0% found this document useful (0 votes)
47 views

Cyber Security Assignment No. 1

Uploaded by

omkarmohite180
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
47 views

Cyber Security Assignment No. 1

Uploaded by

omkarmohite180
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
eats can be anything that can ORE the tage of vurnuability to breach Security ne gotively alter erase. harra olejects of terest» ask: his is Se enc term For Sor anre AGE has ‘To malcious purpose . 1 Lat Se inc\udes Vinus attacks. wore ael ere 3 +r0\00. horses and Spyware. > ur This as) Emosts prevalont clangex to yous System. [D)Secusity reach es this gaou pcof ic ottacks Prete enysattemp _Prinhege sx elias sito: Sem ence —ThiSt Ol 07 €sthings Vou abianiots TELS Goitth Ae term hockiag. Fi 4 |) Des attacks. Lomneve are designed to prevent ‘egcicna s locdees® tO “nes Syste - ee Hixe « Bios}. b Lpyoury website + ; ‘ Sudo, Pieeats =. aidan ane IeTwo GF 4Ke most _common such [5) session Hijocking je These ottacks are rathes than lond involve on ottackar att enn FoKe Over O Session. gE jreaic 4 [-Thiss type of attack CompPromise a ows Sspoobing ADNs Spoofing :- DNs stands fr Carma Nome System). ! [Server So that Users con oe wrediy File storage aveas Worms Usually Sloud docdn AM Ctwor Ks BA virus needs a bost pr0g70M to wuE WOTMS CoN WA by themselves’ z 13) Trojan horse» Fats 0 rmaware thot carries oot i breration such as playing On online Sam IB ojon horse varies from a virus be ihe trojon binds self 40 -non=executabt Such os imase Files, ond audio files.) 57 4)Ransomusare | - > Fa Ane dota it contains unt) the -vichms ma PB Poyment- ~) FRansomevsare encoPpyts data in the Com Ith A Key tots unknown to the us fas disPloys unwanted ads and Popa _ |Ane computer. Pie alana | aged bow Fat comes dlong with Sor tours c FAL IAMA/AP OOK AGRSE fF sicllel | opical Gar te cer elit ovence For the §0 i} I @-3- Explain various web-attacks? 9 = > |= web servers hove to allow Communi JF wersites allow Users +o interiact WOun SOS ite . nese ee Any Part of website that allows for binbero Chon 16 Ol60 imp in web atta [SThe most common purpase is to for [server 40 108 the attacker On, even + lattacker does not have a legitimate suserm 6nd Possword - air cle WWOr0Uus web attacks Are vor - oe S8t injection Cross SCN eHNgG sIsau anyjecton ¥ ej-dtis attack in which some de I Jot like Enolish r [Sac stercs for (Structured Quen langdoge [there ore Kommonds like Stlect to Get date -3nsert to Put data and VPOATE to -beijchange dota. = username And Password Are Correct. —The general structure of SOL js Li} Select column f) Column 2 From jalolé mae. Example i fi i Ene noest basic foarosof SOL ‘nj ection Seal Ho Sulover ti “hin Si Process y cil lined ea 1S toeredte 6 Store nent Ahot coll! __olomays be +mier For examples instsadi of putting _ an actuali username and Pass words Into 0 _oppropriate text fields +he attacker colllsenter ODM l= ‘4b into the Username and password boxe: This voll!) coUSe) the lprogromito.g uery Por Create! sii Biase api all (Sect +Prom users di AG Oil Juaner e #sername. =! Orbe yd! ond “Passwords nee Sox iyse 1889 0 =|Cross Seuss, 2 2 ah —This attack «is closely ate to SaQLinjecton . = 14 tewolves entering datd jother 4han cohat wes intended: andi it depends) om thes coebeipyograroner| bot Filtering aneute z _The preret ator Finds some area: obcaebsite thot. alles user +o type sionthe sexrthat other! users udii See Ada then: instead dnjets client- side scmapt di mhotthhose Piclds aceies boll To beter understond +nis Process, See one | SogMamMensleH1S ASSume that AQConiiine book ‘gales thasualto gs i161 ins odd HOMES hopRing Users candhave Accounys) Wit) or edit @ords stoveda ROSH eV Leuosvand moter sell 4 ETneaktacker first setup on otdeuaicayes ee Ten Ane CXLarken Goes 40 4he Teal ABC beck soles websije and finds a mathe oh Bole: HE Goos tO the Teviews SOCHOh eso ot ZwWindor Joca-tion = htLp + /Mowovo Pcors' <2 /seript > = JENow cohen Users go to thot book iW eediret themito the Pare Site mona : KS AO ATeot deol like the Teal one. W-the ottocker When can have +he webs 2)\ the user hat his session has +i na to Please login again. ae [trot Goould alloca tne attackay 40 Bathe Jef accounts and Posswordsy a & Eee igi age eer? " O24 boride” a short hote Sb DNS Poisning- = Ss stonds fr (Domain Nome systens)Sen Se is also coljed as OwS Spoofing. aay SONS Poisning oF PWS Spooling jis (one ity to Steal) their access. epee, pes Woh Sensitive information. e Malcious website 1S phen l Dpteinvin bec - Tr ein eycepinon, and a DWS di Per emtumal i - = 192 0 Awd) (a Dewohite hat hackaers HA wohite hot hackers Sometimes GEMS orc ING » They ave ontesis of black hot ho K They expiocits Computer systems idenhfy their secumty flocd go he aise Tecormmendations fox imprveme Block [hot hacwers : Z black hat hockey is the person he might steo\ dotaerase Files or defa Grey hat hackers jsillegal activities, B34 1S an hocker an _indivdual sho” - © |Scvipt Kiddes ran tt ome eee. a [packer is On expert in @ Given SNStefn. |+ deovicludes its shores of frauds oe Tne cost common teem forithis isgSert of __| Person sis somply kiddy (Raympe0d 1.98 3) de 5 Dats rmportoot to remenbew +hot nob [dud evel hackers inisempt Kiddes su 56! vege These \nclucdes Passwardsattack togis ond denoial of Seyuiceudttoic hi tools tages ag ESemipt kidde is dermeaniogaemnn uéed todesiibe | Dowice hadwers! Who Use Sxishogeenpks ond | Softuove fo Corry Out quberotboacks: Gia)” 2 CUber_-scourity/statatics show hat Mere ove [around 2200 cyber attocks: Penday 9 ~As dhe term Script kiddes diso Known a5 skidd_ 2S Utilize prewritten Seripts Gnd software +o Icom out Anelr Iacking endeavours. _sChorotevistics of Script Kidde: D Tnexpirienced Dandiserveet | DReckless 4) dmpu)sive S)Rttenvon seeking Were ave Some exompies script Kiddes: elosite defacement 5 ottacks E cial Enaineaning Ottacks f i 965 oe Phishing attacks. | ra _ {éiribute mo\Ware - ri | a IPATea king ‘ fat defines os the action of Using jjyous Ond, Mostly ANega\ 90.5 1 Order LIPON Tox some Sort of telecommunicat bi \\ vordér, tronsfer Jor ovher service. HPhreakiog requires o rather sign Know ladge of AeJeconmmunications =Many Phreokers have Some Professional SxPi merce working for a plone compony pOtner selecommuni cation business. 2a) FOne speciality sof hacking involves break i 2/2 This SUbSspeciayity of Heccued 1S oa OS sphretiing « yey i into telephone systers

You might also like