Spoofing: 2. Ddos (Distributed Denial of Service)
Spoofing: 2. Ddos (Distributed Denial of Service)
1. Spoofing
Spoofing is an attack technique that is carried out by the
attacker by falsifying data so that the attacker can look like a
trusted host. IP spoofing and ARP spoofing in particular may be
used to leverage man-in-the-middle attacks against hosts on a
computer network. Spoofing attacks which take advantage of TCP
/ IP suite protocols may be mitigated with the use of firewalls
capable of deep packet inspection or by taking measures to verify
the identity of the sender or recipient of a message.
3. Sniffing Attack
Sniffing Attack is a data theft technique by monitoring and
analyzing each packet of data that is transmitted from the client to
the server.
4. SQL Injection
SQL Injection is an attack technique that utilizes website security
that allows users to enter data without filtering out malicious
characters so that attackers can get access to the application
database. Inputs are usually entered into certain parts of the
website that are related to the site database.
5. Trojan Horse
Trojan Horse in computer security is an attack that can damage
a network or system. With a Trojan horse attack, an attacker can
gain access rights to the target and used to find information from
the target