SlideShare a Scribd company logo
Attacks

Nitin Birari
Type of Attacks


             Attacks

Active Attacks         Passive Attacks
Passive Attacks


         Passive Attacks


Release of
Message Content     Traffic Analysis
Active Attacks

              • Active Attacks

                                          Denial of
             Reply Attack   Alterations    Service
Masquerade
                                            (DOS)
Conventional Encryption Model
Steganography

•   Art of hiding the message.
•   Character marking:
•   Invisible ink:
•   Pin punctures:
•   With help of image.

More Related Content

PPTX
Cybersecurity cyberlab2
rayborg
 
PDF
Module 1 introduction to Linux
Tushar B Kute
 
PPT
Presentation1
ichasalwaa
 
PPT
Hash crypto
Harry Potter
 
PPT
Hacking Cisco Networks and Countermeasures
dkaya
 
PPT
Linux Vs Unix
Mintoo Jakhmola
 
PPT
Osi model in networking
Future Programming
 
PPTX
Hash Techniques in Cryptography
Basudev Saha
 
Cybersecurity cyberlab2
rayborg
 
Module 1 introduction to Linux
Tushar B Kute
 
Presentation1
ichasalwaa
 
Hash crypto
Harry Potter
 
Hacking Cisco Networks and Countermeasures
dkaya
 
Linux Vs Unix
Mintoo Jakhmola
 
Osi model in networking
Future Programming
 
Hash Techniques in Cryptography
Basudev Saha
 
Ad

Attacks