Published on March 16, 2014
Nor Liyana Binti Azman 14th Mac 2014
Access Control Attacks Example Backdoor method of bypassing normal authentication, securing illegal remote access to computer, while attempting to remain undetected. sometimes programmer install a back door so that the program can be accessed for troubleshooting or other purposes Backdoor is security risk, because there is another cracker try to find any vulnerability to exploit. Example: Nimda gains through backdoor left by Code Red. http://www.youtube.com/watch?v=7ZwGvFu9WhY
Spoofing Attacks attacker pretends to be someone else in order gain access to restricted resources or steal information. type of attack can take a variety of different forms; for instance, an attacker can impersonate the Internet Protocol (IP) address of a legitimate user in order to get into their accounts. http://www.youtube.com/watch?v=z8ySsaRMcI8 Access Control Attacks Example
Man-In-The-Middle the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection. It is an attack on mutual authentication http://www.youtube.com/watch?v=N86xJpna9Js Access Control Attacks Example
Replay A form of network attack which a valid data transmission is maliciously repeated or delayed Example: messages from an authorized user who is logging into a network may be captured by an attacker and resent (replayed) the next day Video: http://www.youtube.com/watch?v=kBCr-vYdgNo Access Control Attacks Example
TCP hijacking a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Session hijacking takes advantage of that practice by intruding in real time, during a session. Video: http://www.youtube.com/watch?v=s_XD8heYNrc Access Control Attacks Example
THANKS A LOT
View 6710 Azman posts, presentations, experts, and more. Get the professional knowledge you need on LinkedIn. LinkedIn Home What is LinkedIn? Join Today
Hand-picked favorites from our editors. Editors' Picks Audiobooks. Hand-picked favorites from our editors
Students also learn about the routing tables and Access Control Lists ... NUR DALILA BINTI ABDULLAH. MAISATUL AKMAL BINTI MAT TAHIR. AZRA BT MOHAMMAD ...
Organizational Structures That Support Strategic Initiatives ... have control over your own personal possessions. ... Nur Liyana Binti Abd Rahman 2011925529.
Currency Control. Currency Exchange Control; ... NOR KAMARIAH BINTI HARON. ... FATIN LIYANA BINTI ALIAS.
By Salman Yussof. Student Name. Project Title. Year. Aileen Lee Sue Ping. Image Compression: Basic JPEG Encoder and Decoder. 2000. Lee Son Han. Image ...
Supervisor; Examiner 1 (Leader) Examiner 2; Project Title. TIME; Venue. 1; MOHD ALIFF BIN BAHARUM. Dr. Amiza binti Amir; Dr. Naimah binti Yaakob. Dr ...