Computer Network Attack active attack passive attack
In a computer or computer network an attack is an attempt to destroy, expose, alter, disable and gain unauthorized access to make authorized changes in a system.
·Types of computer attack:-
i. Active attack
ii.Passive attack
Computer Network Attack active attack passive attack
i. Active attack :- An active attack attempts to alter system resources and
effect their operations.An active attack modifies the network bits when they
transmits.
ii.Passive attack :- A passive attack is a network in which a system is
monitoring or sometimes scanned for port and vulnerabilities.the purpose is to
gain the information about the target and no data changed in the target.
Computer Network Attack active attack passive attack
·Types of the passive attack:-
1. EavesDropping
2. Password based attack
3. Denial of service attack
4. Compromised key attack
5. Indentify spoofing
6. Application layer attack
Computer Network Attack active attack passive attack
1. EaveDropping :- EavesDropping is an electronic attack where digital
communications are intercepted by an individual when they are not intended.
Eavesdropping is the act of intercepting between two points.
In the digital world eave stropping takes from sniffing of data that is called eave
stropping.
A specified program is used to sniff and record packets of data communications
from a network and then subsequently listen or read.
2. Password based attack :- Most of the existing cyber attack is password
based attack.
An initiative approach of password based attack is to get password access and
them change or delete network configuration and get secured data and pass it
over other channels.
3.Denial of service attack :- This is used a network or machine to unavoidable
the users who access them on network or computer.
The main motive of thius attack is to stops the services or access on those
networks.
The hackers are using this attack is like a big weapons and stops access all the
services to users and unavailable which connected to internet. In Dos attack the
network or machine was overloaded that’s why users should not access on the
network.
To unavailable machine or network in Dos attack it needs only one computer
and one internet connection.
DDos :- DDos is the detailed way of dos.It stands for distributed denial of
service but needs more the one or multiply computer and internet connection to
unavailable machine or computer to user.
Computer Network Attack active attack passive attack
4. Compromised key attack :- In a compromised key attack the attacker gets
the secret codes which is called the compromised key,usec to validate the secret
data.
Attacker transmits the secret information to server to decry, change or delete
secret information.
The attacker can get also access to other sensitive data and secure information
by using various permutation and combinations keys.
5. Indentify spoofing :- The attacker gains unauthorized access to the network
or system by utilizing the IP address.
In order to get privileges the attacker sends the various IP packets to the
hackled system and then the attacker can modify, remove, delete the
information.
This type of attacks corrupts the transmission of data streams and attacker can
damage the other associated system within of outside the network by using
hacked IP address.
Computer Network Attack active attack passive attack
6. Application layer Attacks :- These type of attacks deliberately attacks the
servers operating system and applications.
Once the system damaged has occurred the attacker should by pass the access
control and then easily get the control over the servers applications, system,
data, and other associates.
nice blogPassive Networking
ReplyDeletethanks for sharing.Passive Networking
ReplyDeleteStructured Cabling
thanks for the information.. CISCO Meraki Switches Firewall
ReplyDeleteThanks for providing information,
ReplyDeleteComputer networking success blocking allows you to quickly stay update with your network on a little it is easy to subscribe to the computer networking service
you will get many more things in our platform citing computer network.
Visit here:https://b-a.ca
Amazing AWS Training
ReplyDelete