TYPES OF ATTACKS & DEFINITION
Reconnaissance attack : Reconnaissance attacks are centered around general knowledge gathering. These efforts stem from both physical reconnaissance, as well as a bit of digital research. Characteristics of this information gathering can be anything from probing the network, to social engineering, and physical surveillance.
Access Attack
Access attacks require intrusion capabilities. These can consist of anything as simple as gaining an account holder’s credentials, to plugging foreign hardware directly into the network infrastructure.
Denial of service Attack
Denial of Service (DoS) means that the information exchange has been prevented due to some form of interference and also to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
Distributed Denial of service Attack
A Distributed Denial of service Attack (DDoS) occurs when multiple systems organized a synchronized DoS attack to a single target. The essential difference is that instead of being attacked from one location, the target is attacked from many locations at once.
Malicious Code
Malicious code is an application security threat that cannot be efficiently controlled by conventional antivirus software alone.
EXAMPLE OF EACH ATTACKS
click to edit
Reconnaissance attack
Social engineering : This technique involves looking for reasoning to gain sensitive information or text by stimulating an individual mind or sense of social norms.
Phishing : Fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords.
click to edit
Access Attack
Trust Exploitation : Trust exploitation can occur in one of two ways that Reliance on the trust a client has in a server and Reliance on the trust the server has in the client. For example, most companies have a part of their network that lies between the wide-open Internet and the corporate internal network.
Port Redirection : Port redirection is a form of trust exploitation in which the untrustworthy source uses a machine with access to the internal network to pass traffic through a port on the firewall
click to edit
Denial Of Service
Buffer overflow attacks : The concept is to send more traffic to a network address than the programmers have built the system to handle.
SYN flood : The concept is sends a request to connect to a server, but never completes the handshake.
click to edit
Malicios Code
Worms : Worm attacks are designed to self-replicate across multiple computers or enterprise networks, often stealing or even destroying files and critical data.
Trojan horse and spyware : Malicious code may go undetected on infected computers, simply monitoring applications and websites accessed.
Distributed Denial Of Service
Smurf Attack : With a smurf attack, multiple broadcast ping requests are sent to a single target from a spoofed IP address.
FIGURES OF EACH EXAMPLE
Reconnaissance attack
access attack
Dos & DDOS attack
malicious attack