View Post

Two Common Router Security Threats

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 4 of 10 in the series Intrusion Detection

Syn Flood or Denial of Service Attack Syn Flood attacks, often referred to as Denial of Service Attacks are caused through exploitation of the TCP protocol. The attacker sends a large number of TCP/SYN packets using a forged address. Because of this, the destination server is unable to successfully establish a proper connection due to the source being unreachable. Lawrence …

Share
View Post

What are Rogue Access Points?

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 3 of 10 in the series Intrusion Detection

WiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways to lure victims by using rogue access points. These are essentially wireless access points that have been installed in a network without authorization. In some cases these may have been installed by employees of an organization for convenience reasons, however this …

Share