Please enable JavaScript.
Coggle requires JavaScript to display documents.
2.3 Hacker and Attackers (type of threats (unstructured threat (means…
2.3 Hacker and Attackers
Attackers
- An assault on system security that derives from an intelligent threat
reconnaissance
- the unauthorized discovery and mapping of system,services,or vulnerabilities
- it is also knows as information gathering and in most cases it precedes an actual access or denial of service (Dos) attack.
- is somewhat analogous toa thief casing a neighborhood for vulnerable homes to break into,such as an unoccupied residence,easy to open doors or open window
-
access
system access is the ability for an unauthorized intruder to gain access to a a devices for which the inruder does not have an account or a password
-
denial of service (Dos)
attacker disables or corrupt networks,systems or services with the intent to deny services to intended users
-
-
Malicious code(worm,viruses,trojen horse)
inserted onto a host damages system corrupta system replicate itseftor deny services or access tonetwork systems or services
-
worm
an application that execute arbitrary code and install copies of itself in the memory of the memory of the infected computer which then infects other hosts
virus
malicious software thatis attached to another program to excuted a particular unwanted function on the user workstation
Ddos
attacks are designed to saturate network links with spurious data.this data can overwhelm an internet link,causing legitimate traffic to be dropped
-
-
Hackers
- Generally used to imply someone who gains access to a system,software, or hardware without permission.Also can be referred as cracker
types of hackers
- Black hat - also called as cracker or dark side hacker and negotiates the security of the system without authorized access
- white hat - focuses on securing IT system ,Alert owners of the system against security flaws and break in attempts
- grey hat - Combination of black hat and white hat hackers and intrudes into a system and does no damage
- ethical hackers -Holds extensive knowledge and skill concerning the web and Evaluates sensitive information gathered and applies robust measures to ensure security.
type of threats
unstructured threat
- means consist of mostly inexperienced individual using easily available hacking tools such as shell script and password crackers.
for example- if an internal company website is hacked ,the integrity of the the company is damages
structured threat
- means come from hackers who are more highly motivated and tecnically competent,for example these people know system vulnerabilities and can understand and develop exploit code and scripts
external threat
can arisefrom individuals or organizations working outside of a - - company,they do not have authorized access to the computer systems or network and they work their way into a network mainly from the internet or dialup access servers
internal threat
- occur when someone has authorized access to the network with either an account on a server or physical access to the network and According to the FBI ,internal access and misuse account for 60 percent to 80 percent of reported incidents