Cross-Site Scripting (XSS): Attackers inject malicious scripts into web pages viewed by users, allowing them to steal sensitive information or perform unauthorized actions.
SQL Injection: Attackers exploit vulnerabilities in web applications to execute malicious SQL queries, potentially accessing or manipulating the underlying database.
4. ARP (Address Resolution Protocol):
5. ICMP (Internet Control Message Protocol):
6. DHCP (Dynamic Host Configuration Protocol):
7. DNS (Domain Name System):
DNS Cache Poisoning: Attackers manipulate DNS responses to redirect users to malicious websites or intercept their traffic.
DNS Amplification: Attackers send small DNS queries with spoofed source IP addresses to open DNS resolvers, causing them to send large responses to the targeted victim, leading to a Distributed Denial of Service (DDoS) attack.
To mitigate these vulnerabilities, it is important to apply security best practices such as implementing firewalls, intrusion detection/prevention systems, secure configurations, regular patching, encryption (e.g., SSL/TLS), and monitoring network traffic for any suspicious activity.
2.2. Explain how network addresses impact network security
Network addresses play a significant role in network security as they help determine the scope, accessibility, and security boundaries of network resources. Here's how different types of network addresses impact network security:
1. IPv4 and IPv6 Addresses:
IP addresses uniquely identify devices on a network. They enable communication between devices and facilitate the routing of network traffic.
Security implications: IP addresses can be used to identify potential targets for attacks. Attackers may perform IP-based scanning or targeting specific IP ranges for vulnerability exploitation.
2. MAC Addresses:
MAC addresses are unique identifiers assigned to network interface cards (NICs) at the hardware level. They operate at the data link layer of the network stack.
Security implications: MAC addresses can be used for MAC spoofing, where attackers forge or change their MAC address to bypass network access controls or perform unauthorized activities on the network.
3. Network Segmentation:
Network segmentation involves dividing a network into smaller subnetworks to create separate security zones. Each segment can have its own security policies and access controls.
Security implications: Network segmentation helps contain and limit the impact of security incidents by isolating resources and controlling communication between segments. It reduces the attack surface and restricts lateral movement for attackers.
4. CIDR Notation:
Classless Inter-Domain Routing (CIDR) notation is used to allocate and represent IP address ranges. It specifies the network prefix and the number of significant bits in the address.
Security implications: Proper CIDR notation ensures efficient allocation of IP addresses and helps in implementing access controls based on network ranges. It aids in managing network traffic and implementing security policies at a granular level.
5. Network Address Translation (NAT):
NAT is a technique used to translate private IP addresses used within a local network to a public IP address for communication with external networks.
Security implications: NAT provides a level of security by hiding internal IP addresses from external networks, making it more challenging for attackers to directly target internal devices. It adds an additional layer of protection against certain types of attacks, such as IP-based scanning.
6. Public vs. Private Networks:
Public networks are accessible over the internet, while private networks are restricted to a specific organization or local area.
Security implications: Public networks are exposed to a larger threat landscape, requiring robust security measures such as firewalls, intrusion detection systems, and encryption. Private networks provide a controlled and isolated environment, reducing the exposure to external threats.
Properly managing and securing network addresses is crucial for maintaining network security. This includes implementing access controls, firewall rules, network segmentation, intrusion detection/prevention systems, and monitoring network traffic to detect and mitigate potential security threats.