What are some of the threats through VPNs?

What will be an ideal response?


Attacks on a company's network through a VPN are often indirect, and a result of successfully hacking a remote user's computer (or stealing a laptop). After successfully attacking the remote user's computer, the hacker can follow what that user does. If a VPN connection is sometimes used on the compromised computer, the hacker can acquire the necessary information and attempt to connect to the company network using the VPN connection. VPN connections are logged,but if the connection comes from a valid user and the passwords match, then the VPN server assumes the connection is valid.?A VPN connection of a valid user can be used to perform many attacks on a network, including DoS, session hijacking, and spoofing, as well as plain old theft, vandalism, and terrorism. Since the attacks are not considered a result of weaknesses in the VPN, they are deemed indirect attacks.

Computer Science & Information Technology

You might also like to view...

An empty binary tree has height

A) -1 B) 0 C) 1 D) None of the above: the height of an empty binary tree is not defined.

Computer Science & Information Technology

?Which of the following security incidents is least costly to fix?

A. ?theft of program source code B. ?alteration of corporate database C. theft of trade secrets D. defacing of web pages

Computer Science & Information Technology

With ____________________ recording, hard disks align the magnetic particles vertically, making much greater storage capacities possible.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Near-field communication devices send data at what fixed frequency?

a. 8.65 MHz b. 13.56 MHz c. 21.39 MHz d. 47.1 MHz

Computer Science & Information Technology