Part III: Threats, Attacks & Defense

DNS Protection

Cache Poisoning Attack

DNSSEC (Security Extension)

BGP

image23

How BGP Works

BGP Vulnerabilities

BGP Security

Web Based Attacks

HTTP Response Splitting Attacks

Cross-Site Request Forgery (CSRF or XSRF)

Cross-Site Scripting (XSS) Attacks

Document Object Model (DOM) XSS Attacks

Clickjacking

DataBase Attacks & Defenses

SQL injection Attacks

SELECT USERNAME,PASSWORD from USERS where USERNAME='<username>' AND PASSWORD='<password>';

Here the username & password is the input provided by the user. Suppose an attacker gives the input as " OR '1'='1'" in both fields. Therefore the SQL query will look like:

SELECT USERNAME,PASSWORD from USERS where USERNAME='' OR '1'='1' AND PASSOWRD='' OR '1'='1';

This query results in a true statement & user gets logged in. This example depicst the bost basic type of SQL injection

SQL Injection Attack Defenses

VPN

A virtual private network (VPN) is a service that offers a secure, reliable connection over a shared public infrastructure such as the Internet. Cisco defines a VPN as an encrypted connection between private networks over a public network. To date, there are three types of VPNs:

Security Breach

In spite of the most aggressive steps to protect computers from attacks, attackers sometimes get through. Any event that results in a violation of any of the confidentiality, integrity, or availability (CIA) security tenets is a security breach.

Denial of Service Attacks

Distributed Denial of Service Attacks

Wiretapping

Backdoors

Malicious Attacks

Birthday Attack

Brute-Force Password Attacks

Dictionary Password Attacks

Replay Attacks

Man-in-the-Middle Attacks

Masquerading

Eavesdropping

Social Engineering

Phreaking

Phishing

Pharming