Access control attacks by nor liyana binti azman

60 %
40 %
Information about Access control attacks by nor liyana binti azman

Published on March 16, 2014

Author: hafizaabas



Access control attacks

Nor Liyana Binti Azman 14th Mac 2014

Access Control Attacks Example  Backdoor  method of bypassing normal authentication, securing illegal remote access to computer, while attempting to remain undetected. sometimes programmer install a back door so that the program can be accessed for troubleshooting or other purposes Backdoor is security risk, because there is another cracker try to find any vulnerability to exploit. Example: Nimda gains through backdoor left by Code Red. 

 Spoofing Attacks attacker pretends to be someone else in order gain access to restricted resources or steal information. type of attack can take a variety of different forms; for instance, an attacker can impersonate the Internet Protocol (IP) address of a legitimate user in order to get into their accounts.  Access Control Attacks Example

Spoofing Attacks

 Man-In-The-Middle the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection. It is an attack on mutual authentication  Access Control Attacks Example


 Replay A form of network attack which a valid data transmission is maliciously repeated or delayed Example: messages from an authorized user who is logging into a network may be captured by an attacker and resent (replayed) the next day  Video: Access Control Attacks Example

 TCP hijacking  a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Session hijacking takes advantage of that practice by intruding in real time, during a session. Video: Access Control Attacks Example


Add a comment

Related presentations

Related pages

Azman | LinkedIn

View 6710 Azman posts, presentations, experts, and more. Get the professional knowledge you need on LinkedIn. LinkedIn Home What is LinkedIn? Join Today
Read more

Full Report Case 4 - Scribd

Hand-picked favorites from our editors. Editors' Picks Audiobooks. Hand-picked favorites from our editors
Read more


Students also learn about the routing tables and Access Control Lists ... NUR DALILA BINTI ABDULLAH. MAISATUL AKMAL BINTI MAT TAHIR. AZRA BT MOHAMMAD ...
Read more

Organizational Structures That Support Strategic ...

Organizational Structures That Support Strategic Initiatives ... have control over your own personal possessions. ... Nur Liyana Binti Abd Rahman 2011925529.
Read more

Kedah - Customs

Currency Control. Currency Exchange Control; ... NOR KAMARIAH BINTI HARON. ... FATIN LIYANA BINTI ALIAS.
Read more

Undergraduate Supervision by Salman Yussof

By Salman Yussof. Student Name. Project Title. Year. Aileen Lee Sue Ping. Image Compression: Basic JPEG Encoder and Decoder. 2000. Lee Son Han. Image ...
Read more

RK93 GROUP 1 (30th May 2016 Monday)

Supervisor; Examiner 1 (Leader) Examiner 2; Project Title. TIME; Venue. 1; MOHD ALIFF BIN BAHARUM. Dr. Amiza binti Amir; Dr. Naimah binti Yaakob. Dr ...
Read more