SlideShare a Scribd company logo
Active and Passive Network Attacks
Presented By: Pradipta Poudel
BIM V Semester
115/20
Introduction to Security Attack
 Refers to an attempt to exploit vulnerabilities or weaknesses in a system or network in order to
compromise its confidentiality, integrity, or availability.
 Major goals: stealing information, damage or disrupt services, or gain unauthorized access to a system.
 Types of network security attacks
I. Active Attack
II. Passive Attack
2
Active Attack
 An active attack is a type of security attack in which the attacker intercepts the network connection and
tries to alter the content of the message.
 The system resources can be changed due to active attacks.
 Victim gets informed about the attack.
 Common type of active attack:
• Man-in-the-Middle (MitM) attack
3
Passive Attack
 In passive attacks, the attacker observes the messages, then copy and save them and can use it for
malicious purposes.
 The attacker does not try to change the gathered or collected information.
 Victim does not get informed about the attack.
 Common type of passive attack:
• Packet sniffing attack.
4
Preventing Security Attacks
 Keep Your Software Up to Date,
 Firewall,
 Complex passwords,
 Two-factor authentication,
 Regular security audits etc.
5
Active Attacks vs Passive Attacks
6
Summary
Ø Refers to an attempt to exploit vulnerabilities or weaknesses in a system or network in order
to compromise its confidentiality, integrity, or availability.
Ø An active attack is a type of security attack in which the attacker intercepts the network connection
and tries to alter the content of the message.
Ø A passive attack is a type of security attack in which the attacker observes the messages, then copy and
save them so that the messages can be used it for malicious purposes.
7
References
 https://byjus.com/gate/security-attacks-notes/
 https://www.javatpoint.com/active-attack-vs-passive-attack
 https://www.tutorialspoint.com/difference-between-active-attack-and-passive-attack
 https://www.geeksforgeeks.org/difference-between-active-attack-and-passive-attack/
 https://www.codingninjas.com/codestudio/library/difference-between-active-and-passive-
attacks
8
THANK YOU
9

More Related Content

Active and Passive Network Attacks

  • 1. Active and Passive Network Attacks Presented By: Pradipta Poudel BIM V Semester 115/20
  • 2. Introduction to Security Attack  Refers to an attempt to exploit vulnerabilities or weaknesses in a system or network in order to compromise its confidentiality, integrity, or availability.  Major goals: stealing information, damage or disrupt services, or gain unauthorized access to a system.  Types of network security attacks I. Active Attack II. Passive Attack 2
  • 3. Active Attack  An active attack is a type of security attack in which the attacker intercepts the network connection and tries to alter the content of the message.  The system resources can be changed due to active attacks.  Victim gets informed about the attack.  Common type of active attack: • Man-in-the-Middle (MitM) attack 3
  • 4. Passive Attack  In passive attacks, the attacker observes the messages, then copy and save them and can use it for malicious purposes.  The attacker does not try to change the gathered or collected information.  Victim does not get informed about the attack.  Common type of passive attack: • Packet sniffing attack. 4
  • 5. Preventing Security Attacks  Keep Your Software Up to Date,  Firewall,  Complex passwords,  Two-factor authentication,  Regular security audits etc. 5
  • 6. Active Attacks vs Passive Attacks 6
  • 7. Summary Ø Refers to an attempt to exploit vulnerabilities or weaknesses in a system or network in order to compromise its confidentiality, integrity, or availability. Ø An active attack is a type of security attack in which the attacker intercepts the network connection and tries to alter the content of the message. Ø A passive attack is a type of security attack in which the attacker observes the messages, then copy and save them so that the messages can be used it for malicious purposes. 7
  • 8. References  https://byjus.com/gate/security-attacks-notes/  https://www.javatpoint.com/active-attack-vs-passive-attack  https://www.tutorialspoint.com/difference-between-active-attack-and-passive-attack  https://www.geeksforgeeks.org/difference-between-active-attack-and-passive-attack/  https://www.codingninjas.com/codestudio/library/difference-between-active-and-passive- attacks 8

Editor's Notes

  1. Man-in-the-Middle (MitM) attack: In this type of attack, the attacker intercepts the communication between two parties and can read, modify or even inject new messages into the communication stream. This type of attack can be used to steal sensitive information such as login credentials or credit card numbers.
  2. packet sniffing attack: In this type of attack, an attacker intercepts and analyzes data packets as they travel across a network, in order to extract sensitive information such as passwords or credit card numbers.