0% found this document useful (0 votes)
34 views2 pages

Spoofing: 2. Ddos (Distributed Denial of Service)

There are several common types of network attacks, including spoofing, distributed denial of service (DDoS) attacks, sniffing attacks, SQL injection, and Trojan horse attacks. Spoofing involves falsifying data to appear like a trusted host in order to enable man-in-the-middle attacks. DDoS attacks consume server resources to prevent it from functioning properly. Sniffing attacks involve monitoring network traffic to steal data. SQL injection exploits unfiltered user input to access application databases. Trojan horse attacks grant attackers access rights to damage or steal information from targets.

Uploaded by

Adhem Naiji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

Spoofing: 2. Ddos (Distributed Denial of Service)

There are several common types of network attacks, including spoofing, distributed denial of service (DDoS) attacks, sniffing attacks, SQL injection, and Trojan horse attacks. Spoofing involves falsifying data to appear like a trusted host in order to enable man-in-the-middle attacks. DDoS attacks consume server resources to prevent it from functioning properly. Sniffing attacks involve monitoring network traffic to steal data. SQL injection exploits unfiltered user input to access application databases. Trojan horse attacks grant attackers access rights to damage or steal information from targets.

Uploaded by

Adhem Naiji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 3

Talking about network security, there are several kinds of network


attacks.
There are many types of attacks on computer networks. The following
are some of the attacks most often used by attackers.

1. Spoofing
Spoofing is an attack technique that is carried out by the
attacker by falsifying data so that the attacker can look like a
trusted host. IP spoofing and ARP spoofing in particular may be
used to leverage man-in-the-middle attacks against hosts on a
computer network. Spoofing attacks which take advantage of TCP
/ IP suite protocols may be mitigated with the use of firewalls
capable of deep packet inspection or by taking measures to verify
the identity of the sender or recipient of a message.

2. DDoS ( Distributed Denial of Service )


DDoS Attack is a type of attack on a computer or server on the
internet network by consuming resources (resources) that are
owned by the computer. So the computer cannot perform its
functions by actually being used to save other users to gain access
to computers that are the attacked.

3. Sniffing Attack
Sniffing Attack is a data theft technique by monitoring and
analyzing each packet of data that is transmitted from the client to
the server.

4. SQL Injection
SQL Injection is an attack technique that utilizes website security
that allows users to enter data without filtering out malicious
characters so that attackers can get access to the application
database. Inputs are usually entered into certain parts of the
website that are related to the site database.
5. Trojan Horse
Trojan Horse in computer security is an attack that can damage
a network or system. With a Trojan horse attack, an attacker can
gain access rights to the target and used to find information from
the target

You might also like