Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Examples of Cyber Attacks | Web Cyber Security
Cyber Security Fundamentals

Examples of Cyber AttacksExamples of Cyber Attacks

Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.

Layer 1 (Physical Layer)

Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.

Layer 2 (Data Link Layer):

ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.

MAC (Media Access Control) is a physical address of a device used for communication within a network.
An IP address (Internet Protocol address) is a numerical label assigned to each device in a computer network, serving as a unique identifier for communication. The key difference between an IP address and a MAC is that an IP address is assigned by the network, allowing devices to communicate across different networks, while a MAC address is a hardware identifier assigned by the device manufacturer.

Layer 3 (Network Layer):

IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.

Layer 4 (Transport Layer):

  • Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
  • Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.

Layer 7 (Application Layer):

  • SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
  • Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
  • Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.

What is the primary focus of ARP Spoofing/Poisoning attacks, and at which OSI layer do they occur?

Selecciona la respuesta correcta

¿Todo estuvo claro?

Sección 2. Capítulo 4
course content

Contenido del Curso

Cyber Security Fundamentals

Examples of Cyber AttacksExamples of Cyber Attacks

Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.

Layer 1 (Physical Layer)

Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.

Layer 2 (Data Link Layer):

ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.

MAC (Media Access Control) is a physical address of a device used for communication within a network.
An IP address (Internet Protocol address) is a numerical label assigned to each device in a computer network, serving as a unique identifier for communication. The key difference between an IP address and a MAC is that an IP address is assigned by the network, allowing devices to communicate across different networks, while a MAC address is a hardware identifier assigned by the device manufacturer.

Layer 3 (Network Layer):

IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.

Layer 4 (Transport Layer):

  • Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
  • Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.

Layer 7 (Application Layer):

  • SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
  • Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
  • Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.

What is the primary focus of ARP Spoofing/Poisoning attacks, and at which OSI layer do they occur?

Selecciona la respuesta correcta

¿Todo estuvo claro?

Sección 2. Capítulo 4
some-alt