Denial-of-Service Attack:
In DOS Attack after gaining access to your network, the attacker can do any of the following:

  • Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.
  • Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.
  • Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.
  • Block traffic, which results in a loss of access to network resources by authorized users.

Intrusion:
The most common attacks on your systems are intrusions; with intrusions, people are actually able to use your computers. Most attackers want to use your computers as if they were legitimate users.

Buffer Overflows:
Buffer overflows are caused by users entering huge amounts of data into the forms of your website. This data is sent to the server an can cause the server to crash unexpectedly.

Session Hijacking:
A session is a link created once a user provides authentication (ie username and password) to gain access to a system or website. Session Hijacking is performed using tools that allow the hacker to take the authenticated user offline and then take over their session.