Learn the two types of attacks on a computer system: passive, such as sniffing traffic, and active, such as releasing malware or creating a denial of service.
- [Instructor] The two types of attacks in a computer system…are passive such as sniffing traffic,…and active such as releasing malware…or creating a denial of service.…An attack can be against any of the security services,…confidentiality, integrity,…availability, or authentication.…Let's look at each of these.…Confidentiality is the protection of data…against unauthorized disclosure.…For example, if you're in a medical facility…you wouldn't wanna see unauthorized individuals…looking at patients information.…
Integrity is protection of data…from unauthorized modification.…For example, someone could change his or her salary…from $12 an hour to $20 an hour.…That would be a violation of integrity.…Availability is ensuring data and services…are available to authorized users.…A denial of service attack locks out legitimate users…and it's an attack against availability.…Authentication is assurance that the communicating entity…is who they say they are by verifying the identity…of a user or a device.…
For example, on a network,…
Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Sniffing network traffic
- Passive vs. active attacks
- Comparing IPv4 to IPv6
- MAC and macof attacks
- Investigating DHCP attacks
- Detecting ARP and DNS spoofing
- Sniffing tools and techniques
Skill Level Beginner
1. Sniffing Overview
2. MAC Attacks
6. Sniffing Tools and Techniques
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.