Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

Network Security

Technologies
Overview

Network Security Threats

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-1


Vulnerabilities

Any point in a software package


that enables a user to alter the
software or gain access to a
system (that was not specifically
designed into the software) is
called a vulnerability

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-2


Vulnerabilities

Main reasons:
1. Lack of effective network security
policy
2. Network configuration weaknesses
3. Technology weaknesses

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-3


Threats

1.Structured threats
2.Unstructured threats

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-4


Intruder Motivations

1. Lack of Understanding of Computers or


Networks
2. Intruding for Curiosity
3. Intruding for Fun and Pride
4. Intruding for Revenge
5. Intruding for Profit
6. Intruding for Political Purposes

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-5


Types of Network Attacks

1.Reconnaissance attacks
2.Access attacks
3.DoS attacks

© 2006 Cisco Systems, Inc. All rights reserved. SNRS v2.0—1-6

You might also like