Lect 8 . Tahani al jehain. Types of attack . Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not have priviliges to run. Denial of services: an attacker can send a large number of TCP Sync packets to a target. Syn packets
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Tahani al jehain
Remote code execution: occurs when an attacker
exploits a software and runs a program that the user
does not have priviliges to run.
Denial of services: an attacker can send a large
number of TCP Sync packets to a target. Syn packets
are supposed to be the first part of the TCP header. The
server normally responds with a Syn-Ack packet, and
allocates buffer for new TCP session. However, the
attacking host never responds.
Worms and virus: automated attacks, programmed to
spread themselves as rapidaly, and widely as possible.
Trojan and Spyware: installed with other software.
They collect information about the system (password,
visited websites,…). Information which has been
collected can be send to someone else.
3- Functionnal segmentation:
Is based on layered security and the principle of least
Functionnalsegmentation suggests a design in which
the network is partitionned according to user or device
Virtual private network:
Provides a secure connection between a sender and a
receiver over a public network such as Internet.
VPNs are not new. They have been used in telephone
networks for years.
VPN uses data encryption and other security
mechanisms to prevent unauthorized users from
accessing data. It then use tunneling process
(enclosing the encrypted data) to transport the
encrypted data across the network.
Virtual private networks
Tunneling in virtual private network