- Identity spoofing is the assumption of ip addresses that deceives networks and operating systems in identification. It is normally used on IP packs. One such program in use for IP spoofing would be the NetShade(on MAC). You may find more information on the video below.
(2)Denial-of-Service Attack(DDoS)
- A Denial-of-Service attack usually prevents normal use of a computer or network by users, which includes loss of access to network resources and a temporary shutdown due to overloading of IP packets. ______________________________________________________________________
Threats:
Phishing - Phishing is the acquire of any information using a bogus email message or a bogus message in instant messaging via social engineering. A link will be included in those messages, which is the link which the hacker takes advantage of the information entered in the link by unsuspecting victims.
Penetration testing - It is a method of evaluating security on a network or a computer by staging an attack on the systems in order to find out the weaknesses in them. Some common programs used for penetration testing is backtrack. The video below is a simulation of a penetration testing on passwords.
This comment has been removed by the author.
ReplyDeleteHi, your videos are very informative which gives people a good understanding of what you are trying to explain.
ReplyDelete