   -     0 Comments

A zero-day attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on “day zero” of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability. Zero-day exploits (the software and/or strategies that use a […]

Read More →

Unauthorized Management Access Attack

     -        -     Corporate WAN Threats, IT Threats   -     0 Comments

Management sessions to devices allow you the ability to view and collect information about a device and its operations. If this information is disclosed to a malicious user, the device can become the target of an attack, compromised, and used in order to perform additional attacks. Anyone with privileged access to a device has the […]

Read More →

Unauthorized Access Attack

     -        -     Access Networking Threats, Corporate WAN Threats   -     0 Comments

Unauthorised access is the act of gaining access to a network, system, application or other resource without permission. Unauthorised access could occur if a user attempts to access an area of a system they should not be accessing. Unauthorised access could be result of unmodified default access policies or lack of clearly defined access policy […]

Read More →

Resources Depletion Attack

     -        -     Corporate WAN Threats, IT Threats   -     0 Comments

An attacker depletes a resource to the point that the target’s functionality is affected. Virtually any resource necessary for the target’s operation can be targeted in this attack. The result of a successful resource depletion attack is usually the degrading or denial of one or more services offered by the target. Resources required will depend […]

Read More →

Resiliency (Disaster Recovery)

     -        -     Corporate WAN Threats, IT Threats   -     0 Comments

In today’s global business environment, security must be the top priority in managing Information Technology. For most organisations, security is mandated by law, and conformance to those mandates is investigated regularly in the form of audits. Failure to pass security audits can have financial and management changing impacts upon an organisation. Business continuity is the […]

Read More →

Routing Protocol Attack

     -        -     Corporate WAN Threats, IT Threats   -     0 Comments

Dynamic routing protocols, of which RIP, OSPF and BGP are the most widely deployed, have been increasingly abused by malicious users over the past few years. In the absence of strong authentication enforcement verifying that routing information comes from the true peer router, a malicious user may spoof or modify valid routing protocol messages and […]

Read More →

Reconnaissance

     -     Oct 2nd, 2013   -     Access Networking Threats, Corporate WAN Threats, IT Threats   -     0 Comments

In order to be successful attacker must first gather information about attacked systems. Hacker is just like a commander that must know position of the enemy armament and numbers before launching successful attack. Reconnaissance vectors Reconnaissance attack can be active or passive. It is an attempt to gain information about targeted computers or networks that […]

Read More →

Password Cracking Attack

     -        -     Corporate WAN Threats, IT Threats   -     0 Comments

Password cracking refers to various measures used to discover computer passwords. This is usually accomplished by recovering passwords from data stored in, or transported from, a computer system. Password cracking is done by either repeatedly guessing the password, usually through a computer algorithm in which the computer tries numerous combinations until the password is successfully […]

Read More →