Page 10 - Security Threats new3
P. 10
III. WHAT ARE IP SNIFFING AND IP SPOOFING?
In sniffing, an attacker falsifies the authorized readers, that can scan the legal
tags to acquire valuable data.
In spoofing attacks, an
attacker efficaciously fakes as
an official and legal operator of
a system. The duplicating
factor of a spoofing attack is an
approved user of a system.
Spoofing attacks are not the
same as the other attacks such
as counterfeiting or sniffing.
However,
counterfeiting, packet-sniffing,
and spoofing all fall under the
ambit of misrepresentation and
deception kinds of attack.
IV. DIFFERENCE BETWEEN SNIFFING AND SPOOFING
Now compare packet sniffing and packet spoofing.
• During the process of sniffing, the networks’ data traffic is the main target of the
attacker who captures data packets that flows across a computer network using
packet sniffers.
• The software or method depleted to achieve this is called a packet sniffer, which
is a function that sniffs without altering the network’s packets in any way.
• In short, packet sniffing means eavesdropping on other people’s conversations.
• In packet sniffing, an attacker can’t cause any mutilation to the system per se
and hence is a passive attack.
• A popular method to defend sniffing is by way of encryption while the top
method to tackle spoofing is by use of digital signatures.
• Whereas in spoofing, the attacker rip-offs the authorizations of a user and
deploys those details in a system as an authentic user to unveil attacks against
network hosts, take data, disburse malware, or circumvent access controls.