This Blog is dedicated to help Serious IT Security Practitioners to pass the renowned CISSP exam. It is a must read for those going for the exam and needs total recall
ATTACK AND MONITOR OF THREATS AND WORMS
- Brute Force attacks
- Attempts to gain access many times using different input
- Password guessing and war dialing are examples
- Dictionary attacks
- More selective than a brute force
- Submits identification credentials from a dictionary, or a list of commonly used user IDs
- Denial of Service (DOS) attacks
- Attacker saturates network, rendering access to the system impossible or unbearably slow
- Spoofing attacks
- Attacker presents a substitute login screen
- Fake login screen stores the user ID and password, then displays a failed login message
- Man-in-the-Middle attack
- Uses a network sniffer or hardware/software that intercepts network packets, to grab traffic en route to another destination
- Monitoring
- Normally only used by hackers or to investigate suspected inappropriate activity
- Entices a potential hacker to attack
- Intrusion Detection
- Intrusion detection systems(IDS)
- Network-based IDS - monitors network segment
- Monitor a network or system
- Host-based IDS - monitors a single system
- Contains a database of recognized attacks
- Activity is compared with signature database
- Sounds an alarm for suspcious activity
- Sometimes called an expert system
- Generally results in more false positives than signature-based IDS
- Penetration Testing
- Set of attacks to judge how vulnerable your system really is
- Exhaustive penetration tests can uncover vulnerabilities
0 Comments:
Post a Comment
<< Home