Q1. Define Attack and Explain The Types of Threats
Q1. Define Attack and Explain The Types of Threats
Ans. An action that compromises information security is called security attack. Network security attacks can be in the hardware, software, and data. A threat to a computing system is a set of circumstances with potential to cause loss or harm. The threats would be either human-initiated or computer-initiated. Though huge amounts of money are spent on network security measures, no one can guarantee it. The success depends upon the careful monitoring of network and quick isolation of the attack.
Attacks launched by trusted (inside) users: In this type of attack the user already has access to a lot of network resources and network policies are not very strict. Attacks launched by external individuals: In this type of attack the attacker generally has to put greater efforts, as most network security policies have stringent measures against external attackers. The attacker may be attacking just for fun or a highly experienced hacker. Some hackers can gain access to sensitive information which could be used to fuel identity theft. Hackers have the ability to gain access to personal e-mail accounts. Usually the hackers simply destroy data and leave the websites in an inoperable state. There are many methods used to accomplish these unscrupulous objectives. Hence the damage caused by a network may vary from little to severe. Some of the damages caused are as under: Damage or destruction of computer systems. Damage or destruction of internal data. Loss of sensitive information to hostile parties. Use of sensitive information to steal elements of monitory value. Use of sensitive information against the customers which may result in legal action by customers against the organization and loss of customers. Damage to the reputation of an organization. Monitory damage, due to loss of sensitive information, destruction of data, hostile use of sensitive data, or damage to the reputation of the organization.
Passive attack
Passive attacks may relate to traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user.
Active attack
In an active attack, the attacker tries to bypass or break into secured systems by introducing malicious code. Active attacks result in the disclosure of data files or modification of data.
Distributed attack
A distributed attack requires that the adversary introduce code to a trusted component or software that will later be distributed at the factory or during distribution to gain unauthorised access to information or to a system function at a later date.
Close-in attack
A close-in attack takes place when someone trying to get physically close to network components for the purpose of modifying, gathering, or denying access to information. Close physical proximity is achieved through surreptitious entry into the network, open access, or both.
Phishing attack
Phishing is done by creating a fake website that looks like the original and is used to record username and password of the users.
Hijack attack
In a hijack attack, a hacker takes over a session between two individuals and disconnects the communication. Sensitive information may be sent to the hacker by accident.
Spoof attack
This may be an attempt to bypass firewall rules by modifying the source address of the packets.
Buffer overflow
Excess data is sent to an application than it can handle and usually results in the attacker gaining administrative access.
Exploit attack
The attacker knows of a security problem within an operating system or a piece of software and leverages it.
Password attack
An attacker tries to crack the stored passwords. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack.
Symmetric Algorithms Speed is fast Size of cipher text is usually the same or less than that of the plain text Number of keys used is the square of the number of participants. Key exchange is a major problem (hence, algorithms like the Diffie-Hellman Key Exchange algorithm are used) More storage space required
Asymmetric Algorithms Slower in Speed Cipher text size is usually greater than that of the plain text Number of keys used is same as the number of participants. Key exchange is no problem
Double DES
For greater secrecy double data encryption standard was implemented, which required larger computing power. The double encryption works in the following way. Taking two keys, k1 and k2, and performing two encryptions, one on top of the other. In theory, this approach should multiply the difficulty of breaking the encryption. This assumption is false. Double encryption only doubles the work for the attacker.
Triple DES
Triple DES uses the same two keys as double DES but applies them in three operations adding greater strength. Text is encrypted with one key, decrypted with the second, and encrypted with the first again. Triple DES doubles the effective key length. But a 112-bit effective key length is quite strong and effective against all known attacks.