Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In this conference, we will focus on typical attacks in the Internet affecting c

ID: 3812814 • Letter: I

Question

In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application. (This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer). Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response.

Explanation / Answer

Types of Network Attacks

            The stored data might be in a attack without security measures and controls. Some of the attacks are monitored and some of them are altered or destroyed the data or even the network itself.

            Eavesdropping is the illegalised real-time interruption of a secluded message, like ATM machine, phone call, instant message, video conference, fax transmission. In an enterprise, it is the most common problem which has been faced by an administrator. So based on cryptology, strong encryption facilities are needed to protect the data as it is navigated through the networks.

An attacker changes the packet source address which tends to be assumed as the packet comes from the destination by the receiver. IP address is mostly used by the networks and operating systems for the legal unit identification. It is also possible to receive false IP address because the attacker also uses programs for fabricating the IP packets to appear as valid destination address that is to be originated.

            An attacker tries to login with the password by guessing.

Brute force attack

An attacker trying with the password of all the possible combinations

Dictionary attack

An attacker trying with a list of words of possible password

          From the middle of transmission the data has been seized and the changes made to it and then again it has been passed to the destination address. The receiver also thinks that, it has been received from the original source address.

The data packet which has been transferred to the receiver has been read by the attacker, and it has been altered by the attacker without the knowledge of both the sender and receiver.

          A DoS attack prevents usual use of computer or a network by legal users. The attacker can easily gain access to the networks and perform the attacks like sending invalid data, flooding the network with traffic and make to lose the network resources from accessing by the authorized users.

          Backdoors are default in software by design and they are created by altering an existing program. It is designed traditionally to avoid security detection and delivers a masked plug of entry.

            Malicious code has been hidden in the software which is to be trusted by the receiver. Without the knowledge of the receiver it has been traversed to all the destination address through the internet. Once the infected software has been by the user at the end, it starts to send the delicate materials to the attacker. For this resolution, pirated software are used.

            Insider attack is of

           Intentionally – the network infrastructure or the data are being damaged intentionally by an attacker. For money or revenge, they perform the attack intentionally.

            Accidentally – due to lack of knowledge or carelessness, the damages are made accidentally.

        Administrators use different approaches to protect networks from the attacks.

Things to be done for controlling attacks

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote