Please enable JavaScript.
Coggle requires JavaScript to display documents.
TYPES OF SECURITY ATTACK : - Coggle Diagram
TYPES OF SECURITY ATTACK
:
1) Reconnaissance attack
i. Definition - an enemy that tries to know information about your network or it is call as unauthorized information gathering on network system and services .
ii . Example : Port scans - A technique for figuring out which network ports are open and potentially delivering or receiving data is called port scanning.
iii. Appropriate fingure on each attack
5) Malicious Code Attack
i . Definition - It is program that inserted onto a host to damage a system, corrupt a system, replicate itself or deny services or access to networks systems or services.
ii . Example :
Malicious code attacks refers to viruses, worms, Trojan horses, logic bombs, and other uninvited software.
Damages personal computers, but also attacks systems that are more sophisticated.
iii . Appropriate fingure on each attack
3) Denial of Service Attack (DoS)
i. Definition - Disables the network by flooding useless network traffic
ii . Example : Ping of death
-The ping is the reaction time of your connection–how fast you get a response after you've sent out a request
iii . Appropriate fingure on each attack
4)
Distributed Denial of Service Attack (DDos)
ii . Example : Network resources – such as web servers – have a finite limit to the number of requests that they can service simultaneously. In addition to the capacity limit of the server, the channel that connects the server to the Internet will also have a finite bandwidth / capacity. Whenever the number of requests exceeds the capacity limits of any component of the infrastructure, the level of service is likely to suffer in one of the following ways
iii. Appropriate figure on each attack
:
i . Definition - Instead of one computer and one internet connection like the DoS attack, DDoS attack utilises many computers and many connections.
2) Access Attack
i . Definition - Defined as attacker tries to gain unauthorized access to a devices .
ii . Example : Trust Exploitation
compromise a trusted host, using it to stage attacks on other hosts in a network.
iii . Appropriate fingure on each attack