{"id":12534,"date":"2021-08-13T09:10:07","date_gmt":"2021-08-13T13:10:07","guid":{"rendered":"https:\/\/tsisupport.com\/?post_type=glossary&#038;p=12534"},"modified":"2022-01-28T00:05:20","modified_gmt":"2022-01-28T05:05:20","slug":"network-security-threats","status":"publish","type":"glossary","link":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats","title":{"rendered":"Network Security Threats &#038; Network Security Attacks"},"content":{"rendered":"<h2><b>What are Network Security Attacks<\/b><\/h2>\n<p>Network Security Attacks are unauthorized actions taken against digital assets within a network.<\/p>\n<h2><b>How to Prevent Network Security Attacks<\/b><\/h2>\n<p>Given the ever-changing landscape of Information Technology, it\u2019s important to ensure that all aspects of a computer network are secure. To do this, you must first identify threats to network security and know exactly what network security threats are. To do this, it is best to ask some important questions about a given environment.<\/p>\n<p>\u201cWhat network security attacks are available to malicious actors?\u201d<\/p>\n<p>To answer this question, it\u2019s important to understand that almost all modern computing devices are now network devices in one way or another. From smartwatches to wi-fi enabled IoT endpoints, most devices are reachable over a network. This can be a physical network or a form of wireless. The most important thing though, is that hackers do not always need physical access to devices in order to attack them.<\/p>\n<p>\u201cWhat means do they have to get into a specific network?\u201d<\/p>\n<p>Unfortunately, network attacks can be conducted from a wide variety of locations. Websites and wireless networks, longtime attack vectors, are not the only means. With many services such as cloud email and online storage gaining mainstream acceptance, comes the reality that many network attacks can take place over the internet since cloud connections are exposed 24\/7\/365. From eavesdropping on an unencrypted connection to rerouting users to malicious websites via DNS poisoning, there are many vectors for hackers to exploit and gain access to a trusted network.<\/p>\n<p>Have all attack surfaces been considered?<\/p>\n<p>Only once this question is answered can network security threats be considered fully addressed. This requires a thorough review of ALL devices, applications, and accounts that have access to a corporate network. It is meticulous work and requires an in-depth understanding of network security threats and attack methods.<\/p>\n<p>These questions are a great starting point, and questions that should always be asked when assessing network security threats for any organization. Once they have been answered, security teams and network administrators can start the process of hardening and defending against network security threats, no matter their origin.<\/p>\n","protected":false},"featured_media":12588,"template":"","meta":{"_links_to":"","_links_to_target":""},"categories":[379],"glossaries":[377],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Threats | Network Security Attacks | TSI<\/title>\n<meta name=\"description\" content=\"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Threats | Network Security Attacks | TSI\" \/>\n<meta property=\"og:description\" content=\"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T05:05:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats\",\"name\":\"Network Security Threats | Network Security Attacks | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg\",\"datePublished\":\"2021-08-13T13:10:07+00:00\",\"dateModified\":\"2022-01-28T05:05:20+00:00\",\"description\":\"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg\",\"width\":750,\"height\":422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossaries\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/?post_type=glossary\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Security Threats &#038; Network Security Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Threats | Network Security Attacks | TSI","description":"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Network Security Threats | Network Security Attacks | TSI","og_description":"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats","og_site_name":"TSI Support","article_modified_time":"2022-01-28T05:05:20+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats","url":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats","name":"Network Security Threats | Network Security Attacks | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg","datePublished":"2021-08-13T13:10:07+00:00","dateModified":"2022-01-28T05:05:20+00:00","description":"Are you prepared for network security threats? Learn more about what network security threats look like and how to prevent network security attacks.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2021\/08\/Network-Security-Threats.jpg","width":750,"height":422},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?glossary=network-security-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Glossaries","item":"https:\/\/tsisupport.com\/tsistaging\/?post_type=glossary"},{"@type":"ListItem","position":3,"name":"Network Security Threats &#038; Network Security Attacks"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/glossary\/12534"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/12588"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12534"},{"taxonomy":"glossaries","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fglossaries&post=12534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}