Please enable JavaScript.
Coggle requires JavaScript to display documents.
Various types of Security Attacks - Coggle Diagram
Various types of Security Attacks
Reconnaissance attack
Reconnaissance attack occurs when an adversary (enemy) tries to learn information about your network.
Packet sniffers – scan TCP/IP connections.
Port scans – scan open ports.
Ping sweep – determine what IP addresses are alive.
Malicious code attack
Denial of Service attack (Dos)
Denial of Service attack (Dos) disables the network by flooding useless network traffic.
Ping of death – Packet greater in size than the maximum allowed is sent to a system, which cause the system to crash.
Distributed Denial of Service attack (DDoS)
Access attack
An access attack occurs when someone (attacker) tries to gain unauthorized access to a component (devices), tries to gain unauthorized access to information on a component, or increases their privileges on a network component.
ii. Password attack – password attacks can be implemented using a packet sniffer to yield user accounts and passwords that are transmitted as clear text..
Trust Exploitation – compromise a trusted host, using it to stage attacks on other hosts in a network.
Port Redirection – attacker taking network traffic coming into a host on one port and directing it out from another host.
Man-in-the middle attack – In a man in the middle attack, the intruder uses a program that appears to be the server to the client and appears to be the client to the server.