1 00:00:00,630 --> 00:00:04,590 Welcome in Motorama, part of fundamentalist Mike Brooks security. 2 00:00:04,680 --> 00:00:10,490 Now he had to understand about the different type of attacks in network attacks will be Luby happen? 3 00:00:10,500 --> 00:00:13,810 You know what computer talking about the network security. 4 00:00:13,850 --> 00:00:16,020 They also look, I don't know, brucke attacks. 5 00:00:16,560 --> 00:00:19,220 There are many types of attacks on computer network. 6 00:00:19,290 --> 00:00:23,690 The following are some of the attacks more often used by the attackers. 7 00:00:24,010 --> 00:00:25,710 Plus, that is pooping. 8 00:00:26,160 --> 00:00:33,680 Is pooping is an attack dog meat that deach carried out by duct tape guards by furnishing DataStore 9 00:00:33,690 --> 00:00:36,480 that the attackers can look like it. 10 00:00:36,520 --> 00:00:44,490 The state of Borst IBS pooping and the IBS pooping in a particular may be used to live at man in the 11 00:00:44,490 --> 00:00:44,870 middle. 12 00:00:45,050 --> 00:00:50,130 Attacks against host on new computer networks means that Dagbladet will be swooping to it. 13 00:00:50,290 --> 00:00:57,090 Me happen in the network postings that a piece pooping and taking and is that the Arby's pooping is 14 00:00:57,090 --> 00:01:04,440 pooping attacks which take advantage of the TCAP suit protocols may be in there. 15 00:01:04,500 --> 00:01:05,670 Did we know you do? 16 00:01:05,800 --> 00:01:13,880 PIDE was capable of deep, big gate inspections or by taking major to edified to identify you, descender 17 00:01:14,130 --> 00:01:21,660 or deceive or promises mean that we give and are pooping in this parking meter, diggin the important 18 00:01:21,660 --> 00:01:28,080 missions by descender or deceiving message and the lead dog deep. 19 00:01:28,740 --> 00:01:38,310 Next is that DEEDI US distributed denial of service duty was a big dipo by day when a computer or disturber 20 00:01:38,460 --> 00:01:46,470 on the Internet network by consuming resource that are owned by the computer so the computer can not 21 00:01:46,740 --> 00:01:47,740 perform it. 22 00:01:47,740 --> 00:01:54,690 Function by actually being used to sue are images to gain access to a computer that are that are Teagues 23 00:01:55,260 --> 00:02:02,130 means that the computer is controlled by the other person on a different on a different places. 24 00:02:02,340 --> 00:02:08,610 So we cannot use the best utilization of additional computer narrative that Lupino deck is sniffing 25 00:02:08,610 --> 00:02:15,210 their data, their data teeb technique by monitoring and analyzing each Bekker for the data that is 26 00:02:15,210 --> 00:02:17,290 transmitted from that line to the. 27 00:02:18,260 --> 00:02:27,330 So in pipping matter d keep wdm right vended today transmitted from the sort of work too blind then 28 00:02:27,840 --> 00:02:30,360 in this type the tube, the data. 29 00:02:30,600 --> 00:02:38,490 So this is quintets nipping at Nathalie's the as fuel injections, axial injections, an attack technique 30 00:02:38,520 --> 00:02:45,650 that utilites groups are too guilty that allow you just to enter data without filtering out malicious 31 00:02:45,660 --> 00:02:54,570 character so that tinkers can get access to the application database input side, usually a dart into 32 00:02:54,570 --> 00:02:59,360 certain parts of the site that are alerted to that side do duprees. 33 00:02:59,760 --> 00:03:02,220 So this is the X fuel injections. 34 00:03:02,610 --> 00:03:07,080 And lastly, that Baudin course, this is a really Pyramus network. 35 00:03:07,080 --> 00:03:13,160 Security is a famous rightest in the Michael Jordan emoted and a computer security agent Dagg. 36 00:03:13,170 --> 00:03:19,240 That can be ameet or network or systems which means can it can be Misner system. 37 00:03:19,630 --> 00:03:27,630 We take Dogen Horse a date and I take us can gain access right through that target and used to find 38 00:03:27,630 --> 00:03:31,680 information from that target messed up by the Trojan horse. 39 00:03:32,070 --> 00:03:42,980 And the other person can also control on computers and can access all that information and access all 40 00:03:42,990 --> 00:03:45,800 the things on your computer to be done. 41 00:03:45,990 --> 00:03:53,490 Some network attacks with which will be happen in our computer site.