Attackers utilize many different types of techniques to gain and take control of various networks for various reasons. In most cases, the target networks are those related to businesses but the techniques that will be discussed in this blog can also be used to attack home networks. Social Engineering is a type of intrusion that is not completely fixable due to the rise in computer/network users. This type of attack is simply completed when someone uses whatever means available/provided to them to obtain the necessary information to attack their targeted network. Password Cracking is an attackers attempt to gain access to your system by trying to guess your password with known dictionary words in various ways hence the Dictionary Attack.
They can also try utilizing all possible characters to get the password which is known as the Brute Force Attack or they can combine the dictionary and brute force attacks to crack your password. To mitigate such attacks one could limit the number of log in attempts, have a strong password, and change it often to name a few. Malicious computer cods or Viruses can damage your system in many ways and are normally attached to an executable file such as an email an infected attachment. These kind of attacks can be annoying, can jam up your server, can cause data loss, and can leave your system susceptible to other attacks from other attackers. A computer Worm is a type of attack that self-replicates and usually can denies services to networks when employed.
The worm attack method does not need to be attached to a file to be spread as it uses the network to send copies of itself to the other computers. One of the main goals of a worm attack is to create a back door on the network it is attacking that would allow the attacker to gain access with ease. Keeping your antivirus software’s up to date, keeping your operating systems and software’s current, and utilizing firewalls when possible are some ways to prevent but not stop viruses/worms. There are many different attack methods/tools/techniques used by attackers to gain access into one’s system. The above is just a very brief overview on some of the attacks that you could or have seen and some ways to mitigate the attacks.
One thing to keep in mind is that noting done or no one tool utilized will outright stop an attack, if someone wants to gain access to your system, chances are they will gain entry.