Security Solutions India

 

Access Control & Security Systems Online Directory


Home
 

Google  

 
Browse Subcategories

Asset Protection

Data and Information Security
Software and Security
 
 

You are here: Home >>Computer and Information security>>Security Attacks

Security Attacks 

Some types of Security attacks are mentioned here.Know these:-

  • DoS- Denial of Service
  • Trojan Horse - Comes with other software.
  • Virus - Reproduces itself by attaching to other executable files.
  • Worm - Self-reproducing program. Creates copies of itself. Worms that spread using e-mail address books are often called viruses.
  • Logic Bomb - Dormant until an event triggers it (Date, user action
 
  • IP spoofing - An attacker may fake their IP address so the receiver thinks it is sent from a location that it is not actually from. There are various forms and results to this attack.The attack may be directed to a specific computer addressed as though it is from that same computer. This may make the computer think that it is talking to itself. This may cause some operating systems such as Windows to crash or lock up.
  • Gaining access through source routing. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method.
  • Session hijacking - An attacker may watch a session open on a network. Once authentication is complete, they may attack the client computer to disable it, and use IP spoofing to claim to be the client who was just authenticated and steal the session. This attack can be prevented if the two legitimate systems share a secret which is checked periodically during the session.
  • Server spoofing - A C2MYAZZ utility can be run on Windows 95 stations to request LANMAN (in the clear) authentication from the client. The attacker will run this utility while acting like the server while the user attempts to login. If the client is tricked into sending LANMAN authentication, the attacker can read their username and password from the network packets sent.
  • DNS poisoning - This is an attack where DNS information is falsified. This attack can succeed under the right conditions, but may not be real practical as an attack form. The attacker will send incorrect DNS information which can cause traffic to be diverted. The DNS information can be falsified since name servers do not verify the source of a DNS reply. When a DNS request is sent, an attacker can send a false DNS reply with additional bogus information which the requesting DNS server may cache. This attack can be used to divert users from a correct webserver such as a bank and capture information from customers when they attempt to logon.
  • Password cracking - Used to get the password of a user or administrator on a network and gain unauthorized access.

Some DoS Attacks

  • Ping broadcast - A ping request packet is sent to a broadcast network address where there are many hosts. The source address is shown in the packet to be the IP address of the computer to be attacked. If the router to the network passes the ping broadcast, all computers on the network will respond with a ping reply to the sttacked system. The attacked system will be flooded with ping responses which will cause it to be unable to operate on the network for some time, and may even cause it to lock up. The attacked computer may be on someone else's network. One countermeasure to this attack is to block incoming traffic that is sent to a broadcast address.
  • Ping of death - An oversized ICMP datagram can crash IP devices that were made before 1996.
  • Smurf - An attack where a ping request is sent to a broadcast network address with the sending address spoofed so many ping replies will come back to the victim and overload the ability of the victim to process the replies.
  • Teardrop - a normal packet is sent. A second packet is sent which has a fragmentation offset claiming to be inside the first fragment. This second fragment is too small to even extend outside the first fragment. This may cause an unexpected error condition to occur on the victim host which can cause a buffer overflow and possible system crash on many operating systems.

Related Topics on Computer and Information security

  1. Software Vulnerability Control
  2. Firewall Protection
  3. Network Intrusion Detection
  4. Network Port Scanning
  5. Network Tools 
  6. Types of attacks
  7. Application Level Protection
  8. Systems Protection
  9. Mail and Security
  10. Hostile Software

 

Browse Categories

Computer And Information Security
CCTV, Surveillance Systems, Equipment & Components
Access Control Components, Equipment And Systems
Alarms, Burglar, Electronic Systems, Equipment & Components
Fire Protection, Detection & Controls
Intrusion Detection
Perimeter Security, Fences, Ballistic
Security & Specialty Services
Security Design Services
Facilities Systems
Miscellaneous

Find Products for :-

 

Find Solutions for:-
Complete information on security services, guarding services, investigators, detectives and security systems. We also have a online directory guide of the companies providing services the above services in different states of India like Delhi, Mumbai, Gurgaon, Banglore, Noida etc. 

www.securityservicesindia.com

 

A Directory on Insurance as well as Insurance related topics updated to the latest. A total solutions site for your basic to advanced Insurance needs
 

www.insurance4india.com

 

Want a loan? Learn the pros and cons for taking a loan and lots of information for your finance problems.

www.finance4india.com

 

Plan a trip to India! Visit the beautiful, culture rich country having diverse climates, castes, languages and creed. Each visit will add a new experience in your life, select your tour and make a trip to India with us

www.visitindia.org.in

 

 
 

  © Copyright 2005. securitysolutionsindia. All Rights Reserved.