Unit 1-Solution
Unit 1-Solution
POLYTECHNIC
L. J. Campus, Between Sarkhej-Sanand Circle & Kataria Motors,
Ph. 079-29096539.
Notes
Of
Computer
And
Network Security
DEPARTMENT OF COMPUTER ENGINEERING
SEMESTER – 5
Computer and Network Security [3350704] Notes
UNIT 1
2
Computer and Network Security [3350704] Notes
3
Computer and Network Security [3350704] Notes
Integrity: The message that is sent from sender to receiver is not modified or altered
before it reaches to the receiver. If the message is modified before it reaches to the
receiver then integrity is lost.
Availability: It assures that systems work promptly and service is not denied to
authorize users. Availability means that information should be available to authorized
parties at all times.
4
Computer and Network Security [3350704] Notes
5
Computer and Network Security [3350704] Notes
6
Computer and Network Security [3350704] Notes
7
Computer and Network Security [3350704] Notes
Masquerade
A masquerade attack is an attack that uses a fake identity, such as a network identity,
to gain unauthorized access to personal computer information through legitimate
access identification. If an authorization process is not fully protected, it can become
extremely vulnerable to a masquerade attack.
Masquerade attacks can be perpetrated using stolen passwords and logons, by
locating gaps in programs, or by finding a way around the authentication process. The
attack can be triggered either by someone within the organization or by an outsider if
the organization is connected to a public network. The amount of access masquerade
attackers get depends on the level of authorization they've managed to attain. As
such, masquerade attackers can have a full smorgasbord of cybercrime opportunities
if they’ve gained the highest access authority to a business organization. Personal
attacks, although less common, can also be harmful.
Denial of Service
8
Computer and Network Security [3350704] Notes
9
Computer and Network Security [3350704] Notes
From a high level, a DDoS attack is like an unexpected traffic jam clogging up the
highway, preventing regular traffic from arriving at its destination.
Sniffing
Spoofing
10
Computer and Network Security [3350704] Notes
For example, a spoofed email from PayPal or Amazon might inquire about purchases
you never made. Concerned about your account, you might be motivated to click the
included link.
From that malicious link, scammers will send you to a web page with a malware
download or a faked login page—complete with a familiar logo and spoofed URL—
for the purpose of harvesting your username and password.
Backdoor/Trapdoor
The simplest backdoor attack definition is using any malware/virus/technology to
gain unauthorized access to the application/system/network while bypassing all the
implemented security measures. Unlike other kinds of viruses/malware, backdoor
attack elements reach the core of the targeted application and often drive the aimed
resource as a driver or key administrator.
Attackers can change the entire or partial infrastructure, make the targeted system
work/behave as per their will, and steal crucial data.
The working of backdoor attacks depends on the way they enter the system. As
observed, the most common ways, using which a backdoor can enter into a system,
are using malware or using backdoor-specific software/hardware.
To prevent backdoor, an anti-malware program is useful to keep malicious content at
bay. It will automatically detect and eliminate dangers like viruses, malware, Trojans,
and so on and keep the system protected. As everything happens automatically, not
much effort is required.
11
Computer and Network Security [3350704] Notes
A man in the middle (MITM) attack is a general term for when an attacker positions
himself in a conversation between a user and an application—either to eavesdrop or
to impersonate one of the parties, making it appear as if a normal exchange of
information is underway.
The goal of an attack is to steal personal information, such as login credentials,
account details and credit card numbers.
A man-in-the-middle (MiTM) attack is a type of attack in which the attacker secretly
intercepts and relays messages between two parties who believe they are
communicating directly with each other. The attack is a type of eavesdropping in
which the attacker intercepts and then controls the entire conversation.
During MiTM attacks, attackers insert themselves in the middle of data transactions
or online communication. Through the distribution of malware, the attacker gains
easy access to the user's web browser and the data it sends and receives during
transactions. Online banking and e-commerce sites, which require secure
authentication with a public key and a private key, are the prime targets of MiTM
attacks as they enable attackers to capture login credentials and other confidential
information.
Typically, these attacks are carried out through a two-step process known as data
interception and decryption.
Data interception consists of an attacker intercepting a data transfer between a client
and a server. The attacker tricks the client and the server into believing that they are
exchanging information with each other, while the attacker intercepts the data, creates
a connection to the real site and acts as a proxy to read and insert false information
into the communication.
The decryption phase is where the intercepted data is unencrypted. This essential step
enables the attacker to finally decipher and use the data to their advantage; for
example, they can carry out identity theft or cause disruptions to business operations.
12
Computer and Network Security [3350704] Notes
Replay
TCP/IP Hacking
TCP/IP Hijacking is when an authorized user gains access to a genuine network
connection of another user. It is done in order to bypass the password authentication
which is normally the start of a session.
An attacker monitors the data transmission over a network and discovers the IP’s of
two devices that participate in a connection.
When the hacker discovers the IP of one of the users, he can put down the connection
of the other user by DoS attack and then resume communication by spoofing the IP of
the disconnected user.
13
Computer and Network Security [3350704] Notes
SQL Injection
SQL injection is a set of SQL commands that are placed in a URL string or in data
structures in order to retrieve a response that we want from the databases that are
connected with the web applications. This type of attacks generally takes place on
webpages developed using PHP or ASP.NET.
An SQL injection attack can be done with the following intentions −
To dump the whole database of a system,
To modify the content of the databases, or
To perform different queries that are not allowed by the application.
This type of attack works when the applications don’t validate the inputs properly,
before passing them to an SQL statement. Injections are normally placed put in
14
Computer and Network Security [3350704] Notes
address bars, search fields, or data fields. The easiest way to detect if a web
application is vulnerable to an SQL injection attack is to use the " ‘ " character in a
string and see if you get any error.
Phishing
Phishing attacks are the practice of sending fraudulent communications that appear to
come from a reputable source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to install malware on the
victim’s machine. Phishing is a common type of cyber-attack that everyone should
learn about in order to protect themselves.
Phishing starts with a fraudulent email or other communication that is designed to
lure a victim. The message is made to look as though it comes from a trusted sender.
If it fools the victim, he or she is coaxed into providing confidential information,
often on a scam website. Sometimes malware is also downloaded onto the target’s
computer.
Malicious code may also include time bombs, hardcoded cryptographic constants and
credentials, deliberate information and data leakage, rootkits and anti-debugging
techniques. These targeted malicious code threats are hidden in software and mask
their presence to evade detection by traditional security technologies.
Once inside your environment, malicious code can enter network drives and
propagate. Malicious code can also cause network and mail server overload by
sending email messages; stealing data and passwords; deleting document files, email
files or passwords; and even reformatting hard drives.
16