Member-only story

Cyber Security: More Network Attacks

Jesse L
3 min readOct 6, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored and transmitted digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some network attack methods and strategies that attackers might use so you can be aware of them. This is a continuation of Cyber Security: Types of Network Attacks which can be found here.

IP/MAC Spoofing

An attacker masks their IP or Media Access Control(MAC) address to appear to look like another IP or MAC address. Attackers can use IP or MAC spoofing to bypass authentication and security checks, and also to gain access to data. This is also a technique that can be used with Man-In-The-Middle(MiTM) attacks.

DNS Poisoning

DNS Poisoning or more specifically, DNS cache poisoning, occurs when data in DNS servers are modified and results to pointing to a different IP address. Attackers are capable of redirecting web traffic to a different location. Attackers may do this for a number of reasons including to steal information or to simply block a target site.

URL Hijacking and Typo Squatting

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

No responses yet