Зміст курсу
Cyber Security Fundamentals
1. Introduction to Cyber Security
Cyber Security Fundamentals
Examples of Cyber Attacks
Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.
Layer 1 (Physical Layer)
Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.
Layer 2 (Data Link Layer):
ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.
An IP address (Internet Protocol address) is a numerical label assigned to each device in a computer network, serving as a unique identifier for communication. The key difference between an IP address and a MAC is that an IP address is assigned by the network, allowing devices to communicate across different networks, while a MAC address is a hardware identifier assigned by the device manufacturer.
Layer 3 (Network Layer):
IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.
Layer 4 (Transport Layer):
- Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
- Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.
Layer 7 (Application Layer):
- SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
- Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
- Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.
Все було зрозуміло?
Зміст курсу
Cyber Security Fundamentals
1. Introduction to Cyber Security
Cyber Security Fundamentals
Examples of Cyber Attacks
Now we will consider some examples of cyber attacks that can be performed on different OSI model layers.
Layer 1 (Physical Layer)
Evil Twin Attacks: Attackers set up a rogue Wi-Fi hotspot with a similar name to a legitimate network to trick users into connecting.
Layer 2 (Data Link Layer):
ARP Spoofing/Poisoning: Attackers send false Address Resolution Protocol (ARP) messages to associate their MAC address with the IP address of a legitimate device.
An IP address (Internet Protocol address) is a numerical label assigned to each device in a computer network, serving as a unique identifier for communication. The key difference between an IP address and a MAC is that an IP address is assigned by the network, allowing devices to communicate across different networks, while a MAC address is a hardware identifier assigned by the device manufacturer.
Layer 3 (Network Layer):
IP Spoofing: Attackers send IP packets from a false (or "spoofed") source address to deceive the recipient about the origin of the message.
Layer 4 (Transport Layer):
- Man-in-the-Middle (MitM) Attacks: Attackers intercept and manipulate communication between two parties, often by eavesdropping or altering data in transit;
- Session Hijacking: Attackers steal session cookies or tokens to impersonate a user.
Layer 7 (Application Layer):
- SQL Injection: Attackers inject malicious SQL code into input fields, exploiting vulnerabilities in the application's database layer;
- Cross-Site Scripting (XSS): Malicious scripts are injected into web pages viewed by other users, typically through user inputs or unvalidated data;
- Cross-Site Request Forgery (CSRF): Unauthorized commands are transmitted from a user the web application trusts.
Все було зрозуміло?