0% found this document useful (0 votes)
9 views3 pages

Network Security

Uploaded by

jollyjingles93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Network Security

Uploaded by

jollyjingles93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Host-Based and Network-based Security Issues

Host-based and network-based security issues are two categories of


security concerns that focus on different parts of an IT infrastructure. Let's
break them down:

Host-Based Security Issues

Host-based security refers to measures and vulnerabilities that are


specific to an individual device or system, such as a computer, server, or
mobile device. These issues are centered around protecting the data and
integrity of the host system itself.

Examples:

1. Malware Infections:

o Description: Malware such as viruses, trojans, and worms


can infect a host system, causing data loss, system
slowdowns, or unauthorized access.

o Example: A workstation in an office gets infected with


ransomware, which encrypts all the files on the machine and
demands a ransom for the decryption key.

2. Unpatched Software Vulnerabilities:

o Description: Software that is not updated with the latest


security patches can be exploited by attackers to gain
unauthorized access or cause damage.

o Example: A server running an outdated version of a web


application framework that has known security vulnerabilities,
allowing an attacker to execute arbitrary code on the server.

3. Weak Authentication Mechanisms:

o Description: Weak or default passwords, lack of multi-factor


authentication, or poor password management can lead to
unauthorized access.

o Example: An attacker gains access to a critical database


because the default admin password was not changed after
installation.

Network-Based Security Issues

Network-based security refers to measures and vulnerabilities that are


specific to the communication and interaction between devices on a
network. These issues focus on protecting data as it travels across
networks and ensuring the integrity and availability of network services.

Examples:

1. Man-in-the-Middle (MitM) Attacks:

o Description: An attacker intercepts and possibly alters the


communication between two parties without their knowledge.

o Example: An attacker intercepts the communication between


a user and an online banking site, capturing login credentials
and personal information.

2. Distributed Denial of Service (DDoS) Attacks:

o Description: Multiple compromised systems are used to flood


a target system or network with traffic, overwhelming it and
causing it to become unavailable to legitimate users.

o Example: A popular website becomes inaccessible because it


is overwhelmed by traffic from a botnet of infected devices,
disrupting the service for legitimate users.

3. Unauthorized Network Access:

o Description: Attackers gain access to a network by exploiting


vulnerabilities in network devices, such as routers and
switches, or by using stolen credentials.

o Example: An attacker gains access to a corporate network by


exploiting a vulnerability in the company’s VPN server,
allowing them to steal sensitive data and monitor network
traffic.

In short

 Host-Based Security Issues focus on the protection of individual


devices and systems. Examples include malware infections,
unpatched software vulnerabilities, and weak authentication
mechanisms.

 Network-Based Security Issues focus on protecting data in


transit and the integrity and availability of network services.
Examples include Man-in-the-Middle attacks, DDoS attacks, and
unauthorized network access.

Both types of security issues require robust and proactive measures to


protect IT infrastructure and data.

You might also like