Page 208 - Computer_Science_F5
P. 208

expand their reach. Horizontal privilege  (ii) Routing table poisoning attacks
              escalation  involves  attackers  gaining   A routing table poisoning attack
              access  to  additional,  adjacent  systems,   involves the unauthorized modification
              and vertical escalation means attackers   of routing tables. Attackers can achieve   Chapter Three: Advanced Computer Networks
              gain a higher level of privileges for the   this by altering the routing information
          FOR ONLINE READING ONLY
              same systems.                            update packets sent by routers. This is a

                                                       significant issue because routing tables
              (vi) Insider threats                     are fundamental to Internet routing.
              A network is especially vulnerable to    Any incorrect entry can lead to severe
              malicious insiders who already have      consequences such as network congestion,
              privileged access to organizational      host overload, routing loops, unauthorized
              systems. Insider threats can be challenging   data access, and network partitioning.
              to detect and protect against because
              insiders do not need to penetrate the    (ii) Packet-mistreatment attacks
              network to harm.
                                                       Packet-mistreatment  attacks can occur

              Common network security                  during data transmission, where a hacker
              vulnerabilities                          intercepts and manipulates certain data
                                                       packets.  These  attacks  are challenging
              (i) DNS hacking attacks                  to detect  and can  cause  network
              The Domain Name System (DNS) server      congestion,  reduced  throughput,  and
              is a distributed, hierarchical, and global   denial-of-service (DoS) attacks.
              directory that  converts  domain  names
              into numerical IP addresses. As a critical   (iii) Denial-of-Service attacks
              infrastructure component, all hosts rely  Denial-of-service  (DoS) attacks  are
              on DNS to access servers and initiate  security  breaches  that  prevent  users
              connections. Normally, hosts send queries  from  accessing services  they  normally
              to DNS servers, which either reply with  use.  Although DoS attacks  do not
              the correct information or forward the  result in data theft or loss, they can be
              queries to more authoritative servers.  highly disruptive, potentially  costing
              Besides translating host addresses, DNS  the  target  significant  time  and  money.
              servers also store other information.    DoS  attacks  typically  target  specific
                                                       network services like email or DNS. For
              Name-resolution  services are crucial  instance,  attackers might  overwhelm  a
              for email transmission, web navigation,  DNS server, rendering it inoperable by
              and data transfer in the modern Internet.  causing  a  buffer  overflow  or  sending
              Consequently, DNS attacks can impact a  excessive queries.
              large segment of the Internet, potentially
              compromising  data  authenticity  and  DoS attacks are relatively easy to launch
              integrity.                               but difficult to detect. They can disable

                                                    199
               Student’s Book  Form Five



     Computer Science Form 5.indd   199                                                     23/07/2024   12:33
   203   204   205   206   207   208   209   210   211   212   213