Network security attacks in Hindi | Active attacks and Passive attacks in Network security in Hindi
What are network security attacks? We will learn types of security attacks in Hindi namely, active attack and passive attacks in this computer cryptography a...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
What are network security attacks? We will learn types of security attacks in Hindi namely, active attack and passive attacks in this computer cryptography and network security tutorial in Hindi.
Check out my Hill Cipher video: http://youtu.be/wd0e1h0YcIY
TYPES OF SECURITY ATTACKS
THERE ARE 2 MAIN TYPES OF SECURITY ATTACKS:
Passive Attacks
Active Attacks
Passive Attacks
There are 2 types of Passive Attacks:
Release the content
Traffic Analysis
Release the content
In this type of passive attack, the unauthorized person accesses content of the message.
In release the content attack, the third party/unauthorized user gains access to content which might be sensitive or confidential but may not use it or do anything with it. Hence its called passive attack.
Example
Traffic Analysis
Traffic Analysis is a more subtle way of security attack.
In traffic analysis the third party or the unauthorized user cannot see what is content of the messages sent because the message may be encrypted, but can observe the frequency of the message, the length of the message, the place of origin and receipt of the message, which might be useful in guessing the content and context of the message.
Example
Active Attacks
There are 4 types of Active Attacks in network security:
Masquerade
Replay
Modification of message
Denial of service
Masquerade
In simple terms, A masquerade attack is an authorized person with less privileges in the system impersonating another authorized person with more privileges to obtain those extra privileges.
Example of this is the private secretary of the principal of a school acting as if she is the principal and giving letter of recommendations with the stamp of the principal.
Masquerade
How does one do this type of attack?
Basically, when the authentication is done by the authorized person, the masquerader captures the authentication sequence and replay the authentication, to impersonate the authorized person.
Example
Imagine you have logged into your email account from your work pc and saved the email address and password by remember password in the browser. Now someone who has access to the PC in your workplace but don’t know the email address and password goes and logs in to your account with automatic login in the same browser.
This is exactly how Masquerade attack works.
Replay
Replay attack means literally like it sounds.
In this attack the third party unauthorized user captures the message and replays it or sends it again to produce unauthorized effect.
Replay
Example of replay attack is, suppose you transfer some money to a person, and someone captures the money transfer data and re transmits it, then the money is transferred twice, which is not something you wanted to happen.
Modification of Message
In this type of attack, the third person, i.e. the unauthorized person alters some portion of the original message and sends it to the receiver to produce an unauthorized effect.
Example
Imagine, you send message saying “Give access to the secret document to Aaron” and the third person modifies the message to “Give access to secret document to Barry”.
This is a very serious type of attack as the effects of this attack can be devastating.
Denial of Service
In this attack, the third party or the unauthorized user prevents normal use of the communication facilities.
Another form of this attack is disruption of the entire network or slowing down the entire network by overloading it messages.
Example
Example of Denial of service is Ping attack or ping flood attack, where you send request to a network continuously, which ultimately overloads the network and no one can use it.
THANK YOU!!!!
Chapters
0:00-0:28 Types of security attacks in Network security
0:28-2:25 Passive attacks
2:25-6:53 Active attacks
#networksecurityattacks #activeattack #passiveattack
Video Information
Views
1.2K
Total views since publication
Likes
22
User likes and reactions
Duration
6:53
Video length
Published
Nov 5, 2020
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#network security attacks #network security attacks in hindi #active attack and passive attack in hindi #active attack #active attack and passive attack #passive attacks vs active attacks #passive attack and active attack #passive attack in network security #network security #network security tutorial for beginners #release the content attack #masquerade attack in network security #denial of service attack #denial of service #denial of service attack explained
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.