Types of Attack

TYPES OF ATTACKS

Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself.

Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

Different types of attacks are as follows:
  1. Operating system attack
  2. Application level attack
  3. Shrink wrap code attack
  4. Misconfiguration attack

1. Operating system attack: An operating system attack is done when the operating system in been installed at that time the hacker hacks it because the default setting of operating system is such that all its ports, nodes are open so the hacker can easily destroy our operating system or can easily get the information required.

2. Application layer attack: An application layer attack targets application servers by deliberately causing a fault in a server's operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following:

1. Read, add, delete, or modify your data or operating system.

2. Introduce a virus program that uses your computers and software applications to copy viruses throughout your network.

3. Introduce a sniffer program to analyse your network and gain information that can eventually be used to crash or to corrupt your systems and network.

4. Abnormally terminate your data applications or operating systems.

5. Disable other security controls to enable future attacks.

3. Shrink Wrap code attack: In shrink wrap code attack this takes the advantage of the built-in codes and scripts most off-the-shelf application come with. These scripts and code pieces are designed to make installation and administration easier but can lead to vulnerabilities if not managed properly.

4. Misconfiguration attack: In this attack it states that if you are not a smart administrator so  you always make mistakes like forget to give permission to authorised person and then you bring new device in your organisation you just leave it as default so hacker can use default setting to access a device always set a password and user name as your organization name .Thus hacker can easily hack your all important information or also can destroy it easily.

More topics from NWS to read:

NETWORK & WEB SECURITY

EasyExamNotes.com covered following topics in NWS.
Python Programming ↓ 👆
Java Programming ↓ 👆
JAVA EasyExamNotes.com covered following topics in these notes.
JAVA Programs
Principles of Programming Languages ↓ 👆
Principles of Programming Languages
EasyExamNotes.com covered following topics in these notes.

Practicals:
Previous years solved papers:
A list of Video lectures References:
  1. Sebesta,”Concept of programming Language”, Pearson Edu 
  2. Louden, “Programming Languages: Principles & Practices” , Cengage Learning 
  3. Tucker, “Programming Languages: Principles and paradigms “, Tata McGraw –Hill. 
  4. E Horowitz, "Programming Languages", 2nd Edition, Addison Wesley

    Computer Organization and Architecture ↓ 👆

    Computer Organization and Architecture 

    EasyExamNotes.com covered following topics in these notes.

    1. Structure of desktop computers
    2. Logic gates
    3. Register organization
    4. Bus structure
    5. Addressing modes
    6. Register transfer language
    7. Direct mapping numericals
    8. Register in Assembly Language Programming
    9. Arrays in Assembly Language Programming

    References:

    1. William stalling ,“Computer Architecture and Organization” PHI
    2. Morris Mano , “Computer System Organization ”PHI

    Computer Network ↓ 👆
    Computer Network

    EasyExamNotes.com covered following topics in these notes.
    1. Data Link Layer
    2. Framing
    3. Byte count framing method
    4. Flag bytes with byte stuffing framing method
    5. Flag bits with bit stuffing framing method
    6. Physical layer coding violations framing method
    7. Error control in data link layer
    8. Stop and Wait scheme
    9. Sliding Window Protocol
    10. One bit sliding window protocol
    11. A protocol Using Go-Back-N
    12. Selective repeat protocol
    13. Application layer
    References:
    1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
    2. Douglas E Comer, “Internetworking with TCP/IP Principles, Protocols, And Architecture",Pearson Education
    3. KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
    4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.