Page 10 - Security Threats new3
P. 10

III.    WHAT ARE IP SNIFFING AND IP SPOOFING?

                    In sniffing, an attacker falsifies the authorized readers, that can scan the legal
            tags to acquire valuable data.



                     In  spoofing  attacks,  an
            attacker  efficaciously  fakes  as
            an official and legal operator of
            a  system.  The  duplicating
            factor of a spoofing attack is an
            approved  user  of  a  system.
            Spoofing  attacks  are  not  the
            same as the other attacks such
            as counterfeiting or sniffing.



            However,
            counterfeiting, packet-sniffing,
            and spoofing all fall under the
            ambit  of  misrepresentation  and
            deception kinds of attack.



         IV.    DIFFERENCE BETWEEN SNIFFING AND SPOOFING

            Now compare packet sniffing and packet spoofing.



                •  During the process of sniffing, the networks’ data traffic is the main target of the
                    attacker who captures data packets that flows across a computer network using
                    packet sniffers.
                •  The software or method depleted to achieve this is called a packet sniffer, which
                    is a function that sniffs without altering the network’s packets in any way.



                •  In short, packet sniffing means eavesdropping on other people’s conversations.

                •  In packet sniffing, an attacker can’t cause any mutilation to the system per se
                    and hence is a passive attack.

                •  A  popular  method  to  defend  sniffing  is  by  way  of  encryption  while  the  top
                    method to tackle spoofing is by use of digital signatures.


                •  Whereas  in  spoofing,  the  attacker  rip-offs  the  authorizations  of  a  user  and
                    deploys those details in a system as an authentic user to unveil attacks against
                    network hosts, take data, disburse malware, or circumvent access controls.
   5   6   7   8   9   10   11   12   13   14   15