Network security attacks in Hindi | Active attacks and Passive attacks in Network security in Hindi

What are network security attacks? We will learn types of security attacks in Hindi namely, active attack and passive attacks in this computer cryptography a...

QuickCS•1.2K views•6:53

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

What are network security attacks? We will learn types of security attacks in Hindi namely, active attack and passive attacks in this computer cryptography and network security tutorial in Hindi. Check out my Hill Cipher video: http://youtu.be/wd0e1h0YcIY TYPES OF SECURITY ATTACKS THERE ARE 2 MAIN TYPES OF SECURITY ATTACKS: Passive Attacks Active Attacks Passive Attacks There are 2 types of Passive Attacks: Release the content Traffic Analysis Release the content In this type of passive attack, the unauthorized person accesses content of the message. In release the content attack, the third party/unauthorized user gains access to content which might be sensitive or confidential but may not use it or do anything with it. Hence its called passive attack. Example Traffic Analysis Traffic Analysis is a more subtle way of security attack. In traffic analysis the third party or the unauthorized user cannot see what is content of the messages sent because the message may be encrypted, but can observe the frequency of the message, the length of the message, the place of origin and receipt of the message, which might be useful in guessing the content and context of the message. Example Active Attacks There are 4 types of Active Attacks in network security: Masquerade Replay Modification of message Denial of service Masquerade In simple terms, A masquerade attack is an authorized person with less privileges in the system impersonating another authorized person with more privileges to obtain those extra privileges. Example of this is the private secretary of the principal of a school acting as if she is the principal and giving letter of recommendations with the stamp of the principal. Masquerade How does one do this type of attack? Basically, when the authentication is done by the authorized person, the masquerader captures the authentication sequence and replay the authentication, to impersonate the authorized person. Example Imagine you have logged into your email account from your work pc and saved the email address and password by remember password in the browser. Now someone who has access to the PC in your workplace but don’t know the email address and password goes and logs in to your account with automatic login in the same browser. This is exactly how Masquerade attack works. Replay Replay attack means literally like it sounds. In this attack the third party unauthorized user captures the message and replays it or sends it again to produce unauthorized effect. Replay Example of replay attack is, suppose you transfer some money to a person, and someone captures the money transfer data and re transmits it, then the money is transferred twice, which is not something you wanted to happen. Modification of Message In this type of attack, the third person, i.e. the unauthorized person alters some portion of the original message and sends it to the receiver to produce an unauthorized effect. Example Imagine, you send message saying “Give access to the secret document to Aaron” and the third person modifies the message to “Give access to secret document to Barry”. This is a very serious type of attack as the effects of this attack can be devastating. Denial of Service In this attack, the third party or the unauthorized user prevents normal use of the communication facilities. Another form of this attack is disruption of the entire network or slowing down the entire network by overloading it messages. Example Example of Denial of service is Ping attack or ping flood attack, where you send request to a network continuously, which ultimately overloads the network and no one can use it. THANK YOU!!!! Chapters 0:00-0:28 Types of security attacks in Network security 0:28-2:25 Passive attacks 2:25-6:53 Active attacks #networksecurityattacks #activeattack #passiveattack

Video Information

Views
1.2K

Total views since publication

Likes
22

User likes and reactions

Duration
6:53

Video length

Published
Nov 5, 2020

Release date

Quality
hd

Video definition