Shared publicly  - 
 
The Cisco ASA 5505 firewall may possibly be one of the most popular hardware #firewalls for small businesses for #networksecurity . The #Cisco ASA5505-BUN-K9 provides constant threat defensive abilities that stops attacks before they spread through your network, delivers flexible VPN connectivity, and controls network activity and application traffic.

Cisco #ASA series firewalls are a great to start to prevent your network from being compromised by these popular #networkattacks

Denial-of-Service Attack - The denial-of-service attack prevents normal operation of your computer or network by authenticated users. As the name suggest, you will be hosed and unable to perform normal functions on your PC.

Application-Layer Attack - An application-layer attack targets application servers by intentionally causing a error in a server's OS or applications.

Sniffer Attack - A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Compromised-Key Attack - A key is a secret code or number necessary to interpret secured information. This may be one of the less common attacks since it is so resource intensive to obtain information.

Man-in-the-Middle Attack - A man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently.

Password-Based Attacks - When an attacker finds a valid user account, the attacker has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker also can create accounts for more access at a later time.

Identity Spoofing - After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your information. The intruder can also perform other types of attacks.

Data Modification- After an attacker has read your data, the next logical step is to modify it. An attacker can alter the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit.

Eavesdropping - When an attacker is eavesdropping in your network, it is referred to as #sniffing or #snooping . The ability of an eavesdropper to monitor the network is generally the biggest security problem that admins face in an enterprise. Without strong encryption services that are based on cryptography, your packets can be read by others as it travels the network.
1
Add a comment...