Please enable JavaScript.
Coggle requires JavaScript to display documents.
Introduction Vulnerabilities, Threat and Attack (ACCESS (ACCESS ATTACK…
Introduction Vulnerabilities, Threat and Attack
ATTACKS
RECONNAISSANCE
The unauthorized discovery and mapping of systems, services, or vulnerabilities.
It is also known as information gathering and, in most cases,
it precedes an actual access or denial-of-service (DoS) attack.
Reconnaissance is somewhat analogous to a thief casing a neighborhood for vulnerable homes to break into,
such as an unoccupied residence, easy-to-open doors, or open windows.
-
EAVESDROPPING
Information gathering—Network intruders can identify usernames, passwords, or information carried in the packet
such as credit card numbers or sensitive personal information.
Information theft—Network eavesdropping can lead to information theft. The theft can occur as data is transmitted over the internal or external network.
The network intruder can also steal data from networked computers by gaining unauthorized access.
Examples include breaking into or eavesdropping on financial institutions and obtaining credit card numbers.
Another example is using a computer to crack a password file.
ACCESS
System access is the ability for an unauthorized intruder to gain access to a device for which the intruder does not have an account or a password.
Entering or accessing systems to which one does not have authority to access usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked.
ACCESS ATTACK
Access attacks exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information.
-