From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Comparing attack types and motives

Comparing attack types and motives

- [Instructor] Today we face a variety of passive and active attacks as we see in this Live Threat Map. In this segment, we'll compare the different types of attacks, along with outlining some of the motives and objectives of cyber crime. Being a victim of a cyber attack can have devastating results. An attack can result in loss of productivity, damage to the business's reputation, and possible legal implications. On any network, a malicious actor can launch either a passive or an active attack. Let's compare the two. Passive attacks include activities such as sniffing or eavesdropping, which is hard to detect. Many times a passive attack is done during reconnaissance because of a need to discover information about a network. Even though there is no visible damage to the network, a malicious actor could monitor transmissions and gather authentication and or router advertisements and obtain usernames, passwords, or device…

Contents