The basic types of network attacks include external network attacks and internal network attacks; external network attacks are some Trojans, viruses, spam and other attacks on the public network, which directly hit the firewall to deal with internal network attacks. If so, the only option is to use an immune wall.
#The operating environment of this article: Windows 7 system, Dell G3 computer.
Generally speaking, they are external network attacks, and internal network attacks
External network attacksare some Trojans, viruses, Attacks such as spam directly hit the firewall. In the case of intranet attacks, they are some normal protocols in the local area network. Then you deliberately send multiple and spam these protocols, and use these in themselves. Legal protocols are used to conduct network attacks. Attacks on the external network are actually not terrible. What is really troublesome is the 108 types of attacks on the internal network, because it itself is legal! ! !
If there is an attack on the external network, just contact the firewall
But according to calculations, 80% of the problems now occur on the internal network,
To deal with internal network attacks If so, the only choice is to use an immunity wallThe immunity wall is specifically targeted at LAN security and management. We can think of the immunity wall as
1. It is a set of internal network bottom-layer firewalls: Completely solve the network attacks of viruses and Trojans, and the problems of disconnection and lag (especially the processing of layers 2 and 3)
Solving the problem of ARP (innate immunity, ARP exploration) no one can do it
2. It is a real identity access system: strict and effective management of the identity of terminal computers in the network (real IP, MAC, CPU hard disk motherboard, genetic type). Completely solve IP spoofing (private connections, cloning, IP conflicts)
3. It is a set of network bandwidth management equipment: sophisticated intranet bandwidth management, load balancing, traffic statistics (internal and external networks, servers, application delivery)
4. It is a set of comprehensive network management software: observe the internal protocol process of the network, remote debugging management (monitoring center, audit)
5. It is a comprehensive set of network management software: observe the internal protocol process of the network , Remote debugging management (monitoring center, audit)
Related video recommendations:PHP programming from entry to proficiency
The above is the detailed content of What are the basic types of cyber attacks?. For more information, please follow other related articles on the PHP Chinese website!