Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
The first vulnerability is the email server. Although very well controlled for been within the Demilitarized Zone (DMZ), this is always a vulnerability with which most companies have to deal with. This vulnerability opens the way for phishing attack. One way to mitigate this vulnerability is configuring the email server so that only authorized email may enter. This is …show more content…
If this attack is successful, the attacker has access to the internal network of the company so in this case we can be under the three types of threat; it all depends on the intentions of the attacker. The most advisable is to change the password at least every 30 days and if possible relocating the WAP to a most protected location of the network.
Another possible attack that we can face when dealing with WAP is Address Spoofing. This attack consists of trying to seem at something that really is not. Is normally present a false network address to pretend to be an authorized machine of the system. If the WAP is not configured to filter out traffic with internal external addresses, the attack may be successful. The main objective of this attack is the destruction and / or alteration of the system and the information; although it remains the possibility of disclosure.
The last segment of analysis is the one were the users and data servers are located. The only visible attack in this area is Insider Attack. This type of attack is usually carried out by disgruntled or corrupt employees to take advantage of a situation. Although on a smaller scale, is always present in all companies and is more difficult to detect because the attacker has access to the system without having to perform any suspicious operation.
Eavesdrop, steal, or damage information, use information in a fraudulent manner, and deny accesses to other