Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the types of network attacks

2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

What are the types of network attacks? In view of this problem, this article introduces the corresponding analysis and answers in detail, hoping to help more partners who want to solve this problem to find a more simple and feasible way.

Public network attacks are Trojans, viruses, spam and other attacks on the public network, which directly hit the firewall.

Intranet attacks are things that are normal protocols in the local area network, and then you deliberately send multiple and spam these protocols, and use these legal protocols to do network attacks. In fact, external network attacks are not terrible. The real headache is the 108 attacks on the intranet, because it itself is legal!

If you attack on a public network, just contact the firewall.

But it is calculated that 80% of the problems now appear on the intranet.

To deal with intranet attacks, we have to choose the immune wall.

The immune wall is designed for local area network security and management, and we can think of it as

1. It is a set of underlying firewall in the intranet: thoroughly solve the network attacks, disconnection and stagnation of Trojans (especially for layer 2 and layer 3).

No one can solve the problem of ARP (innate immunity, ARP exploration).

2. It is a set of real identity admittance system: strict and effective management of the identity of terminal computers in the network (real IP, MAC,CPU hard disk motherboard, genetic type). Complete resolution of IP spoofing (private pull, cloning, IP conflicts)

3. It is a set of network bandwidth management equipment: fine internal network bandwidth management, load balancing, traffic statistics (internal and external network, server, application delivery)

4. It is a set of comprehensive network management software: observing the process of network internal protocols, remote debugging management (monitoring center, audit)

5. It is a set of comprehensive network management software: observing the process of network internal protocols, remote debugging management (monitoring center, audit)

The answers to the questions about the types of cyber attacks are shared here. I hope the above content can be of some help to you. If you still have a lot of doubts to be solved, you can follow the industry information channel to learn more about it.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report