Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Attacks Dylan Small.

Similar presentations


Presentation on theme: "Network Attacks Dylan Small."— Presentation transcript:

1 Network Attacks Dylan Small

2 Roadmap History of Network Attacks Current Network Attacks
Software Used Blocking Network Attacks Future of Network attacks

3 History of Network Attacks
Previously DDoS attacks were the only method of network attacking DDoS or Distributed Denial of Service attack is when the hacker floods a server with millions of packets and make the server unusable This is a brute force type attack

4 DDoS Attacks What DDoS attacks aim to do is overload the remote servers’ usage of computational resources, such as bandwidth, memory, disk space, or processor time What this does is make the website or whatever the server is hosting unusable and unable to be accessed by its users The ultimate goal of DDoS attacks is to crash the remote server

5

6 Software Used Low Orbit Ion Cannon (LOIC) - An easy to use GUI that makes DDoS attacking easy for anyone All you have to do is type in the target URL, add a message in there if you want and then click “IMMA CHARGIN MAH LAZER”

7 Protecting against DDoS Attacks

8 Protecting against DDoS Attacks
Properly configured internet routers and switches can greatly reduce the effectiveness of DDoS attacks Many internet routers have built in Automatic DDoS attack detection, so if DDoS packets are detected they will be discarded and not interfere with regular packets Having complex rules in place in routers and switches greatly decreases effectiveness of DDoS attacks but nothing is completely safe

9 Passive Attacks Passive Attacks monitor unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks This can include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords

10 Insider Attacks Just like the title says, an insider attack is when someone from the “inside” of the organization attacks the network With the information that is gathered the attacker can eavesdrop, steal, or damage information within the organization

11 Phishing Attacks Phishing is when attackers create a website that looks like a real website but login information is sent to attackers instead of the real organization

12 Phishing Attacks How to prevent being “phished”
Check the URL in the address bar and make sure it is the real one ie Facebook.com instead of face-book.com Follow Amanda Marshalls s

13 Sources http://en.wikipedia.org/wiki/DDoS_mitigation


Download ppt "Network Attacks Dylan Small."

Similar presentations


Ads by Google