Page 19 - CyberSecurityEssentialsEnglish
P. 19

In Zero-day (0-day) exploits, the attacker utilizes a new and recently announced vulnerability before a patch
       is released as shown in figure 7.






























                                                   Figure 7 Zero-day exploits

       In password attacks, attackers attempt to access a password-secured file, folder or computer by trying brute
       force algorithms (i.e. making several attempts) until they find the user's password as shown in figure 8.






















                                                   Figure 8 Password attacks

       In the Man-in-the-Middle attack,

       the attacker intercepts a two-party communication, inserting himself in the middle as shown in figure 1.9.
       The attacker can:

           1.  Intercepts the communication;
           2.  Impersonate each party participating in the communication; and
           3.  Steal sensitive data









          17
   14   15   16   17   18   19   20   21   22   23   24