SlideShare a Scribd company logo
INFORMATION SECURITY
TOPIC

ATTACK
DEFINITION:

Attack is any attempt to destroy, expose, alter, disable, steal
or gain unauthorized access to or make unauthorized use
of an asset
ATTACK TYPES

 Passive Attack
 Active Attack
 Insider Attack
 Close-in Attack
 Phishing Attack
 Hijack Attack
 Spoof Attack
 Buffer Overflow Attack
 Exploit Attack
 Password Attack
PASSIVE ATTACK

Passive attack attempts to take the information from
the system and does not affect any system resources
and its operations.
ACTIVE ATTACK

Active attack attempts to change the system
resources or affect their usual operations.
INSIDER ATTACK

An insider attack involves someone from the
inside, such as a disgruntled employee, attacking the
network.
CLOSE – IN ATTACK
A close-in attack involves someone attempting to get
physically close to network components, data, and
systems in order to learn more about a network.
PHISHING ATTACK
In phishing attack the hacker creates a fake web site that
looks exactly like a popular site. The phishing part of the
attack is that the hacker then sends an e-mail message
trying to trick the user into clicking a link that leads to the
fake site. When the user attempts to log on with their
account information, the hacker records the username and
password and then tries that information on the real site.
HIJACK ATTACK
In a hijack attack, a hacker takes over a session between
you and another individual and disconnects the other
individual from the communication. You still believe
that you are talking to the original party and may send
private information to the hacker by accident.
SPOOF ATTACK

In a spoof attack, the hacker modifies the source
address of the packets he or she is sending so that
they appear to be coming from someone else. This
may be an attempt to bypass your firewall rules.
BUFFER OVERFLOW ATTACK

A buffer overflow attack is when the attacker sends more
data to an application than is expected. A buffer overflow
attack usually results in the attacker gaining administrative
access to the system in a command prompt or shell.
EXPLOIT ATTACK

In this type of attack, the attacker knows of a security
problem within an operating system or a piece of software
and   leverages   that   knowledge   by   exploiting   the
vulnerability.
PASSWORD ATTACK

An attacker tries to crack the passwords stored in a
network account database or a password-protected file.
TYPES OF PASSWORD ATTACK

   Dictionary attack

   Brute-force attack

   Hybrid attack.
DEFINITIONS
 A dictionary attack uses a word list file, which is a list of

  potential passwords.

 A brute-force attack is when the attacker tries every possible

  combination of characters.

 A hybrid attack builds on the dictionary attack method by

  adding numerals and symbols to dictionary words
THANK U

More Related Content

PPTX
Network attacks
PPTX
Denial of service
PPTX
DoS or DDoS attack
PPTX
Security Mechanisms
PPTX
Web application attacks
PPTX
Denial of service attack
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Ethical hacking
Network attacks
Denial of service
DoS or DDoS attack
Security Mechanisms
Web application attacks
Denial of service attack
Network security (vulnerabilities, threats, and attacks)
Ethical hacking

What's hot (20)

PPTX
Computer Security
PPTX
Cybersecurity
PDF
Network Security Fundamentals
PPTX
Network Security ppt
PPTX
Man in the middle
PPTX
Cyber security
PPT
Proxy servers
PPTX
Cyber security
PPT
Network Security
PPTX
Cyber security
PPTX
Cyber security
PPTX
What is Cryptography and Types of attacks in it
PPT
Ethical Hacking Powerpoint
PPTX
Introduction to cyber security
PPTX
Social engineering
PPT
Security Design Principles.ppt
PPTX
Ppt on cyber security
PPTX
Web application security
PPTX
CYBER SECURITY
PPTX
Ethical hacking & cyber security
Computer Security
Cybersecurity
Network Security Fundamentals
Network Security ppt
Man in the middle
Cyber security
Proxy servers
Cyber security
Network Security
Cyber security
Cyber security
What is Cryptography and Types of attacks in it
Ethical Hacking Powerpoint
Introduction to cyber security
Social engineering
Security Design Principles.ppt
Ppt on cyber security
Web application security
CYBER SECURITY
Ethical hacking & cyber security
Ad

Similar to Attack lecture #2 ppt (20)

PPTX
Computer security 7.pptx
PPT
Types of attacks and threads
PDF
Network security
PPT
Security Attacks.ppt
PPTX
EthicalHacking.pptx
DOCX
CNS unit -1.docx
PPTX
Cyber security
PPTX
Ethical hacking ppt
PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PPTX
Types of cyber attacks
PPTX
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
PPTX
Introduction Ethical hacking by eslam hussein
PPTX
Hacking.pptx
PPTX
Types of Cyber Attacks
PPTX
Network security
PPTX
Cyber Security - All Over World
PPTX
Ethical Hacking.pptx
PDF
Recent cyber Attacks
PDF
Chapter 2 konsep dasar keamanan
PPTX
Ethical hacking : Its methodologies and tools
Computer security 7.pptx
Types of attacks and threads
Network security
Security Attacks.ppt
EthicalHacking.pptx
CNS unit -1.docx
Cyber security
Ethical hacking ppt
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Types of cyber attacks
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
Introduction Ethical hacking by eslam hussein
Hacking.pptx
Types of Cyber Attacks
Network security
Cyber Security - All Over World
Ethical Hacking.pptx
Recent cyber Attacks
Chapter 2 konsep dasar keamanan
Ethical hacking : Its methodologies and tools
Ad

More from vasanthimuniasamy (20)

PPTX
Lecture #1 - Introduction to Information System
PPTX
Computer Networking
PPTX
Osi reference model
PPT
Networkingconcepts
PPTX
Encryption
PPTX
Wireless Networking
PPT
Wi MAX Technology
PPT
WiFi Technology & IEEE
PPT
WAP Technology
PPTX
I - Mode Technology
PPT
Cellular Communication
PPT
Bluetooth Technology
PDF
Computer Network PDF - Course Material 2013
PDF
Computer Wireless Network Pdf - course material 2013
PPT
Smartcard lecture #5
PPT
Lecture #5 Data Communication and Network
PPT
Database Management System Lecture #4
PPTX
Watermarking lecture #4
PPTX
Virus Lecture #3
PPT
E - Commerce Lecture #3
Lecture #1 - Introduction to Information System
Computer Networking
Osi reference model
Networkingconcepts
Encryption
Wireless Networking
Wi MAX Technology
WiFi Technology & IEEE
WAP Technology
I - Mode Technology
Cellular Communication
Bluetooth Technology
Computer Network PDF - Course Material 2013
Computer Wireless Network Pdf - course material 2013
Smartcard lecture #5
Lecture #5 Data Communication and Network
Database Management System Lecture #4
Watermarking lecture #4
Virus Lecture #3
E - Commerce Lecture #3

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Revamp in MTO Odoo 18 Inventory - Odoo Slides
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Week 4 Term 3 Study Techniques revisited.pptx
Insiders guide to clinical Medicine.pdf
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
102 student loan defaulters named and shamed – Is someone you know on the list?
NOI Hackathon - Summer Edition - GreenThumber.pptx
Pharma ospi slides which help in ospi learning
Revamp in MTO Odoo 18 Inventory - Odoo Slides
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
STATICS OF THE RIGID BODIES Hibbelers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Attack lecture #2 ppt

  • 3. DEFINITION: Attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset
  • 4. ATTACK TYPES  Passive Attack  Active Attack  Insider Attack  Close-in Attack  Phishing Attack  Hijack Attack  Spoof Attack  Buffer Overflow Attack  Exploit Attack  Password Attack
  • 5. PASSIVE ATTACK Passive attack attempts to take the information from the system and does not affect any system resources and its operations.
  • 6. ACTIVE ATTACK Active attack attempts to change the system resources or affect their usual operations.
  • 7. INSIDER ATTACK An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network.
  • 8. CLOSE – IN ATTACK A close-in attack involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network.
  • 9. PHISHING ATTACK In phishing attack the hacker creates a fake web site that looks exactly like a popular site. The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site. When the user attempts to log on with their account information, the hacker records the username and password and then tries that information on the real site.
  • 10. HIJACK ATTACK In a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. You still believe that you are talking to the original party and may send private information to the hacker by accident.
  • 11. SPOOF ATTACK In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules.
  • 12. BUFFER OVERFLOW ATTACK A buffer overflow attack is when the attacker sends more data to an application than is expected. A buffer overflow attack usually results in the attacker gaining administrative access to the system in a command prompt or shell.
  • 13. EXPLOIT ATTACK In this type of attack, the attacker knows of a security problem within an operating system or a piece of software and leverages that knowledge by exploiting the vulnerability.
  • 14. PASSWORD ATTACK An attacker tries to crack the passwords stored in a network account database or a password-protected file.
  • 15. TYPES OF PASSWORD ATTACK  Dictionary attack  Brute-force attack  Hybrid attack.
  • 16. DEFINITIONS  A dictionary attack uses a word list file, which is a list of potential passwords.  A brute-force attack is when the attacker tries every possible combination of characters.  A hybrid attack builds on the dictionary attack method by adding numerals and symbols to dictionary words