Tatu, 713-14 guruh


Some of the sites which have been compromised



Download 269,5 Kb.
bet6/11
Sana24.06.2021
Hajmi269,5 Kb.
#100656
1   2   3   4   5   6   7   8   9   10   11
Bog'liq
buzish-va-him.

Some of the sites which have been compromised

  • Some of the sites which have been compromised
    • U.S. Department of Commerce
    • NASA
    • CIA
    • Greenpeace
    • Motorola
    • UNICEF
    • Church of Christ …
  • Some sites which have been rendered ineffective
    • Yahoo
    • Microsoft
    • Amazon …
  • Why Security?

Because they can

  • Because they can
  • Financial Gain
  • Espionage
  • Venting anger at a company or organization
  • Terrorism
  • Why do Hackers Attack?

Active Attacks

  • Active Attacks
    • Denial of Service
    • Breaking into a site
      • Intelligence Gathering
      • Resource Usage
      • Deception
  • Passive Attacks
    • Sniffing
      • Passwords
      • Network Traffic
      • Sensitive Information
    • Information Gathering
  • Types of Hacker Attack

Over the Internet

  • Over the Internet
  • Over LAN
  • Locally
  • Offline
  • Theft
  • Deception
  • Modes of Hacker Attack

Definition:

  • Definition:
    • An attacker alters his identity so that some one thinks he is some one else
    • Email, User ID, IP Address, …
    • Attacker exploits trust relation between user and networked machines to gain access to machines
  • Types of Spoofing:
    • IP Spoofing:
    • Email Spoofing
    • Web Spoofing
  • Spoofing

Definition:

  • IP Spoofing – Flying-Blind Attack
  • Replies sent back to 10.10.20.30
  • Spoofed Address
  • 10.10.20.30
  • Attacker
  • 10.10.50.50
  • John
  • 10.10.5.5
  • From Address: 10.10.20.30
  • To Address: 10.10.5.5
  • Attacker changes his own IP address to spoofed address
  • Attacker can send messages to a machine masquerading as spoofed machine
  • Attacker can not receive messages from that machine

Definition:

  • Definition:
  • Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies
  • IP Spoofing – Source Routing
  • Replies sent back
  • to 10.10.20.30
  • Spoofed Address
  • 10.10.20.30
  • Attacker
  • 10.10.50.50
  • John
  • 10.10.5.5
  • From Address: 10.10.20.30
  • To Address: 10.10.5.5
  • The path a packet may change can vary over time
  • To ensure that he stays in the loop the attacker uses source routing to ensure that the packet passes through certain nodes on the network
  • Attacker intercepts packets
  • as they go to 10.10.20.30

Download 269,5 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   11




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish