網絡安全 攻擊類型
Nowadays Cyber Security is an essential part of our life. We are store, secure and use data and security is important to prevent to steal data. There are numbers of attacks done by the attackers for ex: Man in middle attacks, Brute force, etc. Companies are aware of the Cyber Security importance especially those who are working on a cloud system and IoT technology. Cyber Security involving the various types of protection of computer system and prevention of the unauthorized access of electronic data.
如今,網絡安全已成為我們生活中不可或缺的一部分。 我們存儲,保護和使用數據,安全性對于防止竊取數據很重要。 攻擊者針對例如ex進行了許多攻擊:中級攻擊,蠻力攻擊等。公司意識到網絡安全的重要性,尤其是那些致力于云系統和IoT技術的公司。 網絡安全涉及各種類型的計算機系統保護,以及防止未經授權的電子數據訪問。
網絡攻擊的類型 (Types of Cyber attacks)
1) Man in the middle attacks
1)中間人襲擊
It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Using this Man in middle attacks, an attacker will be able to read the data, insert the data and modify the data in the intercepted connection.
這是一種攻擊類型,它使攻擊者可以攔截客戶端和服務器之間的連接并充當它們之間的橋梁。 通過在中間攻擊中使用此Man,攻擊者將能夠在攔截的連接中讀取數據,插入數據并修改數據。
2) Brute force
2)蠻力
Brute force is a type of attack which uses a technique of trial and error method. Brute force attack generates a large number of guesses about the data and validates them to obtain actual data like user password and personal identification number. This type of attack used by criminals to crack encrypted data, or by security, analysts to test an organization's network security.
蠻力攻擊是一種使用試錯法的攻擊方式。 蠻力攻擊會產生大量有關數據的猜測,并對其進行驗證以獲取實際數據,例如用戶密碼和個人標識號。 犯罪分子使用這種類型的攻擊來破解加密數據,或者由安全分析人員使用這種攻擊來測試組織的網絡安全性。
3) DNS Spoofing
3)DNS欺騙
DNS Spoofing is another type of computer security hacking. Where data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer or any other computer. This type of attack DNS attacks may go on for a long period of time without being detected and can cause serious security issues.
DNS欺騙是另一種計算機安全黑客攻擊。 將數據引入DNS解析器的緩存中,導致名稱服務器返回錯誤的IP地址,從而將流量分配給攻擊者的計算機或任何其他計算機。 此類攻擊DNS攻擊可能會持續很長時間而未被檢測到,并且可能導致嚴重的安全問題。
This type of attack meant to make a network resource unavailable to the users. It accomplishes this by covering the target with traffic or sending it information that triggers a crash. The attacker uses a single system and a single internet connection to attack a server system.
這種攻擊意味著使網絡資源對用戶不可用。 它通過向目標覆蓋流量或向其發送觸發崩潰的信息來實現此目的。 攻擊者使用單個系統和單個Internet連接來攻擊服務器系統。
4) Backdoors
4)后門
Most of the attackers use the technique of backdoors and this is a method that bypasses the normal authentication process. For the get, information developer create a backdoor so that an application or operating system can be accessed for troubleshooting or other benefits purposes.
大多數攻擊者使用后門技術,這是繞過正常身份驗證過程的一種方法。 為此,信息開發人員創建了后門,以便可以出于故障排除或其他好處的目的訪問應用程序或操作系統。
5) Bots
5)機器人
A bot is also called a robot is an automated process that interacts with all other network services. Some bots program run automatically, while others only execute commands when they receive specific input. There are various examples of bots program are a crawler, chatroom bots, and malicious bots.
機器人也稱為機器人,是與所有其他網絡服務交互的自動化過程。 一些機器人程序自動運行,而其他機器人程序僅在收到特定輸入后才執行命令。 僵尸程序的各種示例包括搜尋器,聊天室僵尸程序和惡意僵尸程序。
6) Dictionary attacks
6)字典攻擊
Attacker use Dictionary attacks for stored the list of a commonly used password and validated information to get original password.
攻擊者使用字典攻擊來存儲常用密碼的列表和經過驗證的信息以獲得原始密碼。
7) Session Hijacking
7)會話劫持
Attacker use Session Hijacking to attack a user session over a protected network and also web applications create cookies to store all the state about the cookies and user sessions. By stealing the cookies, an attacker can have access to all important information about user data.
攻擊者使用會話劫持通過受保護的網絡攻擊用戶會話,并且Web應用程序還會創建cookie,以存儲有關cookie和用戶會話的所有狀態。 通過竊取cookie,攻擊者可以訪問有關用戶數據的所有重要信息。
8) Phishing
8)網絡釣魚
Attackers use Phishing technique to do various type of inactivities like steal sensitive information and user login credentials and credit card number. It occurs when an attacker pretends to be as a trustworthy entity in an electronic communication device.
攻擊者使用網絡釣魚技術來進行各種失活,例如竊取敏感信息以及用戶登錄憑據和信用卡號。 當攻擊者偽裝成電子通信設備中的可信賴實體時,就會發生這種情況。
翻譯自: https://www.includehelp.com/cyber-security/types-of-cyber-attacks.aspx
網絡安全 攻擊類型