Lecture - 15 - New
Lecture - 15 - New
Security Threats
Sniffers
Ping Sweepers
The attacker will start with searching online, phone directories and job
listings etc.
Once the information is gathered, the attacker will then use ping sweepers
and port scanners.
DOS attack typically overwhelms (floods) the network with unusual large
amount of traffic, which it cannot handle.
Types of Spoofing:
1. IP address spoofing
1. Guessing
2. Dictionary attack
Once the attacker has managed to get into the network, they
can use packet sniffer tools such as Wireshark to read sent
and received packets.
Services provided:
Authenticity
Confidentiality
Integrity
Non-deniability
Solutions
Cryptography:
If public key is used for encryption then private key is used for
decryption and vice versa.