Attack Types: 1. Denial Service

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

ATTACK TYPES

``

Tyrell Krishantha Wood


BEng. (Hons) in Networking Kingston University
Assistant Lecturer
IBSL

1. Denial service
Denial service of attack is an external attack, which makes the resources of the
network unavailable to its users by sending numerous requests to the network.
Denial service of attack will create a bottle neck on the network which will
interrupt the network and resources.

Denial service of attack normally tries to target huge company servers such as,
banks, credit cards payments and pay pal. When denial service of attack attacks
the computer, it will respond slowly or it won’t respond at all, because of the
bandwidth of the bottle that caused by the denial service of attack.

Denial attack is external attack because it’s coming from the outside of the
organisation through the internet connection.

2. Back door

Trap door is another name for the back door. This uses two the two
components called server and client computers in the network. Back door is a
way bypassing the verification to secure access to the computer while remaining
hidden. It also can obtain the not permitted access to the administrator of the
network. Back door also has ability to act as a programme that installed in the
computer. This is an internal attack which comes through internet unsecured
WIFI point.

3. Trojan horse

Trojan horse is fully working software although it can contain malicious


software that can damage your system. This malware will affect your system
and disable your functions one by one and delete the data. This can be an

1
internal or external attack because it can comes through the via internet or it can
also coin in a USB drive.

Malware hidden in the


program
Programme

Virus

Virus is a program that created to damage your computer software. There are
viruses that have different effects on your computer. such as,

 Virus can delete or corrupt data


 Use the email to spread itself to other computers
 Delete the data on the hard disk it
 Slowdown the performance of the computer
 Disable the functions of the computer

This can be an either internal or external attack because it can be downloaded


and send the virus through the internet or someone can put the virus to the
computer using a CD or an USB.

2
4. Root kit

Root kit malicious software that gives the privileges to the person to take the
whole network down root kit is harder to find because it will be hidden in the
network.

taking down the network using the root kit organization will lose money
important data will get in to the wrong hands company will be sued under the
law of data protection act. This can take a form of external and internal attack

5. Brute Force

This is where user manually trying to find the most logical code using different
combinations. This is the slowest way to bring down a security system. This
method takes months or years to access an account. If the user go beyond the 3
or 4 attempts to find the correct password then the system will lock it.

6. Worms

Worms is a programme that replicates and spread throughout the network.


Worms can also spread through the internet by coping themselves to the email.
Worms can use the computer bandwidth and storage which will not allow you
to save your files into the computer. This can take a form of internal or
external attack.

7. Spyware

Spyware is malicious software which installs itself to the computer to collect the
information such as, bank card details, sort codes and business-related

3
documents. People use spyware to steal money, sell the information out to
someone who needs it. This is an external attack which coming from the outside
of the organisation by using the unsecured WIFI access.

8. Adware

Adware is malicious software which takes a form of advertisement. This is


normally repeated, which advertise in a pop-up window. Advertise is chosen
with the creator’s choice. These advertisements can contain malicious software
such as virus Trojan horse. This is an external attack because it is coming
through the outside the organisation.

9. Mathematical

This attack will allow user to crack and decode the password using all the
possible password combinations. This can be an internal or an external attack.

10. Software exploitation

Using a glitch of a network or a firewall to access the internal source of the


organisation, this is the reason organisation always update their security and the
software to prevent glitches of the system

11. Spoofing

This is an external source of attack which creates a fake website similar to


original website to steal the private information such as, bank details and credit

4
card details or to steal the customers from the original website. This can bring
the bad reputation to the original website.

12. External Attack

External attack comes from the outside of the organisation through the internet
or unsecured WIFI point.

Example

Person who sends the virus contained emails from his house to organisation is
an external attack.

Using the root kit user can attack the organisation network from the outside of
the organisation to gain the access to the network

13. Internal attack

Internal attack comes within the organisation. This can be a work of a staff
member or group of people within the organisation

Examples

One person within the organisation can insert virus contain CD or DVD to a
work station in an organisation

Staff members can receive or send virus contained emails within the
organisation

5
6

You might also like