Professional Documents
Culture Documents
Agenda
1.Understanding Network Attacks. 2.Reasons why attackers attack networks. 3.Different types of malicious activities. 4.Types of Network Attacks.
Possible motives for structured external threats include: Greed Politics Terrorism Racism Criminal payoffs
4)Modifying stored data. 5) Stealing data. 6)Performing actions that prevent authorized user from accessing network services and resources.
TYPES OF NETWORK ATTACKS:There are eight primary types of attacks, they are:1. Reconnaissance 2. Network Access Attacks 3. Denial of Service 4. Worms, Viruses, and Trojan Horses.
5. Data Modification. 6. IP address spoofing or Identity spoofing. 7. Man-in-the-Middle Attack. 8. Application-Layer Attack.
1. Reconnaissance
1)Reconnaissance attack is a kind of information gathering on network system and services. 2)This enables the attacker to discover vulnerabilities or weaknesses on the network. 3)It could be likened to a thief surveying through a car parking lot for vulnerable unlocked cars to break into and steal.
Intruder gains unauthorized access to resources on a network and uses this access to carry out any number of unauthorized or even illegal activities.
Thing which is considered in network attacks is the weaknesses in the network authentication
Types of access attacks: Password attack Trust Exploitation Port Redirection Man-in-the middle attack
The image part with relationship ID rId2 was not found in the file.
1)A DoS attack can be initiated by sending invalid data to applications or network services until the server hangs or simply crashes. 2)Most common form of a DoS attack is TCP attacks.
Worms A worm executes code and installs copies of itself in the memory of the infected computer, which can, in turn, infect other hosts on the network.
Viruses
A virus is malicious software that is attached to another program file so that they can spread from one machine to another. For your machine to be infected, you must have or had run an infected program or software.
Trojan Horses
A Trojan is a software or program that has a hidden agenda! It is a program written to look like something else. When a software or program that contains Trojan virus is run on your computer, it is doing something else different from what it is meant to do.
7. Man-in-the-middle attack
1)Attack occurs when a hacker eavesdrops on a secure communication session and monitors, captures and controls the data being sent between the two parties communicating. 2)The attacker attempts to obtain information so that he/she can impersonate the receiver and sender communicating. 3)The attacker can thus re-route the data exchange. 4)This attack is termed as an application layer attack.
It targets application servers by deliberately causing a fault in a server's operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following: Read, add, delete, or modify your data or operating system. Introduce a virus program that uses your computers and software applications to copy viruses throughout your network.