Skip main navigation

New offer! Get 30% off your first 2 months of Unlimited Monthly. Start your subscription for just £29.99 £19.99. New subscribers only. T&Cs apply

Find out more

Typical Attacks Against a Network Continued

In this video, you will continue to learn about the typical strategies used by hackers to breach a network.
6.5
Now, the last one we go over is called the insider threat. Now, an insider threat, I would say it would be one of the most dangerous type of attacks. Now, insider threat means it’s an individual inside your organisation, your network, whatnot. Most likely, it’s an employee. Now, what makes this so dangerous is the person inside your company works one of two ways. One is they’re intentionally trying to damage your network. Now, the problem with this is they already have access to your network on some level, because they are an employee, for example. They have some level of credentials to get on your network and do things. So this could be extremely dangerous. Because again, they already have access.
52.3
They don’t need to try to break into your network. The other type of insider attack is when a user does not know they’re doing something dangerous, that they’re accidentally deleting files or accidentally clicking on a phishing email and installing that payload. They’re getting a vishing call. A vishing call is much like a spear phishing attack, but it’s over the phone. Someone calls and says they’re with IT and, hey, I’m going to email you this file. Please click on it, open it up. And they do, and it causes havoc on your network. It might be ransomware. These are different types of insider threats. We’ll be going over this, how to mitigate that.
89.9
But again, insider threat is someone on your network from within. And either they’re intentionally trying to damage your network or unintentionally trying to damage your network because they just don’t know. So these are typical attack methods. So reconnaissance, again, the first phase of hacking, typically a nonintrusive attack that is intended to gather information on the target. Virus and ransomware, typically destructive and malicious software that can be used to a variety of ends. Phishing and spear phishing attacks, an email attack vector that oftentimes will spoof an email address with an intention of the user to give up critical information, click a link, open a file, or take other actions.
134.1
HID attacks, the simplest attack is to arm a USB drive with a payload and leave it somewhere to be found. DOS or DDoS attacks, denial of service or distribute denial of service attacks, these can be used to crash a network or used as a distraction. Insider threats, insider threat can be an intentional insider threat, or it can be an unaware one. So wrapping up, not all attacks are destructive. With the case of reconnaissance phase of hacking, this is a prime example of a nondestructive attack. Multiple attacks for multiple reasons, an attacker can use a variety of attacks to achieve different goals. Not all participants are willing.
179.8
An unaware user can be an unwitting accomplice to bringing your network down or compromising it. So this was about typical attacks against your network. In the next video, we’ll be taking a look at denial of service attacks and DDoS attacks. Thank you for watching. I’ll see you in the next video.

In this video, you will continue to learn about the typical strategies used by hackers to breach a network, with a focus on insider threat as the most dangerous threat to a network.

Insider threats refer to attacks that come from a person within your organization. This video will explain why a person would intentionally attack an organization they are a part of and how a person can be targeted and used to enact an insider attack without their awareness.

Reflect and share: Which of the types of attacks reviewed in this video and the previous video do you think you are most vulnerable to and why? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now