Home >Common Problem >What are the basic types of cyber attacks?

What are the basic types of cyber attacks?

coldplay.xixi
coldplay.xixiOriginal
2021-03-17 15:05:209396browse

The basic types of network attacks include external network attacks and internal network attacks; external network attacks are some Trojans, viruses, spam and other attacks on the public network, which directly hit the firewall to deal with internal network attacks. If so, the only option is to use an immune wall.

What are the basic types of cyber attacks?

#The operating environment of this article: Windows 7 system, Dell G3 computer.

Generally speaking, they are external network attacks, and internal network attacks

External network attacksare some Trojans, viruses, Attacks such as spam directly hit the firewall. In the case of intranet attacks, they are some normal protocols in the local area network. Then you deliberately send multiple and spam these protocols, and use these in themselves. Legal protocols are used to conduct network attacks. Attacks on the external network are actually not terrible. What is really troublesome is the 108 types of attacks on the internal network, because it itself is legal! ! !

If there is an attack on the external network, just contact the firewall

But according to calculations, 80% of the problems now occur on the internal network,

To deal with internal network attacks If so, the only choice is to use an immunity wall

The immunity wall is specifically targeted at LAN security and management. We can think of the immunity wall as

1. It is a set of internal network bottom-layer firewalls: Completely solve the network attacks of viruses and Trojans, and the problems of disconnection and lag (especially the processing of layers 2 and 3)

Solving the problem of ARP (innate immunity, ARP exploration) no one can do it

2. It is a real identity access system: strict and effective management of the identity of terminal computers in the network (real IP, MAC, CPU hard disk motherboard, genetic type). Completely solve IP spoofing (private connections, cloning, IP conflicts)

3. It is a set of network bandwidth management equipment: sophisticated intranet bandwidth management, load balancing, traffic statistics (internal and external networks, servers, application delivery)

4. It is a set of comprehensive network management software: observe the internal protocol process of the network, remote debugging management (monitoring center, audit)

5. It is a comprehensive set of network management software: observe the internal protocol process of the network , Remote debugging management (monitoring center, audit)

Related video recommendations:
PHP programming from entry to proficiency

The above is the detailed content of What are the basic types of cyber attacks?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Related articles

See more