Attack lecture #2 ppt

17
INFORMATION SECURITY

Transcript of Attack lecture #2 ppt

Page 1: Attack lecture #2 ppt

INFORMATION SECURITY

Page 2: Attack lecture #2 ppt

TOPIC

ATTACK

Page 3: Attack lecture #2 ppt

DEFINITION:

Attack is any attempt to destroy, expose, alter, disable, steal

or gain unauthorized access to or make unauthorized use

of an asset

Page 4: Attack lecture #2 ppt

ATTACK TYPES

Passive Attack

Active Attack

Insider Attack

Close-in Attack

Phishing Attack

Hijack Attack

Spoof Attack

Buffer Overflow Attack

Exploit Attack

Password Attack

Page 5: Attack lecture #2 ppt

PASSIVE ATTACK

Passive attack attempts to take the information from the system and does not affect any system resources and its operations.

Page 6: Attack lecture #2 ppt

ACTIVE ATTACK

Active attack attempts to change the system resources or affect their usual operations.

Page 7: Attack lecture #2 ppt

INSIDER ATTACK

An insider attack involves someone from theinside, such as a disgruntled employee, attacking thenetwork.

Page 8: Attack lecture #2 ppt

CLOSE – IN ATTACK

A close-in attack involves someone attempting to getphysically close to network components, data, andsystems in order to learn more about a network.

Page 9: Attack lecture #2 ppt

PHISHING ATTACKIn phishing attack the hacker creates a fake web site that

looks exactly like a popular site. The phishing part of the

attack is that the hacker then sends an e-mail message

trying to trick the user into clicking a link that leads to the

fake site. When the user attempts to log on with their

account information, the hacker records the username and

password and then tries that information on the real site.

Page 10: Attack lecture #2 ppt

HIJACK ATTACK

In a hijack attack, a hacker takes over a session between

you and another individual and disconnects the other

individual from the communication. You still believe

that you are talking to the original party and may send

private information to the hacker by accident.

Page 11: Attack lecture #2 ppt

SPOOF ATTACK

In a spoof attack, the hacker modifies the source

address of the packets he or she is sending so that

they appear to be coming from someone else. This

may be an attempt to bypass your firewall rules.

Page 12: Attack lecture #2 ppt

BUFFER OVERFLOW ATTACK

A buffer overflow attack is when the attacker sends more

data to an application than is expected. A buffer overflow

attack usually results in the attacker gaining administrative

access to the system in a command prompt or shell.

Page 13: Attack lecture #2 ppt

EXPLOIT ATTACK

In this type of attack, the attacker knows of a security

problem within an operating system or a piece of software

and leverages that knowledge by exploiting the

vulnerability.

Page 14: Attack lecture #2 ppt

PASSWORD ATTACK

An attacker tries to crack the passwords stored in a

network account database or a password-protected file.

Page 15: Attack lecture #2 ppt

TYPES OF PASSWORD ATTACK

Dictionary attack

Brute-force attack

Hybrid attack.

Page 16: Attack lecture #2 ppt

DEFINITIONS

A dictionary attack uses a word list file, which is a list of

potential passwords.

A brute-force attack is when the attacker tries every possible

combination of characters.

A hybrid attack builds on the dictionary attack method by

adding numerals and symbols to dictionary words

Page 17: Attack lecture #2 ppt

THANK U