Menu

Attacks

What are Attacks?
An attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset

Some attacks are physical: i.e. theft or damage of computers and other equipment. Others are attempts to force changes in the logic used by computers or network protocols in order to achieve unforeseen (by the original designer) result but useful for the attacker.

Classification of Attacks?
An attack can be active or passive.
  •  An "active attack" attempts to alter system resources or affect their operation.
  •  A "passive attack" attempts to learn or make use of information from the system but does not affect system resources.
An attack can be perpetrated by an insider or from outside the organization
  •  An "inside attack" is an attack initiated by an entity inside the security perimeter (an "insider"), i.e., an entity that is authorized to access system resources but uses them in a way not approved by those who granted the authorization.
  • An "outside attack" is initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (an "outsider"). In the Internet, potential outside attackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments.
Other classifications are according to the procedures used or the type of vulnerabilities exploited: attacks can be concentrated on network mechanisms or host features.

Major Categories of the Attacks are:-
  • Email Attacks
  • Server Attacks
  • Wireless Attacks
  • Network Attacks
  • Virus Attacks
  • Database Attacks
  • Mobile Attacks
  • Other Attacks
Stay Tuned
These categories will be expanded soon.... 

No comments:

Post a Comment