1 00:00:02,710 --> 00:00:09,370 Let us explore the main part of the fundamentals of cybersecurity, that is the types of attacks, there 2 00:00:09,370 --> 00:00:12,760 are two types of attacks that attack and pursue attack. 3 00:00:13,210 --> 00:00:16,450 In this lecture, we are going to learn passive attacks. 4 00:00:18,560 --> 00:00:25,740 The Internet is full of risks whenever you go online, there is a possibility that you will encounter 5 00:00:25,760 --> 00:00:28,470 a risk within that range of risks. 6 00:00:28,880 --> 00:00:33,690 There are different types of computer threats with varying associations of damaging effects. 7 00:00:34,160 --> 00:00:40,880 For example, some threats may damage or corrupt your installed operating system and force you to reinstall 8 00:00:40,880 --> 00:00:41,040 it. 9 00:00:41,900 --> 00:00:45,690 Another type may steal your credentials and save passwords. 10 00:00:46,280 --> 00:00:48,920 Still, other threats may not be harming your PC. 11 00:00:49,250 --> 00:00:54,010 Instead, they will track your online activities and invade your privacy. 12 00:00:54,920 --> 00:01:00,890 Today, criminals are smarter than even before and malicious programs are more sophisticated. 13 00:01:01,940 --> 00:01:06,780 Model malware can infect Target PC and remain undetected for a long time. 14 00:01:07,850 --> 00:01:13,720 The advent of computing power makes it possible to crack difficult passwords in a fraction of seconds. 15 00:01:14,840 --> 00:01:21,680 The motive behind the majority of cyberattacks nowadays is to damage your machine, but instead to steal 16 00:01:21,680 --> 00:01:26,990 your money, to access your private information or acquire your login credentials. 17 00:01:28,130 --> 00:01:35,990 Conceptually, cybersecurity risks can be divided into two categories that is facile and active in this 18 00:01:35,990 --> 00:01:42,770 lecture will talk or passive attacks in passive attack and into the mind, a system and a network, 19 00:01:42,770 --> 00:01:46,950 communications and scans for open borders and other vulnerabilities. 20 00:01:47,360 --> 00:01:54,110 For example, they might explode an unpaid system or take advantage of an expired cert on a security 21 00:01:54,110 --> 00:01:54,680 device. 22 00:01:55,670 --> 00:02:02,510 Once the intruder has infiltrated the network, they can collect information in a couple of ways in 23 00:02:02,510 --> 00:02:08,510 a footprinting password that the intruder will try to collect as much intelligence as they can to use 24 00:02:08,510 --> 00:02:10,610 it later to target any attack. 25 00:02:11,210 --> 00:02:16,790 An example is when an intruder records network traffic using a packet, and that is a tool such as Wireshark 26 00:02:17,030 --> 00:02:18,200 for later analysis. 27 00:02:18,890 --> 00:02:23,450 The two most common use cases of passu attacks are information discloser. 28 00:02:24,400 --> 00:02:30,430 In this tape, an attacker will monitor an unpredictable communication medium like an encrypted mail 29 00:02:30,580 --> 00:02:38,110 or telephone call, an intercepted for sensitive information traffic analysis in this day, and attack 30 00:02:38,110 --> 00:02:43,990 commander's communication channels to collect a range of information, including human and machine identities, 31 00:02:44,380 --> 00:02:51,100 locations of designing these types of encryption used if applicable, like even installing a key logger 32 00:02:51,100 --> 00:02:56,890 is another sort of password that an intruder waits for the user to enter the credentials and records 33 00:02:56,890 --> 00:02:57,890 them for later use. 34 00:02:58,540 --> 00:03:01,120 Let us demonstrate traffic analysis. 35 00:03:01,130 --> 00:03:04,470 Pasquotank, consider the scene here. 36 00:03:04,750 --> 00:03:09,700 Bob and Alice are two best friends and Trudy is the interceptor. 37 00:03:10,680 --> 00:03:15,570 Bob sends the message to Alice like Alice, it's me, Bob, how are you? 38 00:03:15,600 --> 00:03:16,260 How are you? 39 00:03:16,770 --> 00:03:22,800 But Trudy is reading all the messages to any kid and rising to like Wireshark. 40 00:03:23,310 --> 00:03:29,670 Therefore, the privacy between Bob and Alice is hard to resist. 41 00:03:29,820 --> 00:03:32,190 Well, now I know you are, Bob. 42 00:03:33,030 --> 00:03:39,400 Even Alice is not aware of all the messages sent from Bob to her is read by Trudy. 43 00:03:39,660 --> 00:03:44,770 Therefore, this is very dangerous for privacy to avoid these types of attacks. 44 00:03:45,060 --> 00:03:48,880 It is important to use a secure channel between two recipients. 45 00:03:50,070 --> 00:03:56,630 Now, let's consider the scenario of information disclosure here the same. 46 00:03:57,360 --> 00:04:02,070 Bob is sending some information to Alice and Trudy is intercepting this Mrs.. 47 00:04:02,960 --> 00:04:07,400 In this case, the jury is selling this information to any other third party. 48 00:04:08,440 --> 00:04:14,830 Like what if this third party uses this information for malicious purposes, therefore what we should 49 00:04:14,830 --> 00:04:19,780 learn that we should not share any private information to communication channels. 50 00:04:21,030 --> 00:04:25,720 Therefore, that is this can lead to information, disclosure and can invade our privacy. 51 00:04:26,070 --> 00:04:29,610 So let us have a look at what we learned in this lecture. 52 00:04:30,420 --> 00:04:36,560 We learned about the definition of passive attacks and how these attacks can be dangerous to our livelihood 53 00:04:37,620 --> 00:04:38,530 in the next lecture. 54 00:04:38,910 --> 00:04:40,860 We will discuss our two attacks.