0% found this document useful (0 votes)
54 views12 pages

Cyber Security Assignment No. 1

Uploaded by

omkarmohite180
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
54 views12 pages

Cyber Security Assignment No. 1

Uploaded by

omkarmohite180
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
eats can be anything that can ORE the tage of vurnuability to breach Security ne gotively alter erase. harra olejects of terest» ask: his is Se enc term For Sor anre AGE has ‘To malcious purpose . 1 Lat Se inc\udes Vinus attacks. wore ael ere 3 +r0\00. horses and Spyware. > ur This as) Emosts prevalont clangex to yous System. [D)Secusity reach es this gaou pcof ic ottacks Prete enysattemp _Prinhege sx elias sito: Sem ence —ThiSt Ol 07 €sthings Vou abianiots TELS Goitth Ae term hockiag. Fi 4 |) Des attacks. Lomneve are designed to prevent ‘egcicna s locdees® tO “nes Syste - ee Hixe « Bios}. b Lpyoury website + ; ‘ Sudo, Pieeats =. aidan ane IeTwo GF 4Ke most _common such [5) session Hijocking je These ottacks are rathes than lond involve on ottackar att enn FoKe Over O Session. gE jreaic 4 [-Thiss type of attack CompPromise a ows Sspoobing ADNs Spoofing :- DNs stands fr Carma Nome System). ! [Server So that Users con oe wrediy File storage aveas Worms Usually Sloud docdn AM Ctwor Ks BA virus needs a bost pr0g70M to wuE WOTMS CoN WA by themselves’ z 13) Trojan horse» Fats 0 rmaware thot carries oot i breration such as playing On online Sam IB ojon horse varies from a virus be ihe trojon binds self 40 -non=executabt Such os imase Files, ond audio files.) 57 4)Ransomusare | - > Fa Ane dota it contains unt) the -vichms ma PB Poyment- ~) FRansomevsare encoPpyts data in the Com Ith A Key tots unknown to the us fas disPloys unwanted ads and Popa _ |Ane computer. Pie alana | aged bow Fat comes dlong with Sor tours c FAL IAMA/AP OOK AGRSE fF sicllel | opical Gar te cer elit ovence For the §0 i} I @-3- Explain various web-attacks? 9 = > |= web servers hove to allow Communi JF wersites allow Users +o interiact WOun SOS ite . nese ee Any Part of website that allows for binbero Chon 16 Ol60 imp in web atta [SThe most common purpase is to for [server 40 108 the attacker On, even + lattacker does not have a legitimate suserm 6nd Possword - air cle WWOr0Uus web attacks Are vor - oe S8t injection Cross SCN eHNgG sIsau anyjecton ¥ ej-dtis attack in which some de I Jot like Enolish r [Sac stercs for (Structured Quen langdoge [there ore Kommonds like Stlect to Get date -3nsert to Put data and VPOATE to -beijchange dota. = username And Password Are Correct. —The general structure of SOL js Li} Select column f) Column 2 From jalolé mae. Example i fi i Ene noest basic foarosof SOL ‘nj ection Seal Ho Sulover ti “hin Si Process y cil lined ea 1S toeredte 6 Store nent Ahot coll! __olomays be +mier For examples instsadi of putting _ an actuali username and Pass words Into 0 _oppropriate text fields +he attacker colllsenter ODM l= ‘4b into the Username and password boxe: This voll!) coUSe) the lprogromito.g uery Por Create! sii Biase api all (Sect +Prom users di AG Oil Juaner e #sername. =! Orbe yd! ond “Passwords nee Sox iyse 1889 0 =|Cross Seuss, 2 2 ah —This attack «is closely ate to SaQLinjecton . = 14 tewolves entering datd jother 4han cohat wes intended: andi it depends) om thes coebeipyograroner| bot Filtering aneute z _The preret ator Finds some area: obcaebsite thot. alles user +o type sionthe sexrthat other! users udii See Ada then: instead dnjets client- side scmapt di mhotthhose Piclds aceies boll To beter understond +nis Process, See one | SogMamMensleH1S ASSume that AQConiiine book ‘gales thasualto gs i161 ins odd HOMES hopRing Users candhave Accounys) Wit) or edit @ords stoveda ROSH eV Leuosvand moter sell 4 ETneaktacker first setup on otdeuaicayes ee Ten Ane CXLarken Goes 40 4he Teal ABC beck soles websije and finds a mathe oh Bole: HE Goos tO the Teviews SOCHOh eso ot ZwWindor Joca-tion = htLp + /Mowovo Pcors' <2 /seript > = JENow cohen Users go to thot book iW eediret themito the Pare Site mona : KS AO ATeot deol like the Teal one. W-the ottocker When can have +he webs 2)\ the user hat his session has +i na to Please login again. ae [trot Goould alloca tne attackay 40 Bathe Jef accounts and Posswordsy a & Eee igi age eer? " O24 boride” a short hote Sb DNS Poisning- = Ss stonds fr (Domain Nome systens)Sen Se is also coljed as OwS Spoofing. aay SONS Poisning oF PWS Spooling jis (one ity to Steal) their access. epee, pes Woh Sensitive information. e Malcious website 1S phen l Dpteinvin bec - Tr ein eycepinon, and a DWS di Per emtumal i - = 192 0 Awd) (a Dewohite hat hackaers HA wohite hot hackers Sometimes GEMS orc ING » They ave ontesis of black hot ho K They expiocits Computer systems idenhfy their secumty flocd go he aise Tecormmendations fox imprveme Block [hot hacwers : Z black hat hockey is the person he might steo\ dotaerase Files or defa Grey hat hackers jsillegal activities, B34 1S an hocker an _indivdual sho” - © |Scvipt Kiddes ran tt ome eee. a [packer is On expert in @ Given SNStefn. |+ deovicludes its shores of frauds oe Tne cost common teem forithis isgSert of __| Person sis somply kiddy (Raympe0d 1.98 3) de 5 Dats rmportoot to remenbew +hot nob [dud evel hackers inisempt Kiddes su 56! vege These \nclucdes Passwardsattack togis ond denoial of Seyuiceudttoic hi tools tages ag ESemipt kidde is dermeaniogaemnn uéed todesiibe | Dowice hadwers! Who Use Sxishogeenpks ond | Softuove fo Corry Out quberotboacks: Gia)” 2 CUber_-scourity/statatics show hat Mere ove [around 2200 cyber attocks: Penday 9 ~As dhe term Script kiddes diso Known a5 skidd_ 2S Utilize prewritten Seripts Gnd software +o Icom out Anelr Iacking endeavours. _sChorotevistics of Script Kidde: D Tnexpirienced Dandiserveet | DReckless 4) dmpu)sive S)Rttenvon seeking Were ave Some exompies script Kiddes: elosite defacement 5 ottacks E cial Enaineaning Ottacks f i 965 oe Phishing attacks. | ra _ {éiribute mo\Ware - ri | a IPATea king ‘ fat defines os the action of Using jjyous Ond, Mostly ANega\ 90.5 1 Order LIPON Tox some Sort of telecommunicat bi \\ vordér, tronsfer Jor ovher service. HPhreakiog requires o rather sign Know ladge of AeJeconmmunications =Many Phreokers have Some Professional SxPi merce working for a plone compony pOtner selecommuni cation business. 2a) FOne speciality sof hacking involves break i 2/2 This SUbSspeciayity of Heccued 1S oa OS sphretiing « yey i into telephone systers

You might also like