Page 208 - Computer_Science_F5
P. 208
expand their reach. Horizontal privilege (ii) Routing table poisoning attacks
escalation involves attackers gaining A routing table poisoning attack
access to additional, adjacent systems, involves the unauthorized modification
and vertical escalation means attackers of routing tables. Attackers can achieve Chapter Three: Advanced Computer Networks
gain a higher level of privileges for the this by altering the routing information
FOR ONLINE READING ONLY
same systems. update packets sent by routers. This is a
significant issue because routing tables
(vi) Insider threats are fundamental to Internet routing.
A network is especially vulnerable to Any incorrect entry can lead to severe
malicious insiders who already have consequences such as network congestion,
privileged access to organizational host overload, routing loops, unauthorized
systems. Insider threats can be challenging data access, and network partitioning.
to detect and protect against because
insiders do not need to penetrate the (ii) Packet-mistreatment attacks
network to harm.
Packet-mistreatment attacks can occur
Common network security during data transmission, where a hacker
vulnerabilities intercepts and manipulates certain data
packets. These attacks are challenging
(i) DNS hacking attacks to detect and can cause network
The Domain Name System (DNS) server congestion, reduced throughput, and
is a distributed, hierarchical, and global denial-of-service (DoS) attacks.
directory that converts domain names
into numerical IP addresses. As a critical (iii) Denial-of-Service attacks
infrastructure component, all hosts rely Denial-of-service (DoS) attacks are
on DNS to access servers and initiate security breaches that prevent users
connections. Normally, hosts send queries from accessing services they normally
to DNS servers, which either reply with use. Although DoS attacks do not
the correct information or forward the result in data theft or loss, they can be
queries to more authoritative servers. highly disruptive, potentially costing
Besides translating host addresses, DNS the target significant time and money.
servers also store other information. DoS attacks typically target specific
network services like email or DNS. For
Name-resolution services are crucial instance, attackers might overwhelm a
for email transmission, web navigation, DNS server, rendering it inoperable by
and data transfer in the modern Internet. causing a buffer overflow or sending
Consequently, DNS attacks can impact a excessive queries.
large segment of the Internet, potentially
compromising data authenticity and DoS attacks are relatively easy to launch
integrity. but difficult to detect. They can disable
199
Student’s Book Form Five
Computer Science Form 5.indd 199 23/07/2024 12:33

