SlideShare a Scribd company logo
Describe three of the following attack types in the Operation Security domain: man-in-the-
middle, mail bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming
Solution
The description of the attack types in the operation security domain is given below:
1) man-in-the-middle: In this type of attack, the intruder insert himself or insert any malicious
code between the secure communication of two parties. This malicious code act as an third party,
and its get the secure information that is being transfer between the two parties. Its third person
or the intruder having access to the information send by both the parties involve in the
communication.
2) mail bombing : Its refer to attack in which intruder try to send bulk of mails to the person's
system, which may cause to disk full on persons system or even can crash the server, which is
handling the mails. In this type of attack, the main aim is to crash the user's machine by fulling
the disk space or can crash or stop the mail server.
3) War dialing: In this type of attack, hacker's uses the modem's to dial the range of numbers,
for finding the computer machiner, servers and other devices. and after dialing they also get
access to these type of devices.
4) Ping to death : Its a type of attack, in which the hacker send the incorrect ping packet to the
user. There are various computer system which are designed not to handle the incorrect ping
packets. Which results into system crash or system going into the abnormal state.
5) teardrop: Its a type of attack, in which the hacker sends the packets in incorrect way or in the
fragmented way, that the end user is not able to reassemble these packets at their end, and results
into the system crash and denial of service at user's end.
6)slamming-and-cramming: slamming refers to the activity in which hacker, switches the long
distance calll carrier at user's phone, without its permission, its results into heavy bill at
customer end. Cramming refers to the attack in which some extra bill is added into user's actual
phone bill, and its keep on happening again and again
Describe three of the following attack types in the Operation Security.docx

More Related Content

PDF
Aw36294299
PPTX
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
PPTX
Ehical Hacking: Unit no. 1 Information and Network Security
PPTX
System Security
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
PPTX
Security and ethics
PPTX
why security is needed
PDF
What are the biggest threats to a network in terms of security and w.pdf
Aw36294299
NIS1ppt (1).pptxhgfchgfhgfhgfgjdgfdhgdhgfehft
Ehical Hacking: Unit no. 1 Information and Network Security
System Security
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security and ethics
why security is needed
What are the biggest threats to a network in terms of security and w.pdf

Similar to Describe three of the following attack types in the Operation Security.docx (20)

PDF
Protecting Global Records Sharing with Identity Based Access Control List
PDF
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
PPT
Ethical Hacking
PDF
Efficient Coercion Resistant Public Key Encryption
PDF
Introduction of hacking and cracking
PDF
E Commerce security
PPTX
Types of attacks in cyber security
DOCX
E commerce security 4
PPT
Computer crime (1)
PPTX
Ransomware- A reality check (Part 1).pptx
PPTX
ch 3 Tools and methods used in Cybercrime.pptx
PPTX
Ids 009 network attacks
PDF
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
PDF
IRJET- Security from Man-In-The-Middle-Attack
PPTX
Ethical hacking
PDF
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
PDF
A Literature Review On Sniffing Attacks In Computer Network
PDF
Attackers May Depend On Social Engineering To Gain...
PPT
basic knowhow hacking
PDF
Everything You Should Know About 2FA Bypass Attacks.pdf
Protecting Global Records Sharing with Identity Based Access Control List
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Ethical Hacking
Efficient Coercion Resistant Public Key Encryption
Introduction of hacking and cracking
E Commerce security
Types of attacks in cyber security
E commerce security 4
Computer crime (1)
Ransomware- A reality check (Part 1).pptx
ch 3 Tools and methods used in Cybercrime.pptx
Ids 009 network attacks
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
IRJET- Security from Man-In-The-Middle-Attack
Ethical hacking
PROTOCOL ANALYSIS TO PREVENT STORM ATTACKS IN 3G MOBILE NETWORKS
A Literature Review On Sniffing Attacks In Computer Network
Attackers May Depend On Social Engineering To Gain...
basic knowhow hacking
Everything You Should Know About 2FA Bypass Attacks.pdf

More from earleanp (20)

DOCX
Create your own variant of both a hiring and a termination policy rela.docx
DOCX
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
DOCX
Describes the concept of ADTS and illustrates the concept with three o.docx
DOCX
Describe- manage- and install Active Directory replication- federation.docx
DOCX
Describe the process to start and restart apache on CENTOS command lin.docx
DOCX
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
DOCX
Describe the process of creating and exporting a schedule report for t.docx
DOCX
Describe the principal technologies that have shaped contemporary tele.docx
DOCX
Describe the typical duties of a security manager that are strictly ma.docx
DOCX
Describe the four categories of international airports in the federal.docx
DOCX
Describe the major types of VPNs and technologies- protocols- and serv.docx
DOCX
Describe the different metrics that BGP can use in building a routing.docx
DOCX
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
DOCX
Describe the different types of qualitative analysis and indicate whic.docx
DOCX
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
DOCX
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
DOCX
Describe core competencies and their relationship to operations manage.docx
DOCX
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
DOCX
Describe events that led to the signing of the Homeland Security Act 2.docx
DOCX
Describe an experiment that disproved the theory of classical mechanic.docx
Create your own variant of both a hiring and a termination policy rela.docx
Determine the valuation of long-term liabilities- Donald Lennon is the.docx
Describes the concept of ADTS and illustrates the concept with three o.docx
Describe- manage- and install Active Directory replication- federation.docx
Describe the process to start and restart apache on CENTOS command lin.docx
Describe- in your own words- the mechanism for establishing a HTTPS co.docx
Describe the process of creating and exporting a schedule report for t.docx
Describe the principal technologies that have shaped contemporary tele.docx
Describe the typical duties of a security manager that are strictly ma.docx
Describe the four categories of international airports in the federal.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the different metrics that BGP can use in building a routing.docx
Describe the ethnic city and the benefit of ethnic communiti- (-I need.docx
Describe the different types of qualitative analysis and indicate whic.docx
Describe neo-evolution- What is it and what are its primary tenets- Pr.docx
Describe ip protocol security pros and cons-SolutionIP Protocol Securi.docx
Describe core competencies and their relationship to operations manage.docx
Describe in detail a man-in-the-middle attack on the Diffie-Hellman ke.docx
Describe events that led to the signing of the Homeland Security Act 2.docx
Describe an experiment that disproved the theory of classical mechanic.docx

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Computing-Curriculum for Schools in Ghana
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Final Presentation General Medicine 03-08-2024.pptx
GDM (1) (1).pptx small presentation for students
Microbial diseases, their pathogenesis and prophylaxis
VCE English Exam - Section C Student Revision Booklet
Computing-Curriculum for Schools in Ghana
Anesthesia in Laparoscopic Surgery in India
Pharmacology of Heart Failure /Pharmacotherapy of CHF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Structure & Organelles in detailed.
PPH.pptx obstetrics and gynecology in nursing
Sports Quiz easy sports quiz sports quiz
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Module 4: Burden of Disease Tutorial Slides S2 2025
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf

Describe three of the following attack types in the Operation Security.docx

  • 1. Describe three of the following attack types in the Operation Security domain: man-in-the- middle, mail bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming Solution The description of the attack types in the operation security domain is given below: 1) man-in-the-middle: In this type of attack, the intruder insert himself or insert any malicious code between the secure communication of two parties. This malicious code act as an third party, and its get the secure information that is being transfer between the two parties. Its third person or the intruder having access to the information send by both the parties involve in the communication. 2) mail bombing : Its refer to attack in which intruder try to send bulk of mails to the person's system, which may cause to disk full on persons system or even can crash the server, which is handling the mails. In this type of attack, the main aim is to crash the user's machine by fulling the disk space or can crash or stop the mail server. 3) War dialing: In this type of attack, hacker's uses the modem's to dial the range of numbers, for finding the computer machiner, servers and other devices. and after dialing they also get access to these type of devices. 4) Ping to death : Its a type of attack, in which the hacker send the incorrect ping packet to the user. There are various computer system which are designed not to handle the incorrect ping packets. Which results into system crash or system going into the abnormal state. 5) teardrop: Its a type of attack, in which the hacker sends the packets in incorrect way or in the fragmented way, that the end user is not able to reassemble these packets at their end, and results into the system crash and denial of service at user's end. 6)slamming-and-cramming: slamming refers to the activity in which hacker, switches the long distance calll carrier at user's phone, without its permission, its results into heavy bill at customer end. Cramming refers to the attack in which some extra bill is added into user's actual phone bill, and its keep on happening again and again