top of page
Writer's pictureHarisuthan

Types Of Intrusion



In-general intrusion is an process/technique to penetrates into an system/organization by exploiting the vulnerabilities, this specific process are an entry points/gateways of an successful cyber attacks


the unauthorized users/hackers keep on tries to penetrate into an organization to get an initial foothold, this can achieved by by exploiting vulnerabilities at various entry point,



Types of intrusion
  1. Web Based Intrusion

  2. Network Based Intrusion

  3. Host Based Intrusion

Web Based Intrusion

The process of targeting an publicly hosted web sited in an organization, in-general web based intrusion are the majorly targeted entry points by the attackers


As per recent stats 82 percent of cyber attack are happens based on web Based Intrusion


Dis-Advantages

  1. Easily accessible

  2. No user restriction can be applied

  3. Major vulnerabilities can exploiter

  4. One out of five vulnerabilities has high severity.

  5. Highly targetable

Network Based Intrusion

The process of targeting an vulnerable network connections likes open port, improper network monitoring, etc. often attackers gather more information via network.


in-general network based intrusion are comparatively harder than an web bases intrusion.


Dis-Advantages

  1. Easy to gather more information about target

  2. ports vulnerabilities can exploiter

  3. Network based


Host Based Intrusion

The process of targeting an end system [Computer | Servers] these specifics process are comparatively too hard due its restrictions, in-general host based intrusion are the majorly targeted to exfiltrate sensitive data.


Conclusion:

For an successful cyber attacks the attackers needs an initial foothold withing the target this can be achieved by three entry points

  1. Web Based Intrusion

  2. Network Based Intrusion

  3. Host Based Intrusion



172 views0 comments

Recent Posts

See All

Comentários


bottom of page