Page 927 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 927

Prevent or Mitigate Network Attacks


               Communication systems are vulnerable to attacks in much the same
               way any other aspect of the IT infrastructure is vulnerable.
               Understanding the threats and possible countermeasures is an

               important part of securing an environment. Any activity or condition
               that can cause harm to data, resources, or personnel must be
               addressed and mitigated if possible. Keep in mind that harm includes
               more than just destruction or damage; it also includes disclosure,
               access delay, denial of access, fraud, resource waste, resource abuse,

               and loss. Common threats against communication system security
               include denial of service, eavesdropping, impersonation, replay, and
               modification.


               DoS and DDoS

               A denial-of-service (DoS) attack is a resource consumption attack that

               has the primary goal of preventing legitimate activity on a victimized
               system. A DoS attack renders the target unable to respond to
               legitimate traffic.

               There are two basic forms of denial of service:

                    Attacks exploiting a vulnerability in hardware or software. This
                    exploitation of a weakness, error, or standard feature of software
                    intends to cause a system to hang, freeze, consume all system
                    resources, and so on. The end result is that the victimized

                    computer is unable to process any legitimate tasks.

                    Attacks that flood the victim’s communication pipeline with
                    garbage network traffic. These attacks are sometimes called traffic
                    generation or flooding attacks. The end result is that the victimized
                    computer is unable to send or receive legitimate network
                    communications.


               In either case, the victim has been denied the ability to perform
               normal operations (services).

               DoS isn’t a single attack but rather an entire class of attacks. Some
   922   923   924   925   926   927   928   929   930   931   932