The threats to the server of network traffic.

1. The threats to the server of network traffic.


Unpatched OS: The servers are not patched with the latest operating system patches. This can raise a big threat for the infrastructure as well advantage for the hackers. Unpatched operating system can consider as a security loophole that exist with the servers. The critical servers have the huge impact from this issues and hackers can easily exploit any vulnerability using this. Coursey, 2013 describes unpatched OS as the number one risk for infrastructure for any organization. The hackers can gain access to the server using the unpatched vulnerability and attack for the server and delete the data. Compromise the server can consider as a likelihood of exploiting OS vulnerability.
Prevention: prevention of attack vector from unpatched OS can done using properly updating and patching the systems. Internet patches can be enabled for the server to get update automatically. But if automatic updates effect for the environment, manual updating should be done periodically.

Denial of Service (DOS): This type of attacks generate large amount of traffic towards the server. Generating unwanted traffic could disrupt the legitimate services of the server. The slowness of web server can occur from a DoS attack in the investigated environment. DoS attacks need to prevent at any environment to protect the business continuity. DoS attack can be a critical threat to the server, which can be the main factor for its slowness.
Prevention: It is hard to prevent the DoS attacks for the IT infrastructure, but prevention can be done using the honeypots. 

Botnets: Botnets are known as remotely accessible computer without the authorization of business purpose.  The hackers can install bot using a vulnerability of OS in the server and use that bot for control the server functions (Hoffman, 2016). Mainly the controller of the botnet, the botmaster can infect malwares or malicious codes to get access to the server and delete or modify the content. Further performing DOS attacks. The botnet attack can be a reason for the suspected behavior of the systems in the organization.
Prevention: Properly patched OS, using the intrusion prevention systems or updated anti-virus systems can prevent the Botnet functions on the servers.

Backdoors: Backdoor is known as a malicious program that remote attacker to access the computer without authorization (Kiguolis, 2017). Attackers can infect backdoors to the server using vulnerability of the server and then remotely access it and delete and compromise the contents. The company server may face backdoor attack in such scenario. The attacker can compromise the server through a backdoor, which exposed to the internet. The backdoor present medium level of threat to the server.
Prevention: Backdoor attacks can prevent using IPS, antivirus software and properly patching the operating systems.  Since backdoors are most time untraceable, it is important to prevent them.

Computer worm: Computer worm is a malicious program that infect to the server without human interaction. The worms can spread over the network for clients and worms can delete or destruct the services of the network. The organization may infect with the worm attack as some of the computer malfunctions are reported.
Prevention: Prevention of the worms can implement using the anti-virus software’s as well using the updated patches of the operating systems.

2. The threats to the workstations. 


Bruteforce: The bruteforce attacks are known as trying malicious attempts to the workstations to gain access. Attackers can use various methods such as predefined password tables or malicious software’s to perform bruteforce attacks. The user network can be compromised using bruteforce attacks of the organization and add malicious contents to them.

Prevention: prevention of bruteforce attack can be done implementing password lockout function of the end user computers or using IPS (Magestro, 2017).

Environmental threats: The disasters can be happen for any environment. The organization can face disasters like fire, earthquake, tsunami, flood etc. The disaster recovery site need to conduct the business uninterruptedly.
Prevention: A properly implemented disaster recovery site can help to prevent the impact of environmental threats (Shaw, 2018).

Data backup: Data backup is not properly done for the organization as it impact for user data if that is compromised. The data backup is the main point to recover to previous state from any kind of attacks. The attackers can compromise the systems and delete, if data backups are there, no need to worry (Johnston, 2018). If the data backups properly maintained the recovery can perform with minimum of time
Prevention: Properly implementation of data backup plan can reduce the impact of backups. The backup plan should be periodically reviewed and properly monitored

Social engineering:  Social engineering attacks are known as the most sophisticated attack type of modern computing. Mostly they come from the social engineering mechanism such as emails, LinkedIn, or Facebook. The banners of the computer screens may be a reason for social engineering attacks that happen for the organization. As the users download the content from the internet, users can be targeted by the attackers via social media platforms to compromise the company infrastructure.

Prevention: These attacks can prevented using properly conducting user awareness and end user computer protection mechanisms (Bisson, 2015).

Malwares: Malwares are computer malicious software’s that infect for the end users via internet or third party software’s. Some of the malwares can cause harm to the computer and some of them carry advertisements. The malwares carry advertisements are known as adware. The organization may be infected with the adware type malware, as the end user computers are showing the advertisements on the screens (Rouse, 2016).
Prevention: prevention of the malwares can be done using the properly implemented host based security mechanism such as anti-virus or anti-malware solutions.


3. The threats to the website.


DDoS: Denial service of Dos is known as a kind of threat that effected for websites which interrupt their legitimate services. If the website is attacked with DDoS attack legitimate users does not able to access the web sites.  As the organization website has face accessibility issue it may be effect as a DDoS attacks (Gaffan, 2018).
Prevention: prevention of DDoS is bit hard than others, But DDoS can be prevented using specially crafted technologies like cloud flare or support with ISP. 

SQL injection: SQL injections are attacks which focused on data based that connected with web sites. SQL injection can mine the data or change the data inside of a web service.  As the organization website face for slowness it can be a reason for SQL injections (Rubens, 2018).
Prevention: prevention of the SQL injections can be done using the parameter protections, firewalls, patches of the database.

Cross site scripting: Cross site Scripting or XXS can perform using embedding malicious URL to the legitimate web services. The legitimate web sites can redirect or change the content using XXS attacks. The legitimate service can interrupted by this. As the organization web site shows the hacked banner, it may done using XXS type attacks.
Prevention: XXS prevention can be done using the context dependent outputs of the web application. Further web application firewalls can use as perimeter level protection for XXS attacks (Netsparker, 2018).

Security misconfiguration: Security misconfiguration is known as the highest level of security loop hole which even listed in OWSAP top 10. Forgetting to change the default passwords, deleting default installation file of the web site can be known as the security misconfigurations. The attacks can take huge advantages from these. As these kind of issues can be hacked by novice level script kiddies also. As the web site has hacked it may be a reason of such misconfiguration (Vicente, 2018). A hacker can edit the content of the website via misconfiguration. They can publish the “hacked” message through misconfiguration vulnerability.
Prevention: prevention of the security misconfigurations can be done using properly conducted of security audits for the systems. These issues cannot prevent using the perimeter level protections. It is necessary conduct audits on periodically basis.
Unpatched plugins: Web site may use different plugging or services when it is implemented. The vulnerabilities of the plugging can cause the remote attacker to compromise the website. If the organization web site has contain such plugging it can be a reason for this compromise. Hackers can change the index pages of the web site using a vulnerable plugging.
Prevention: Prevention of the plugging vulnerabilities can be implemented using web application firewall or on time patching of the plugins.


References


Bisson, D. (2015). 5 Social Engineering Attacks to Watch Out For. Retrieved from https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-to-watch-out-for/
Coursey, D. (2013). Unpatched Applications Are #1 Cyber Security Risk. Retrieved from https://www.pcworld.com/article/172082/Unpatched_Applications_Are_1_Cyber_Security_Risk.html
Gaffan, M. (2018). The 5 Essentials of DDoS Mitigation. Retrieved from https://www.wired.com/insights/2012/12/the-5-essentials-of-ddos-mitigation/
Hoffman, C. (2016). What Is a Botnet?. Retrieved from https://www.howtogeek.com/183812/htg-explains-what-is-a-botnet/
Johnston, L. (2018). 5 Ways to Back Up Your Data and Keep It Safe. Retrieved from https://www.lifewire.com/ways-to-back-up-your-data-2640426
Kiguolis, L. (2017). What are backdoors and how to remove them. Retrieved from https://www.2-spyware.com/backdoors-removal
Magestro, D. (2017). What is a Brute Force Attack? | StackPath Blog. Retrieved from https://blog.stackpath.com/glossary/brute-force-attack/
Netsparker. (2018). The Cross-site Scripting (XSS) Vulnerability: Definition and Prevention. Retrieved from https://www.netsparker.com/blog/web-security/cross-site-scripting-xss/
Rouse, M. (2016). What is malware (malicious software)? - Definition from WhatIs.com. Retrieved from https://searchsecurity.techtarget.com/definition/malware
Rouse, M. (2017). What is advanced persistent threat (APT)? - Definition from WhatIs.com. Retrieved from https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
Rubens, P. (2018). How to Prevent SQL Injection Attacks. Retrieved from https://www.esecurityplanet.com/hackers/how-to-prevent-sql-injection-attacks.html
Shaw, K. (2018). What is disaster recovery? How to ensure business continuity. Retrieved from https://www.networkworld.com/article/3248969/data-center/what-is-disaster-recovery-how-to-ensure-business-continuity.html
Vicente, G. (2018). What is and how to prevent Security Misconfiguration | OWASP Top 10 (A5). Retrieved from https://hdivsecurity.com/owasp-security-misconfiguration

Comments

Popular posts from this blog

Contact US

Kavya Madhavan

Ryan enjoyed doing nude scene with Sandra Bullock