2. What is a network security threat?
• A network security threat is exactly that: a
threat to your network and data systems. Any
attempt to breach your network and obtain
access to your data is a network threat.
3. What are the main categories of network
security threats?
While there are many kinds of network security threats, there
are 4 main categories they fall into:
1. External threats
External threats are threats made to your business by outside
organizations, individuals, or even natural disasters that
could negatively disrupt your network. This is done by
exploiting a weakness, vulnerability, or causing a loss of
data that significantly affects business operations and the
cyber security of your network.
2. Internal threats
These are threats from malicious insiders, such as
disgruntled or improperly vetted employees who are working
for someone else. Unfortunately, internal threats are common
in many businesses. A 2022 report from Cybersecurity Insiders
found that 57% of organizations feel insider incidents have
become more frequent over the past 12 months.
4. 3. Structured threats
Structured threats are organized attacks by
cybercriminals who know what they’re doing and
have a clear aim or goal in mind.
4. Unstructured attacks
Unstructured attacks are disorganized attacks,
often by amateurs with no concrete goal in mind.
5. What is the difference between a threat and a
vulnerability?
• If threats are attackers throwing rocks at a
wall, a vulnerability is a weak spot in the
wall — a place where attackers can break a
window or pull out a loose rock and let
themselves in.
• Put simply, vulnerabilities are flaws in your
systems that can be exploited by attackers.
These are often not malicious errors, but
simply mistakes or things that have been
overlooked
6. What are common network threats?
Network threats come in a variety of forms and are constantly
evolving and changing. The most common threats are likely
familiar to you already.
1. Phishing attacks
Phishing attacks are attempts to trick people into opening
suspicious links or downloading malicious programs. They
range from the easily-spotted to sophisticated cons targeting
a specific individual.
2. Ransomware attacks
Often delivered via successful phishing
campaigns, ransomware enters your systems, encrypts your
data, and holds it hostage until you pay the attackers’
ransom. Once the ransom is paid, the attackers will allegedly
give you control of your data, but criminals don’t always
keep their word.
3. Malware
Any malicious program that enters your system, malware can be
ransomware, a virus, or a worm that infects first a device,
then the whole network.
7. 4. DDoS attacks
DDoS attacks overwhelm your servers with requests
for information, forcing sites, servers, and
applications to shut down.
5. Advanced Persistent Threats (APTs)
During an APT attack, an unauthorized attacker codes
into a system network, stays there quietly, and
collects information.
6. SQL Injection
SQL injection attacks inject malicious code into a
site or application using SQL queries in order to
exploit security vulnerabilities and obtain or
destroy private data.
8. How can you identify threats and
vulnerabilities?
When you have an idea of which cybersecurity threats exist, it
becomes easier to identify them and take steps to protect your
organization.
1. Watch your own network
The most important way to identify threats and vulnerabilities is
to make sure you can see them. You want to be able to look at your
defenses the way an attacker would, understanding the weaknesses in
your network and the threats most likely to affect your
organization.
2. Use threat intelligence
What sort of attacks are being launched, and which threats might
your organization attract? By understanding the threat landscape,
you can protect your organization against threats before they
happen.
3. Penetration testing
Where do your defenses buckle under pressure? Which employee is
likely to click a bad link in a suspicious email? You can’t know
until you test your defenses, and penetration testing is the best
way to do that.
9. 4. Manage permissions
By segmenting your network and managing permissions so that
not every employee can access every part of your network, you
can control who sees what — and also protect your network
against data breaches and malicious insiders.
5. Use a firewall
There’s no reason not to use firewalls, internally and
externally. Firewalls keep unauthorized users from getting
access to your network. They also keep tabs on the traffic
throughout your network.
6. Continuously monitor your network
Security needs to be constantly monitored to be effective.
Once you’ve set your controls, make sure they’re checked
regularly and updated often so that they can catch any new
vulnerabilities or threats that may target your network.