TCP/IP – Attacks Involving the Internet Architecture

Spoofing – malicious users attacks the system by altering the source IP address.

Denial of Service (DoS) – involve using so much important resources that legitimate users are denied service.

Distributed Denial of Service (DDoS) – uses many sending computers in clogging the network with so much traffic.

Unauthorized access – accessing information or resources in an unauthorized fashion. Examples are exploiting protocol implementations bugs, malware, botnets.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s