Cloud Fundamentals and Cyber Security Assessment -4
Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up modems. Here, the strategy is to gain access to a network through bypassing of control mechanisms and getting in through a backdoor such as a modem. • Spoofing: IP spoofing involves the alteration of a packet at the TCP level….