Network Sales and Services Handbook (Cisco Press Networking Technology)

In order to design an effective security solution, it is important to understand the types of network threats that exist. These threats to a network or system are categorized as follows:

  • Denial-of-Service (DoS)

  • Unauthorized Access

  • Illicit Command Execution

  • Confidentiality Breaches

  • Destructive Behavior

Each of these threats is discussed in the following sections.

Denial-of-Service (DoS)

DoS attacks are considered to be both the most dangerous threat and the most difficult to address. The premise of a DoS attack is the attacker sends more requests to a host (for example, a web server) than the host can handle. For example, if a host can answer 20 requests per second and the attacker is sending 50 requests per second, the host is unable to service all of the requests, much less any legitimate requests, such as hits on a web site from legitimate users or customers.

DoS attacks are considered the most dangerous threat because DoS attacks are easy to launch, difficult (sometimes impossible) to track, and it is not an easy task refusing attacker requests for service without refusing legitimate service requests.

The following list offers things that can be done to reduce the risk of being a target of a DoS attack:

Each of these possible solutions has an associated implementation and management cost. It is this cost that must be weighed versus the risk of lost service.

Unauthorized Access

Unauthorized access is a high-level term referring to a number of different sorts of attacks. The goal of an unauthorized access attack is for the attacker to access some host resource that would not otherwise be available. For example, a host could be a web server, and therefore should provide anyone with requested Web pages. However, the web server should not provide command line access to someone without ensuring that the requestor is someone who should have such access, such as a local administrator.

Illicit Command Execution

It is undesirable for an unknown and/or an unauthorized person to be able to execute commands on an organization's servers. There are two main severity classifications of this problem:

Confidentiality Breaches

Confidentiality breaches are based on the model that certain information could be damaging if it fell into the wrong hands, such as those of a competitor, an enemy, or the public. In these cases, it is possible that the compromise of a normal user account on the host can be enough to cause damage, resulting, perhaps, in bad publicity for the organization or access to information that can be used against the company.

Destructive Behavior

Two major categories of destructive break-ins and attacks are used:

Категории