
As I guess, your mind might digress to malware. Use of computational resources, like bandwidth, memory, disk space or even CPU.This attack targets gateways and web servers, like banks, and doing some of the below sabotages: The goal is interrupted or suspended services that connect to the Internet. The goal is impersonating the host.ĭenial-of-service attack (Dos): In this kind of attack, an attacker attempts to make a machine or network resource unavailable for users. For example, your target is and an attacker forwards your request to a fake. In this attack, an attacker wants to make a fake destination address and deceive you about it. As you know,in order to communicate with other computers, each computer needs an IP. Please look at the below picture.Īddress Spoofing: I know that you know what an IP (Internet Protocol) address is. It may seem old, but you can be sure it is one of the biggest security problems in a network that network administrators disregard. When you chat with your friend in “clear text” mode, sniffing your traffic is possible. This kind of attack happens in computer communications, too, but it's known as sniffing. A very simple way is to secretly listen to their words. Imagine that you want to find some information about two friends and their relationship. I will show you some texts about the above options and introduce other attacks to you.Įavesdropping: I'm sure you are familiar with it it's very normal in life. I want to familiarize you with different types of active and passive attacks: This attack is more like monitoring and recognition of the target. Passive attack: In this kind of attack, The Attacker attempts to gain information from the system without destroying the information.

An attack can be active or passive:Īctive attack: In this kind of attack, The Attacker attempts to alter system resources or destroy the data.

Attacks are not always simple most of them are complex and it is a big challenge for security researchers and companies that offer a solution for them. An attacker is a person that steals your data without permission and a feature of some attacks is that they are hidden. In the computer world, an attack is a way to destroy, expose and gain unauthorized access to data and computers. We have published new article about Ettercap.
