Ask Learn Preview
Please sign in to use this experience.
Sign inThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
As networks expand and change to meet our ever-growing needs, they become more susceptible to attacks. Providing a strong network security perimeter is essential to protect your data and resources. Cybercriminals will exploit any weakness to try to break into your network. The ways in which networks can be attacked are too numerous to cover here. Let's consider the more common ones:
In this short video, you'll see a simplified simulation of how each of these attacks work.
For the adversary-in-the-middle attack, to keep it simple, we chose to only use one route. With the DDoS attack, hundreds of thousands, or even tens of millions, of computers are used. Again, for simplicity, we've only shown a handful.
Most cybercriminals look to exploit your network to gain data they can sell and to cause maximum disruption. However, with a lateral movement attack, the primary focus isn't to smash and grab, but to break in undetected. The aim of a lateral movement attack by cybercriminals is to try to gain advantage of, or extend their presence in your network, with the primary goal of finding sensitive and valuable information. Some cybercriminals, having successfully infiltrated your network to the top level using lateral movement, may choose to sell those access credentials to the highest bidder.
Good threat detection and protection software will allow you to spot abnormal behavior on your network, flag it, and even mitigate the cyberattack.
Having an issue? We can help!
Please sign in to use this experience.
Sign in