Figures shared on https://www.linkedin.com/company/cybersecurity-news
L7: Exploit Attack: SQL Injection, JAVA Framework Log4Shell
L6: PHISHING: Email Receiver content
L5: HIJACKING:MAN in the Middle in Session Layer , Proxy --> Session layer handshake
L4: DOS: SYN Flooding
L3: ICMP Redirect, IP Spoofing
L2: ARP Spoofing
L1: Sniffer
Using Sniffer to sniff pass words , DNS Flooding
Figures shared https://www.linkedin.com/company/cybersecurity-news/
Botnets: Zombie Network
MITM: Proxy
DNS Spoofing: DNS Forwarder
IP Spoofing: LAN ( MAC--> IP, ARP Cache)
DDos: Syn Flooding, ICMP Flooding
Rootkit: malware
A finance company has topology to service its IT/OT operations which consist of
A. servers Section: database, file and application servers
B. Employee Section: Employee computers to access internal and Internet resource
C. Mobile Section : Access point for guest users and internal users
D. Remote Sections: Allow branch office using VPN to access servers
Draw a Diagram using cacoo (https://cacoo.com/)
network topology templet
Download Cyber-Security book, read chapter 1-3 and write your feedback & comments