Active and Passive Attacks

Since the advent of digitalization, cyberattacks have permeated every aspect of technology. No matter how technology advances, there will always be someone who can circumvent security systems with malice in their heart. You will discover the meanings of active attack and passive attack, their distinctions, as well as their many sorts and examples, in this blog. 
Learn more about everything by diving in! 

Let's get started, and this blog will teach you about the following subject:

  • An active attack is what?
  • An passive attack is what?
  • The following sections cover the many kinds of active and passive attacks as well as representative instances of each.
  • Conclusion

SECURITY ATTACKS

  • "In Computer and Computer Networks, an attack is any attempt to modify, disable, or destroy, or to gain unauthorised access to confidential information."
  • Security attacks can be of two types: 
  1. Active Attacks
  2. Passive Attacks

What is an Active attack ?

Active attacks involve modifying a data stream or generating a message stream.
Such an attack aims to corrupt or destroy the network's data as well. During transmission between the sender and the recipient, information is changed.

I'll provide an example to show you what I mean.
Let's say that Tom and Jerry are friends. Tom will write Jerry a letter. So, before the letter gets to Jerry, Rachel intercepts it and modifies the message. Jerry is no longer able to access the information Tom sent.

In this case, the data has been changed by a third party. This presents a risk because what happens if Tom sends sensitive and critical information? If Jerry isn't smart enough to notice the message change, he might use the altered information. This poses a significant risk to any organisation and has the potential to result in a host of problems.

Then, what precisely is an active attack?
The victims may occasionally be told about the attack. This is advantageous because it makes it possible to restore both the information and the system if an attack is identified. As a result, it is necessary to identify such efforts and encourage them rather than prevent them.


Active attacks are broken down into four groups.


Let's examine the many forms of active attacks.

1.Masquerade

  • Attacker gains access to a system by pretending to be a legitimate user and then steals crucial data from the system. Typically accomplished by obtaining the login name and password.

2.Replay

  • It is a network attack in which the source data is changed and fresh malicious code is inserted into legitimate data while being transmitted.
  • As a response attack, newly created malicious code is sent to the recipient repeatedly.
  • Retransmission of later information to have an unintended effect

3.Modification of message

  • The attacker modifies the original communication to remove any meaning for the recipient
  • Modified is another name for a response attack.
  • when information is altered after being sent but before it reaches the intended recipient.

4..Denial of Service(DOS)

  • Preventing the user from safely communicating over the network
  • In most cases, it is accomplished by stopping the users' network connections.
  • Making some services unavailable to users or causing network disruption by flooding it with inappropriate messages
  • The goal of a DoS attack is to stop computer and network services and prevent authorised users from using resources or services.
  • Such an attack is protected by various security measures like firewalls and intrusion detection systems.

    What is an Passive attack ?

    Passive attack is defined as "information that is only monitored during data transmission between two people and doesn't involve any modification to the contents of the original message." 

    These attacks are intended to gather private and sensitive information. Both the system and the data are unaffected by these attacks. 

    Allow me to simplify the process. Tom and Jerry's message was modified by Rachael in the preceding illustration. The message remains the same thanks to Rachel. By just observing the content of Tom and Jerry's message, Rachel is aware of the sensitive information they are sharing.  

    In other words, Rachel disturbed Tom and Jerry's personal space. Hopefully, this makes it clear what a passive attack is.

    One method to defend against passive attacks of this nature is to encrypt sensitive data in a way that makes it unreadable by outside parties.

    Additional classification of passive attacks into two types



    Let's examine the many categories of passive attacks.

    1.Release of Message Contents

    • Content of Messages Released It's quite easy to grasp.
    • When we send someone a sensitive email, we want to ensure that only the intended recipient has access to it.
    • If unauthorized persons view this mail, the message's contents are made public elsewhere. 

    2.Traffic Analysis

    • Let's say we use encryption in order to hide the message's content.
    • The adversary (third party) can collect the message's contents but cannot extract the information from it.
    • A pattern of messages could be observed by the adversary to determine where or how the message originated.
    • Due to the fact that they do not entail the change of the material, passive attacks are challenging to identify.
    • Both the message's transmission and reception are normal. 

      Various Active and Passive Attack Examples

      In this section, let's look at a few common cyber security attacks.


      1.The 2014 Cyberattack on Yahoo

      In 2014, one of the biggest cyberattacks of the year involved a theft of 500 million Yahoo accounts. Fortunately, only basic data and passwords were apparently obtained, not any bank information.

      2.LinkedIn Attack

      Data from 700 million LinkedIn members was posted to a dark web in the June 2021 attack, making 90% or more of the company's users vulnerable. A hacker named God User exploited the site's and other APIs using data scraping techniques before disclosing an initial data collection of almost five billion users.

      Although LinkedIn asserts that no private or sensitive information was disclosed, the act still broke the agreement.

      3.Nasa Cyber Attack

      A 15-year-old boy by the name of James Jonathan was successful in 1999 in taking down NASA's systems for 21 days. During the attack, some 1.7 million programmes and pieces of software were downloaded, costing the space giant about $41,000 in repairs.

      4.Channel Nine Attack

      The Channel Nine attack During a cyberattack on March 28, 2021, Channel Nine in Australia was disrupted. The incident prevented the broadcaster from airing a number of programmes, including its Sunday newscast.

      Conclusion

      Thus, a significant amount of material about active and passive attacks has been covered. From the examples, it is clear that such attacks pose major hazards to any organisation and have the ability to do great harm. 



      Comments

      Post a Comment

      Popular posts from this blog

      Threat, Vulnerability and Risk: How are They Different?

      How Does Multi-Factor Authentication (MFA) Work?

      Top 4 Software Testing Cybersecurity Mistakes to Avoid