Types of Attacks in Network Security

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Mobile Device Security Threats, Risks & Issues

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:03 Different Threats
  • 0:33 Active vs. Passive
  • 1:26 Examples of Active Threats
  • 2:13 Examples of Passive Threats
  • 3:02 Lesson Summary
Add to Add to Add to

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Login or Sign up

Timeline
Autoplay
Autoplay

Recommended Lessons and Courses for You

Lesson Transcript
Instructor: Kaitlin Oglesby
Network security specialists must face a wide variety of threats to their data and devices. In this lesson, we'll look at a number of the different types of attacks that can occur.

Different Threats

Given the incredible amount of information that is held on computers and online, it is no surprise that networks are subjected to a number of different types of attack. From a simple forever-loop gone wrong to an advanced persistent threat, there are a number of ways that your computer or your data can be attacked. In this lesson, we will first classify these attacks in one of two categories before looking at examples of each, seeing what these attacks are capable of along the way.

Active vs. Passive

Before we go any further, it is crucial that we understand a major difference between two dominant types of threats: active and passive. An active threat is one that actively seeks to damage or destroy your information. A few years ago, the Stuxnet virus destroyed a number of computers, especially those dealing with the Iranian nuclear program. While the publishers of Stuxnet remain secret, Stuxnet was an active threat.

Passive threats, on the other hand, do not seek to do anything to your data except monitor it. They want to keep an eye on what you are doing, and when something interesting, like a credit card number or personal health information, appears on screen, they surreptitiously take a screenshot and send it back to their home server without being noticed. While you can continue to use your computer or mobile device, the threat is no less real.

Examples of Active Threats

Stuxnet is one of the most famous specific examples of an active attack, but there are a number of others. Some of the most common are as follows:

To unlock this lesson you must be a Study.com Member.
Create your account

Register for a free trial

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Free 5-day trial

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it free for 5 days!
Create An Account
Support