网络安全 攻击类型_网络攻击的类型| 网络安全
網(wǎng)絡(luò)安全 攻擊類型
Nowadays Cyber Security is an essential part of our life. We are store, secure and use data and security is important to prevent to steal data. There are numbers of attacks done by the attackers for ex: Man in middle attacks, Brute force, etc. Companies are aware of the Cyber Security importance especially those who are working on a cloud system and IoT technology. Cyber Security involving the various types of protection of computer system and prevention of the unauthorized access of electronic data.
如今,網(wǎng)絡(luò)安全已成為我們生活中不可或缺的一部分。 我們存儲(chǔ),保護(hù)和使用數(shù)據(jù),安全性對(duì)于防止竊取數(shù)據(jù)很重要。 攻擊者針對(duì)例如ex進(jìn)行了許多攻擊:中級(jí)攻擊,蠻力攻擊等。公司意識(shí)到網(wǎng)絡(luò)安全的重要性,尤其是那些致力于云系統(tǒng)和IoT技術(shù)的公司。 網(wǎng)絡(luò)安全涉及各種類型的計(jì)算機(jī)系統(tǒng)保護(hù),以及防止未經(jīng)授權(quán)的電子數(shù)據(jù)訪問(wèn)。
網(wǎng)絡(luò)攻擊的類型 (Types of Cyber attacks)
1) Man in the middle attacks
1)中間人襲擊
It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Using this Man in middle attacks, an attacker will be able to read the data, insert the data and modify the data in the intercepted connection.
這是一種攻擊類型,它使攻擊者可以攔截客戶端和服務(wù)器之間的連接并充當(dāng)它們之間的橋梁。 通過(guò)在中間攻擊中使用此Man,攻擊者將能夠在攔截的連接中讀取數(shù)據(jù),插入數(shù)據(jù)并修改數(shù)據(jù)。
2) Brute force
2)蠻力
Brute force is a type of attack which uses a technique of trial and error method. Brute force attack generates a large number of guesses about the data and validates them to obtain actual data like user password and personal identification number. This type of attack used by criminals to crack encrypted data, or by security, analysts to test an organization's network security.
蠻力攻擊是一種使用試錯(cuò)法的攻擊方式。 蠻力攻擊會(huì)產(chǎn)生大量有關(guān)數(shù)據(jù)的猜測(cè),并對(duì)其進(jìn)行驗(yàn)證以獲取實(shí)際數(shù)據(jù),例如用戶密碼和個(gè)人標(biāo)識(shí)號(hào)。 犯罪分子使用這種類型的攻擊來(lái)破解加密數(shù)據(jù),或者由安全分析人員使用這種攻擊來(lái)測(cè)試組織的網(wǎng)絡(luò)安全性。
3) DNS Spoofing
3)DNS欺騙
DNS Spoofing is another type of computer security hacking. Where data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer or any other computer. This type of attack DNS attacks may go on for a long period of time without being detected and can cause serious security issues.
DNS欺騙是另一種計(jì)算機(jī)安全黑客攻擊。 將數(shù)據(jù)引入DNS解析器的緩存中,導(dǎo)致名稱服務(wù)器返回錯(cuò)誤的IP地址,從而將流量分配給攻擊者的計(jì)算機(jī)或任何其他計(jì)算機(jī)。 此類攻擊DNS攻擊可能會(huì)持續(xù)很長(zhǎng)時(shí)間而未被檢測(cè)到,并且可能導(dǎo)致嚴(yán)重的安全問(wèn)題。
This type of attack meant to make a network resource unavailable to the users. It accomplishes this by covering the target with traffic or sending it information that triggers a crash. The attacker uses a single system and a single internet connection to attack a server system.
這種攻擊意味著使網(wǎng)絡(luò)資源對(duì)用戶不可用。 它通過(guò)向目標(biāo)覆蓋流量或向其發(fā)送觸發(fā)崩潰的信息來(lái)實(shí)現(xiàn)此目的。 攻擊者使用單個(gè)系統(tǒng)和單個(gè)Internet連接來(lái)攻擊服務(wù)器系統(tǒng)。
4) Backdoors
4)后門
Most of the attackers use the technique of backdoors and this is a method that bypasses the normal authentication process. For the get, information developer create a backdoor so that an application or operating system can be accessed for troubleshooting or other benefits purposes.
大多數(shù)攻擊者使用后門技術(shù),這是繞過(guò)正常身份驗(yàn)證過(guò)程的一種方法。 為此,信息開(kāi)發(fā)人員創(chuàng)建了后門,以便可以出于故障排除或其他好處的目的訪問(wèn)應(yīng)用程序或操作系統(tǒng)。
5) Bots
5)機(jī)器人
A bot is also called a robot is an automated process that interacts with all other network services. Some bots program run automatically, while others only execute commands when they receive specific input. There are various examples of bots program are a crawler, chatroom bots, and malicious bots.
機(jī)器人也稱為機(jī)器人,是與所有其他網(wǎng)絡(luò)服務(wù)交互的自動(dòng)化過(guò)程。 一些機(jī)器人程序自動(dòng)運(yùn)行,而其他機(jī)器人程序僅在收到特定輸入后才執(zhí)行命令。 僵尸程序的各種示例包括搜尋器,聊天室僵尸程序和惡意僵尸程序。
6) Dictionary attacks
6)字典攻擊
Attacker use Dictionary attacks for stored the list of a commonly used password and validated information to get original password.
攻擊者使用字典攻擊來(lái)存儲(chǔ)常用密碼的列表和經(jīng)過(guò)驗(yàn)證的信息以獲得原始密碼。
7) Session Hijacking
7)會(huì)話劫持
Attacker use Session Hijacking to attack a user session over a protected network and also web applications create cookies to store all the state about the cookies and user sessions. By stealing the cookies, an attacker can have access to all important information about user data.
攻擊者使用會(huì)話劫持通過(guò)受保護(hù)的網(wǎng)絡(luò)攻擊用戶會(huì)話,并且Web應(yīng)用程序還會(huì)創(chuàng)建cookie,以存儲(chǔ)有關(guān)cookie和用戶會(huì)話的所有狀態(tài)。 通過(guò)竊取cookie,攻擊者可以訪問(wèn)有關(guān)用戶數(shù)據(jù)的所有重要信息。
8) Phishing
8)網(wǎng)絡(luò)釣魚(yú)
Attackers use Phishing technique to do various type of inactivities like steal sensitive information and user login credentials and credit card number. It occurs when an attacker pretends to be as a trustworthy entity in an electronic communication device.
攻擊者使用網(wǎng)絡(luò)釣魚(yú)技術(shù)來(lái)進(jìn)行各種失活,例如竊取敏感信息以及用戶登錄憑據(jù)和信用卡號(hào)。 當(dāng)攻擊者偽裝成電子通信設(shè)備中的可信賴實(shí)體時(shí),就會(huì)發(fā)生這種情況。
翻譯自: https://www.includehelp.com/cyber-security/types-of-cyber-attacks.aspx
網(wǎng)絡(luò)安全 攻擊類型
總結(jié)
以上是生活随笔為你收集整理的网络安全 攻击类型_网络攻击的类型| 网络安全的全部?jī)?nèi)容,希望文章能夠幫你解決所遇到的問(wèn)題。
- 上一篇: 吴忠治免疫性不孕最好的医院推荐
- 下一篇: julia矩阵运算_Julia中的复数及