security standard_Task1.docx Security Policies and Standards, Best Practices– VLT2 Subject: - Task 1 A1: THREATS TO SERVER 1.Denial of service: In this form of attac
...
security standard_Task1.docx Security Policies and Standards, Best Practices– VLT2 Subject: - Task 1 A1: THREATS TO SERVER 1.Denial of service: In this form of attack, a request is sent to the server beyond what it can handle, the most common is flooding the server with ping requests (ping of death) is sent to the server, which will engage the server all through the duration denying the server from responding to legitimate traffic. 2.Social engineering: For such an organization where user security awareness training may be lacking. Users especially the server admin users may fall for this social engineering attack via phishing to steal admin credential that can aid the attacker in gaining access to the server and compromise its data. 3.Operating system vulnerability: The operating system running on the server might not be patch with the current security update from the vendor. For instance, Microsoft release patches including critical security patches every Tuesday. Important security updates including zero-day fixes are released during this time. Any server that did not receive such update become vulnerable. An attacker can exploit such server to ex-filtrate important data stored in the server. 4.Malware: When a server is infected with some malware, it exhibits behavior like been extremely slow to respond. This can be in the form of a worm, virus, rootkits. Even ransomware can infect such server, lock it down and request ransom in the form of bitc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . .
[Show More]