Unit-2 (CSCL)
Unit-2 (CSCL)
VULNERABILITIES IN SOFTWARE:
Vulnerabilities in software can refer to a number of weaknesses or defects
in software that can be exploited by attackers to gain unauthorized
access, steal sensitive information, or cause harm. Some common types
of software vulnerabilities include:
PHISHING:
Phishing is a type of cyber attack that aims to trick individuals into giving
up sensitive information, such as passwords, credit card numbers, or other
personal details, by posing as a trustworthy entity. Phishing attacks are
often carried out through emails or instant messages that appear to come
from a reputable source, such as a bank, an online retailer, or a social
media site. The attacker may use the information obtained from a
phishing attack to steal the victim's identity, access sensitive information,
or steal money.
PASSWORD CRACKING:
Password cracking is a method used by attackers to gain unauthorized
access to sensitive information by cracking or decoding passwords. This
can be done using various techniques, such as:
STEGANOGRAPHY:
Steganography is the practice of concealing information within other, seemingly harmless
information. In the context of cyber security, steganography can be used to hide sensitive
information within digital files, such as images, audio files, or videos, to avoid detection by
security systems. The goal of steganography is to hide the very existence of the embedded
information, making it difficult for unauthorized parties to detect and extract it.
Steganography can be used for both malicious and benign purposes. For example, it can be
used by attackers to hide malicious code within seemingly harmless files, making it difficult
for security systems to detect. On the other hand, it can also be used by journalists, activists,
or military personnel to conceal sensitive information from oppressive governments or
organizations.
To detect and prevent the use of steganography, it is important to use tools and techniques
that are specifically designed to detect hidden information within digital files, such as digital
forensics tools and steganalysis software. Additionally, it is important to implement good
security practices, such as regular monitoring and audit of file systems, to detect any
suspicious activity.
DOS AND DDOS ATTACKS:
A Denial of Service (DoS) and a Distributed Denial of Service (DDoS)
attack are types of cyber attacks that aim to disrupt the normal
functioning of a computer system or network.
SQL INJECTION:
SQL Injection is a type of security vulnerability that allows attackers to
execute malicious SQL code on a database server through user input. It
occurs when user-supplied data is not properly validated and sanitized
before being used in a SQL query, allowing attackers to inject malicious
SQL code into the query that can be executed by the database server.
BUFFER OVERFLOW:
A buffer overflow is a type of security vulnerability that occurs when a
program attempts to store more data in a buffer (a temporary storage
area) than it can hold, causing the extra data to overflow into adjacent
memory locations. This can cause the program to crash or behave
unpredictably, and in some cases, can be used by an attacker to execute
malicious code or take control of the system.