The network attack surface is the totality of all vulnerabilities in connected hardware and software that are accessible to unauthenticated users.
Every point of network interaction is a part of the network attack surface. Hackers, industrial spies and malware such as worms and advanced persistent threats (APTs) target these points for potential entry to a network they wish to disrupt or capture data from.
A network’s attack surface is most often exploited through remote access and intrusion but Wi-Fi and even local area networks (LANs) must also be considered in a complete view of the attack surface.
A complete attack surface analysis is crucial to proper set up of breach detection systems (BDS), firewall, intrusion prevention systems, data policy and other security measures. Many attack approaches exploit a combination of attack surface types to gain access to desired resources
.
.
Mean Of Vulnerablities = is a weakness which allows an attacker to reduce a system's information assurance
Mean Of Malware = is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs
Mean Of APTs = An advanced persistent threat is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The purpose of an APT attack is to steal data rather than to cause damage
No comments:
Post a Comment