Lecture On safety and security of information systems: Malicious attacks

Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software; . Please refer to the detailed content of the lecture! | Malicious Attacks Contents 1 Malicious Attack 2 Attack Tools 3 The common types of malicious attacks 4 Malicious Software Attack What Is a Malicious Attack An attack on a computer system or network asset succeeds by exploiting a vulnerability in the system. What Is a Malicious Attack An attack can consist of all or a combination of these four categories a Fabrications involve the creation of some deception in order to trick unsuspecting users. What Is a Malicious Attack b Interceptions involve eavesdropping on transmissions and redirecting them for unauthorized use. What Is a Malicious Attack c Interruptions An interruption causes a break in a communication channel which blocks the transmission of data. What Is a Malicious Attack d Modifications A modification is the alteration of data contained in transmissions or files 2. Attack Tools Attack Tools Protocol analyzers Port scanners OS fingerprint scanners Vulnerability scanners Exploit software Wardialers Password crackers Keystroke loggers Protocol Analyzers A protocol analyzer or packet sniffer is a software program that enables a computer to monitor and capture network traffic. Every data packet can be seen and captured by the sniffer. Port Scanners OS Fingerprint Scanners An operating system OS fingerprint scanner is a software program that allows an attacker to send a variety of packets to an IP host device hoping to determine the target device s operating system OS from the responses nmap O ip_address Exploit Software It is a program that can be used to exploit a weakness on the system Vulnerability Scanners A vulnerability scanner is a software program that is used to identify and when possible verify vulnerabilities on an IP host device Nexpose Nessus Kali Linux Password Crackers It is a software program that performs one of two functions a brute-force password attack to gain unauthorized access to a system or recovery of passwords stored as a cryptographic hash on a computer system. Kali Linux

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
120    83    4    26-04-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.