Attack

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Definitions • Computer Security

– Generic name for the collection of tools designed to


protect data and to thwart hackers
• Network Security
– Measures to protect data during their transmission
• Internet Security (our focus!)
– Measures to protect data during their transmission
over a collection of interconnected networks
Security
Trends
3 Aspects of
• Security Attack
– Any action that compromises the security of information.

Information
• Security Mechanism
– A mechanism that is designed to detect, prevent, or

Security
recover from a security attack.
• Security Service
– A service that enhances the security of data processing
systems and information transfers.
• Makes use of one or more security mechanisms.
Computer • Computer Security
– The protection afforded to an automated information

Security system in order to attain the applicable objectives of


preserving the integrity, availability and confidentiality

Concept of information system resources (includes hardware,


software, information/data, and telecommunications).
Computer 1. Confidentiality
preserving authorized restrictions on
Security information access and disclosure, including

Concept
means for protecting personal privacy and
proprietary information.
2. Integrity
Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity
3. Availability
Ensuring timely and reliable access to and
use of information.
Security
Goals Confidentiality

Integrity
Avalaibility
Types of • Passive Attacks
• Active Attacks

Attacks
PASSIVE ATTACKS
Passive • A passive attack is a network attack in which a system
is monitored and sometimes scanned for open ports

Attacks and vulnerabilities. The purpose is solely to gain


information about the target and no data is changed
on the target.
• In passive reconnaissance, an intruder monitors
systems for vulnerabilities without interaction, through
methods like session capture. In active reconnaissance,
the intruder engages with the target system through
methods like port scans.
Types of • Interception Attack
• Traffic Analysis Attack

Passive
Attacks
Interception • The phenomenon of confidentiality plays an important
role in this type of attack. The data or message which is
sent by the sender is intercepted by an unauthorized
individual where the message will be changed to the
different form or it will be used by the individual for his
malicious process. So the confidentiality of the
message is lost in this type of attack.
• It is also known as “Release of message contents”.
Interception
Traffic • Traffic analysis is the process of intercepting and
examining messages in order to deduce information

Analysis from patterns in communication. It can be performed


even when the messages are encrypted and cannot be
decrypted. In general, the greater the number of
messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic
analysis can be performed in the context of military
intelligence or counter-intelligence, and is a concern in
computer security.
Traffic
Analysis

Observe traffic pattern


ACTIVE ATTACKS
Active • An active attack is a network exploit in which a hacker
attempts to make changes to data on the target or

Attacks data en-route to the target.


• The purpose is to gain information about the target
and no data is changed. However, passive attacks are
often preparatory activities for active attacks.
Types of • Masquerade Attack
• Interruption Attack

Active • Fabrication Attack

Attacks • Session Replay Attack


• Modification Attack
• Denial of Service (DOS) Attack
Masquerade • In a masquerade attack, the intruder pretends to be a
particular user of a system to gain access or to gain
greater privileges than they are authorized for. A
masquerade may be attempted through the use of
stolen login IDs and passwords, through finding
security gaps in programs or through bypassing the
authentication mechanism.
Interruptio • This type of attack is due to the obstruction of any kind
during the communication process between one or

n more systems. So the systems which are used become


unusable after this attack by the unauthorized users
which results in the wastage of systems.
Fabrication • In this type of attack a fake message is inserted into
the network by an unauthorized user as if it is a valid
user. This results in the loss of confidentiality,
authenticity and integrity of the message.

Fabricate message
Session • In a session replay attack, a hacker steals an authorized
user’s log in information by stealing the session ID. The

Replay intruder gains access and the ability to do anything the


authorized user can do on the website.
Modification • In a message modification attack, an intruder alters
packet header addresses to direct a message to a
different destination or modify the data on a target
machine.

Modify
message
Denial of • In a denial of service (DoS) attack, users are deprived of
access to a network or web resource. This is generally

Service accomplished by overwhelming the target with more


traffic than it can handle.

(DOS)
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy