0% found this document useful (0 votes)
46 views2 pages

Lab

Uploaded by

Avelino Salgatar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views2 pages

Lab

Uploaded by

Avelino Salgatar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

a.

Summary of the Article

The article “Active Attack Vs Passive Attack” by Hassan, N. discusses the various risks associated with
online activities and the two main classifications of cybersecurity threats: active and passive attacks. It
emphasizes that as technology advances, cybercriminals have become more sophisticated, using modern
malware to infiltrate systems without detection. Passive attacks involve intruders who monitor network
communications to collect sensitive information without altering any data, making detection difficult.
Examples include exploiting unpatched systems or expired security certificates. In contrast, active attacks
occur when hackers modify or disrupt information gathered during passive attacks to compromise
systems and gain unauthorized access. The article warns that individuals and organizations must
recognize that they are all potential targets for cyberattacks and emphasizes the importance of vigilance
and proactive measures to prevent such threats. Overall, understanding these attack types is crucial for
enhancing cybersecurity awareness and implementing effective defenses.

b. Comparison of Active and Passive Attacks

Passive Attacks:

 Nature: Involve monitoring and collecting data without making any alterations to the
information.

 Detection: Difficult to detect as they do not alter data.

 Purpose: Primarily for gathering intelligence to plan future attacks.

 Examples: Eavesdropping on network traffic, exploiting unpatched vulnerabilities.

Active Attacks:

 Nature: Involve direct interaction with a system to modify or disrupt data.

 Detection: More likely to be noticed by users due to the visible impact on systems.

 Purpose: Aimed at compromising system integrity and gaining unauthorized access or privileges.

 Examples: Data manipulation, denial-of-service (DoS) attacks, or injecting malware.

c. Recommendations to Prevent These Attacks

1. Use Strong Encryption: Implement encryption techniques to protect sensitive data during
transmission, making it unreadable to unauthorized users.

2. Regular Software Updates: Keep all systems and software up to date to mitigate vulnerabilities
that could be exploited by attackers.

3. Monitor Network Activity: Employ network monitoring tools to detect unusual activities that
may indicate passive or active attacks.

4. Educate Users: Train employees and users on cybersecurity best practices, emphasizing the
importance of recognizing phishing attempts and securing personal information.
5. Implement Access Controls: Limit user access to sensitive information and systems based on
roles to reduce potential exposure.

6. Use Firewalls and Antivirus Software: Deploy firewalls and reliable antivirus solutions to detect
and block malicious activities.

7. Backup Data Regularly: Regularly back up important data to ensure recovery in case of a
successful attack.

You might also like