The internet is home to a variety of cyberpunks who pose threats to the security of WWW communications. They may attempt a number of different types of attack, for example:
Passive Attacks In a passive attack the perpetrator simply monitors the traffic being sent to try to learn secrets. Such attacks can be either network based (tracing the communications links) or system based (replacing a system component with a Trojan Horse that captures data insidiously). Passive attacks are the most difficult to detect. You should assume that someone is eavesdropping on everything you send across the Internet.
Active Attacks In these the attacker is trying to break through your defenses. There are several types of active attack, for example:
System access attempts, where the attacker aims to exploit security loopholes to gain access and control over a client or server system.
Spoofing, where the attacker masquerades as a trusted system to try to persuade you to send him secret information.
Cryptographic attacks, where the attacker attempts to break 0your passwords or decrypt some of your data.
Denial of Service Attacks In this case the attacker is not so much trying to learn your secrets as to prevent your operation, by re-directing traffic or bombarding you with junk.
No comments:
Post a Comment