Salami Attack - Intruders and Insiders

Before getting started just answer this question to self - Are you interested in learning or knowing about Computer Security and what took you into this? I asked this question just because I wasn't interested until and unless my Professor talked about the attacks and types of attackers.



Attack Definition
A cyber attack is an attack on devices like computer, mobile, any device that deals with network. It is performed by the cybercriminals using one or more computers against a single or multiple computers or networks. An attack is basically meant to disable your computer or device for use.
There's always someone keeping an Eye on you
There are mainly 2 types of attacks: Intruders and Insiders

Intruders: Intruders are the type of attackers those who tries to find vulnerabilities and get the access to the system from outside. They run different algorithms and tries to attack the system. They perform:

Interception
Interception in cyber security
In this type of attack, information is neither modified nor fabricated. The attacker will only listen to the communication between the sender and a receiver.

Interruption


In this type of attack, the communication between two systems are been blocked i.e. data will not be available for the authorized user.

Modification



Here the sender sends packet to the receiver but the packet which is been send is received by the attacker in between and he changes (modifies) the content in the packet and then forwards the modified packet back to the receiver. Here, receiver assumes that the packet has not be tempered (modified) and is send by the actual sender.

Fabrication

Fabrication in cyber security


In this type of attack, fabricated information i.e. the one which doesn't exist will be created and stored into the database. Creating additional username and password that doesn't exist will be created by the attacker using SQL Injection.

Insiders: Insiders are the type of attackers those who are already known to the vulnerabilities of the system and attack from inside. They directly attack the system without running any algorithm. Insider attacks can be done in various forms for example - Salami Attack

What is Salami Attack?
Salami attack is also known as "Salami slicing attack". It is a term which refers to the attack that a insider makes.
For example: Suppose there's a person working in a bank and is about to retire or going to leave, so due to the time spent in the bank he or she knows the detail related to bank, maybe the minute (detailed) information also. Having the detail information, the person made such a changes in the algorithm that all the value after decimal is been transferred to his or her account i.e. if there is a amount of 15008.28 in the bank then .28 value will be transferred to the attackers account this is how millions of account money transfer takes place and the attacker becomes successful in his plan.


By - Pratiksha Jain
Writer, Web Developer

Comments