Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
INFORMATION SECURITY
TOPICATTACK
DEFINITION:Attack is any attempt to destroy, expose, alter, disable, stealor gain unauthorized access to or make unauthori...
ATTACK TYPES Passive Attack Active Attack Insider Attack Close-in Attack Phishing Attack Hijack Attack Spoof Attack...
PASSIVE ATTACKPassive attack attempts to take the information fromthe system and does not affect any system resourcesand i...
ACTIVE ATTACKActive attack attempts to change the systemresources or affect their usual operations.
INSIDER ATTACKAn insider attack involves someone from theinside, such as a disgruntled employee, attacking thenetwork.
CLOSE – IN ATTACKA close-in attack involves someone attempting to getphysically close to network components, data, andsyst...
PHISHING ATTACKIn phishing attack the hacker creates a fake web site thatlooks exactly like a popular site. The phishing p...
HIJACK ATTACKIn a hijack attack, a hacker takes over a session betweenyou and another individual and disconnects the other...
SPOOF ATTACKIn a spoof attack, the hacker modifies the sourceaddress of the packets he or she is sending so thatthey appea...
BUFFER OVERFLOW ATTACKA buffer overflow attack is when the attacker sends moredata to an application than is expected. A b...
EXPLOIT ATTACKIn this type of attack, the attacker knows of a securityproblem within an operating system or a piece of sof...
PASSWORD ATTACKAn attacker tries to crack the passwords stored in anetwork account database or a password-protected file.
TYPES OF PASSWORD ATTACK   Dictionary attack   Brute-force attack   Hybrid attack.
DEFINITIONS A dictionary attack uses a word list file, which is a list of  potential passwords. A brute-force attack is ...
THANK U
Upcoming SlideShare
Loading in …5
×

Attack lecture #2 ppt

9,299 views

Published on

My class lecture #2 about Management Information System

Published in: Education

Attack lecture #2 ppt

  1. 1. INFORMATION SECURITY
  2. 2. TOPICATTACK
  3. 3. DEFINITION:Attack is any attempt to destroy, expose, alter, disable, stealor gain unauthorized access to or make unauthorized useof an asset
  4. 4. ATTACK TYPES Passive Attack Active Attack Insider Attack Close-in Attack Phishing Attack Hijack Attack Spoof Attack Buffer Overflow Attack Exploit Attack Password Attack
  5. 5. PASSIVE ATTACKPassive attack attempts to take the information fromthe system and does not affect any system resourcesand its operations.
  6. 6. ACTIVE ATTACKActive attack attempts to change the systemresources or affect their usual operations.
  7. 7. INSIDER ATTACKAn insider attack involves someone from theinside, such as a disgruntled employee, attacking thenetwork.
  8. 8. CLOSE – IN ATTACKA close-in attack involves someone attempting to getphysically close to network components, data, andsystems in order to learn more about a network.
  9. 9. PHISHING ATTACKIn phishing attack the hacker creates a fake web site thatlooks exactly like a popular site. The phishing part of theattack is that the hacker then sends an e-mail messagetrying to trick the user into clicking a link that leads to thefake site. When the user attempts to log on with theiraccount information, the hacker records the username andpassword and then tries that information on the real site.
  10. 10. HIJACK ATTACKIn a hijack attack, a hacker takes over a session betweenyou and another individual and disconnects the otherindividual from the communication. You still believethat you are talking to the original party and may sendprivate information to the hacker by accident.
  11. 11. SPOOF ATTACKIn a spoof attack, the hacker modifies the sourceaddress of the packets he or she is sending so thatthey appear to be coming from someone else. Thismay be an attempt to bypass your firewall rules.
  12. 12. BUFFER OVERFLOW ATTACKA buffer overflow attack is when the attacker sends moredata to an application than is expected. A buffer overflowattack usually results in the attacker gaining administrativeaccess to the system in a command prompt or shell.
  13. 13. EXPLOIT ATTACKIn this type of attack, the attacker knows of a securityproblem within an operating system or a piece of softwareand leverages that knowledge by exploiting thevulnerability.
  14. 14. PASSWORD ATTACKAn attacker tries to crack the passwords stored in anetwork account database or a password-protected file.
  15. 15. TYPES OF PASSWORD ATTACK  Dictionary attack  Brute-force attack  Hybrid attack.
  16. 16. DEFINITIONS A dictionary attack uses a word list file, which is a list of potential passwords. A brute-force attack is when the attacker tries every possible combination of characters. A hybrid attack builds on the dictionary attack method by adding numerals and symbols to dictionary words
  17. 17. THANK U

×