{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":27578,"author_id":16114,"title":"CSS exam","created_at":"2013-03-17T01:58:45Z","updated_at":"2017-01-12T00:31:16Z","sample":false,"description":null,"alerts_enabled":true,"cached_tag_list":"cyber security","deleted_at":null,"hidden":false,"average_rating":"4.0","demote":false,"private":false,"copyable":true,"score":122,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["cyber security"],"admin_tag_list":[],"study_aid_type":"FlashCardDeck","show_path":"/flash_card_decks/27578","folder_id":26439,"public_author":{"id":16114,"profile":{"name":"uagorwat","about":null,"avatar_service":"facebook","locale":"en-US","google_author_link":null,"user_type_id":159,"escaped_name":"Andy Oung","full_name":"Andy Oung","badge_classes":""}}},"width":300,"height":250,"rtype":"FlashCardDeck","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Cyber Security"},{"key":"rlevel","value":"GRE"},{"key":"env","value":"production"},{"key":"rtype","value":"FlashCardDeck"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":27578,"author_id":16114,"title":"CSS exam","created_at":"2013-03-17T01:58:45Z","updated_at":"2017-01-12T00:31:16Z","sample":false,"description":null,"alerts_enabled":true,"cached_tag_list":"cyber security","deleted_at":null,"hidden":false,"average_rating":"4.0","demote":false,"private":false,"copyable":true,"score":122,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["cyber security"],"admin_tag_list":[],"study_aid_type":"FlashCardDeck","show_path":"/flash_card_decks/27578","folder_id":26439,"public_author":{"id":16114,"profile":{"name":"uagorwat","about":null,"avatar_service":"facebook","locale":"en-US","google_author_link":null,"user_type_id":159,"escaped_name":"Andy Oung","full_name":"Andy Oung","badge_classes":""}}},"width":300,"height":250,"rtype":"FlashCardDeck","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Cyber Security"},{"key":"rlevel","value":"GRE"},{"key":"env","value":"production"},{"key":"rtype","value":"FlashCardDeck"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en"},{"key":"ucurrency","value":"usd"}]}
An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. There are several different types of active attacks. However, in all cases, the threat actor takes some sort of action on the data in the system or the devices the data resides on. Attackers may attempt to insert data into the system or change or control data that is already in the system. Types of active attacksWhat follows are some of the most common types of active attacks. Masquerade attackIn a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. Masquerade attacks are conducted in several different ways, including the following:
An attempt may come from an employee inside an organization or from an outside threat actor using a connection to the public network. Weak authentication can provide a point of entry for a masquerade attack and make it easy for an attacker to gain entry. If attackers successfully receive authorization and enter the network, depending on their privilege level, they may be able to modify or delete the organization's data. Or they may make changes to network configuration and routing information. For example, an outside attacker can use spoofed Internet Protocol (IP) addresses to bypass the victim's firewall and gain access from an unauthorized source. To do this, the attacker may use a network sniffer to capture IP packets from the target machine. Another device is used to send a message to the firewall with the forged IP address. The firewall then permits access to the victim's machine. In a masquerade attack, the threat actor sends a message that appears to come from a legitimate source.Session hijacking attackA session hijacking attack is also called a session replay attack. In it, the attacker takes advantage of a vulnerability in a network or computer system and replays the session information of a previously authorized system or user. The attacker steals an authorized user's session ID to get that user's login information. The attacker can then use that information to impersonate the authorized user. A session hijacking attack commonly occurs over web applications and software that use cookies for authentication. With the use of the session ID, the attacker can access any site and any data that is available to the system or the user being impersonated. In a hijacking attack, the threat actor gets a copy of a message and resends it to the recipient who is fooled into thinking it's coming from the original sender.Message modification attackIn a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or to modify the data on a target machine. Message modification attacks are commonly email-based attacks. The attacker takes advantage of security weaknesses in email protocols to inject malicious content into the email message. The attacker may insert malicious content into the message body or header fields. With a message modification attack, the threat actor intercepts a message, changes it and then sends it on to the intended recipient.DoS attackIn a denial-of-service (DoS) attack, the attackers overwhelm the victim's system, network or website with network traffic, making it difficult for legitimate users to access those resources. Two ways a DoS attack can occur include:
In a distributed DoS (DDoS) exploit, large numbers of compromised systems -- also referred to as a botnet or zombie army -- attack a single target with a DoS attack. A DDoS uses multiple devices and locations to launch requests and overwhelm a victim's system in the same way a DoS attack does. What are passive attacks?Active attacks contrast with passive attacks, in which an unauthorized party monitors networks and sometimes scans for open ports and vulnerabilities. Passive attackers aim to collect information about the target; they don't steal or change data. However, passive attacks are often part of the steps an attacker takes in preparation for an active attack. Examples of passive attacks include:
How to prevent an active attackThere are several ways to counter an active attack, including the following techniques:
Learn how to create a cybersecurity strategy to prevent active and other types of attacks in this cybersecurity planning guide. |