Cybersecurity is becoming more of a common tongue term in today's industry. It is being passed around the executive meetings along with financial information and projected marketing strategies. Here are some common attack vectors plaguing the industry when it comes to network infrastructure. It does not really matter the infrastructure type you have. If there is value to the data you are transferring within, someone wants to get it.
- Reconnaissance Attacks
- Access Attacks
- Denial of Service Attacks
It is a pipe dream to believe a network infrastructure is invulnerable; however, the possibility of being protected is within grasp. Fundamentally, it comes down to knowledge of what can happen to your network, knowing your equipment and training up the staff.
Source: Tripwire.com
(Score: 3, Interesting) by NotSanguine on Friday October 04 2019, @03:14PM
Context is important. Trying a door handle isn't an "attack" per se, but if the individual is trying *all* the door handles in a parking lot, is that potentially suspicious/malicious? If not, why not?
What is reconnaisance [thefreedictionary.com]?
Often, reconnaisance is covert, or attempts to be. In this context, that would be low-volume port/ping scans. Are those types of activities generally disruptive? No. However, they can, and do, provide information concerning the breadth and depth of attack surfaces, which can be quite useful when planning (or identifying targets for) an access or DDOS attack.
Besides, this isn't about (not for me, at least, I didn't read TFA) calling various types of connection attempts "bad" or "crimes". It's about being aware of the activity at the perimeter and within your network.
Which is why any network that has significant assets should be monitoring for such caresses (is that a better term than attack?), both internally and at perimeters.
On small/home networks, reviewing firewall logs (if your firewall even provides them -- if not, get a real firewall) and web/file sharing logs on systems with shared resources is often sufficient.
In larger environments an SIEM* [wikipedia.org] implementation (note, I don't say system, as there are multiple discrete components to a functional SIEM implementation) can allow you to identify potential incursions in near real-time, by aggregating and correlating (in a variety of ways) log data from firewalls, routers, switches and servers.
tl;dr: Port/ping scans aren't necessarily malicious, nor are they, generally, disruptive. However, if there are vulnerable points in your network perimeter, such activity can give an attacker the information needed to exploit such vulnerabilities.
*SIEM related links:
https://www.sans.org/reading-room/whitepapers/incident/paper/33689 [sans.org]
https://kalilinuxtutorials.com/a-beginners-guide-to-siem/ [kalilinuxtutorials.com]
https://learn.techbeacon.com/topics/introduction-siem [techbeacon.com]
https://logz.io/blog/what-is-siem/ [logz.io]
https://logz.io/blog/open-source-siem-tools/ [logz.io]
No, no, you're not thinking; you're just being logical. --Niels Bohr