Attacks On systems And Networks To understand how we can protect our system and network we need to...
-
Upload
brian-lyons -
Category
Documents
-
view
214 -
download
0
Transcript of Attacks On systems And Networks To understand how we can protect our system and network we need to...
![Page 1: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/1.jpg)
Attacks On systems And Networks
To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would use.
Its important to understand that there is different kinds of attacks, and that a attack can either concentrated on you / your system, or a wide range attacks, that scans for weak systems to attack.
![Page 2: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/2.jpg)
Attacks On systems And Nettwoks
We have 5 kinds of attacks:
Basic AttackIdentity AttackDenial of Service AttackMalicious Code Attack
![Page 3: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/3.jpg)
Attacks On systems And Nettwoks
Basic Attacks
Basic attacks are attacks that not always require a high degree of technical skill, but sometimes rely more on guesswork and cunning than anything else.
We divide Basic Attacks into subcategories:
Social engineering Tricks people to give you information Phissing attempts Dumpster diving
Password guessing Brute force attacks Dictionary attacks
Weak keys Exploits weak encryption keys with a known hack
Mathematical and birthday attacks
![Page 4: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/4.jpg)
Identity Attacks
Identity attack, is an attack where the attacker tries to take over, modify or sniff your network traffic.
We have three types of Identity attacks:Man-in-the middle
Passive attack, just captures the data traffic Active attack, captures and modify the data before sending it to the
receiverReplay attack
Captures data sent between a user and a server, then sends a fragment of the captured data back to the server to obtain access without user name and password.
Tcp/ip hijacking ARP Spoofing, edits the ARP table to send a packet to another
destination then targeted.
![Page 5: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/5.jpg)
Denial Of Service Attack
A DOS attack tries to take down your system by flooding it with request such as SYN request or ping request
Denial of service(Dos) Requests contact with a server(SYN), and does not answer to the AKC
reply from the server, this causes the server to wait for an answer for several minutes, and this use a lot of resources.
Smurf Attack. The attacker sends a ping request to a victim with a spoofed senders address, causing the victim to answer to the spoofed address.
Distributed Denial of service(DDos) Uses hundreds or thousands of computers to attack a system. A hacker breaks into a high performance computer and installs a special
software. The software scans for other vulnerability on them, if found, installs a software. These computers are called zombies. Attacker only sends a attack commando to the handler. The handler spreads the message to all the zombies and the attack launches.
.
![Page 6: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/6.jpg)
Malicious Code
Malicious code, also called malware, consist of computer programs design to break into computers or to destroy data.
These are the most common types of malware:
Virus A small program secretly attached to another file, executes when file is
opened.Worms
Self-executing program, that often are attached to e-mail.Logic bombs
A small program that gets executed by a special event such as a date or a change in a program/file.
Trojan Horses A program that hides its true intent and then reveal itself when activated.
Might be a screen saver that sends information back to a hacker. Back doors
A secret entrance into a computer of which the user is unaware of. A back door can be created by the software designer for testing purposes,
or by a hacker how creates a virus / Trojan horse, and distributes it.
.
![Page 7: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/7.jpg)
How perform these attacks?
People how perform these kinds of attacks usually do it for a reason. It can either be motivated by money or it can be done to earn respect among a special group of people.
Hackers A hacker hacks your system to find a problem, and let you know, so that
crackers wont exploit it.Crackers
Have intent to harm or take over your system.Script kiddies
A unskilled user how downloads a software to perform an attackSpies
A person who has been hired to break into the the system to get information
Employees Might insert a virus to the system if they feel overlooked....
Cyberterrosists Defacing, ddos attacks
.
![Page 8: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/8.jpg)
How can we protect our self against attacks from hackers and crackers?
Update Operating systemUpdate network servicesUpdate softwareHave good procedures among employees Educate your users
![Page 9: Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.](https://reader036.fdocuments.us/reader036/viewer/2022082711/56649ebe5503460f94bc847f/html5/thumbnails/9.jpg)
Source::
Security + guide to Network Security fundamentals (second edition)