computer network attacks.ppt
-
Upload
radhey-raj -
Category
Documents
-
view
50 -
download
0
description
Transcript of computer network attacks.ppt
![Page 1: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/1.jpg)
The protection of networks and their services from unauthorized modification, destruction or disclosure and provision of assurance that the network performs its critical functions correctly and there is no harmful side effects.It includes Authentications, Access control, Data Integrity, Data confidentiality and Availability.Basic aim of Network Security is to protect the networked computers and network operations from hackers and Attackers.
![Page 2: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/2.jpg)
Network Security Includes Two Types Of Securities…..
DATA INFORMATION SECURITY
COMPUTER SECURITY
![Page 3: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/3.jpg)
DATA INFORMATION SECURITY
protection of information Travelling through a communication medium from unauthorized access and loss. On
internet or any network of an organization, thousands of information are exchanged daily. These information can be misused by attackers.
![Page 4: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/4.jpg)
![Page 5: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/5.jpg)
• to manage the acknowledgement of messages received by any node in
order to protect from denial by sender in specific situations.• to protect the message from unwanted delay in the transmission lines in order to deliver it to required destination in time.• to protect the data from wandering the data packets or information packets in the network for infinitely long time.
![Page 6: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/6.jpg)
COMPUTER SECURITYprotection of an individual
system’s data from hackers. Computer security means to protect our system from unwanted damages caused due to network. One of the major reason for such damages are the viruses that can wipe off all the information from our hard disk or some times may cause hardware problems.
![Page 7: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/7.jpg)
• it should be protected from replicating and capturing viruses from infected files.
• it needs a proper protection from worms .
• there is a need of protection from Trojan Horses as they are enough dangerous for our computer.
![Page 8: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/8.jpg)
Any software or person that deliberately attempts to evade security services and violate the security policy of the networked system is called Attacker.
Such a program or person intentionally attempts to gain unauthorized access to information resources. They sometimes, also prevent legitimate access to those resources.
An unauthorized activity uses specially crafted codes or techniques is called an Attack.
![Page 9: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/9.jpg)
PASSIVE ATTACK in it the attacker only
monitors the transmission and accesses the data in an unauthorized manner. They are difficult to detect.
ACTIVE ATTACKit involves reading of data
messages along with modifications or changes to it in an unauthorized way. They are difficult to prevent.
![Page 10: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/10.jpg)
PASSIVE ATTACK in it the attacker only looks
and watches the transmission and does not try to modify or change the data packets.There are two types of Passive Attacks…
1.Release of message contentsthe attacker only looks the
messages and reads them in an unauthorized way.
2.Traffic Analysisthe attacker masks ( does not
change ) the message in such a way that the authorized user either can not access it or can not understand the message properly.
![Page 11: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/11.jpg)
User A User BP1 P1P1P1P1 P1 P1 P1 P1P1P1P1P1P1P1P1
DURING PASSIVE ATTACK
User C
Unauthorized access
P1 P1P1P1P1 P1 P1 P1 P1P1P1P1
P1
P1P1P1
P1P1P1P1P1P1P1
P1
![Page 12: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/12.jpg)
ACTIVE ATTACK (CASE 1 : modification of message)
the attacker creates a new message and sends it to destination instead of original message.
User A User B
P1 P1P1P1P1 P1 P1 P1 P1P1P1P1P1P1P1P1
User C
P1 P1 P1
P1P
1
P1 Pkt
Pkt
Pkt
Pkt PktPkt
Unauthorized access & modification
![Page 13: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/13.jpg)
ACTIVE ATTACK (CASE 2: Masque Rade)
the attacker appears to be an authorized one to other users. In such cases the attacker manipulates everything according to his wish.
User A User BI am User
A
User C
Pk PktPk
Fr
Frm
Fr
FrFrmFrmFrmFrmFr
![Page 14: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/14.jpg)
ACTIVE ATTACK (CASE 3: Replay)in it the attacker captures the data unit and subsequent retransmits it to the destination
to produce an unauthorized effect.
User A User B
User C
P1 P1 P1
P1P
1
P1 Pkt
Pkt
Pkt
Pkt PktPkt
Unauthorized access & retransmission
Pkt
Pkt
Pkt PktPkt
![Page 15: computer network attacks.ppt](https://reader034.fdocuments.us/reader034/viewer/2022051322/5465aa9caf79596f338b4e56/html5/thumbnails/15.jpg)
ACTIVE ATTACK (CASE 4: Denial of Service)
Denial of service prevents the normal management/use of communication facilities. In such attacks all messages directed to a particular
destination may be suppressed, entire network may be disrupted or performance of network may be degraded due to disabling of network.
User A User B
User C
Can not access network facilities
Service provided by server disrupted