Network Security Threats and Attacks Flashcards
What is IP spoofing?
When an IP packet has a modified (falese) source address in order to hide the identity of the sender or impersonate another computer system. Often used for DDoS attacks.
In what 4 broad categories are threats usually classified?
Interception or unauthorised viewing
Modification or unauthorised change
Fabrication or unauthorised creation
Interruption or prevention of authorised access
What are some threats to network security?
Remote Intrusion
DoS
Malicious Code
Masquerade
Content release and modification
What different malicious code attacks are there?
Virus
Worm
Trojan
Logic bomb
Backdoor
Rootkit
Scripts
What is remote intrusion?
A remote attack.
Illegal access:
connect to the internal network and gain access to the internal resources.
Illegal visiting: use the resources through remote login or hacking tools
What is a passive attack versus an active attack?
Passive attack: attempts to learn or make use of information from the system but does not affect system resources.
Active attack: attempts to alter system resources or affect their operation.
What are two types of passive attacks?
Traffic analysis: Guessing the contents of the data by looking at the location, identity of hosts, frequency and length of messages.
Release of message contents
How can we deal with passive attacks?
As they are difficult to detect the emphasis in dealing with them is on prevention rather than detection.
What are the four categories of active attacks?
Masquerade
Replay: unauthorised passive capture of data and subsequent retransmission.
Modification of messages
DoS