SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Types of Cybersecurity
attacks and how to avoid
them
Prepared by
MS.c Eng
Ahmed Shamil Noori
Outline
Introduction
What is Cybersecurity
Types Cybersecurity Threats
Types of Cyberattack
Conclusion
Resources
Introduction
Security is simply the freedom from risk or danger when you create systems that store and
retrieve data, it is important to protect the data from unauthorized use, disclosure, modification or
destruction. Ensuring that users have the proper authority to see the data, load new data, or update
existing data is an important aspect of application development.
If you know what types of cyberattacks then you can know what you’re up against and it’s will be
easier to implement a comprehensive security strategy.
we will discuss most common security attacks and how they work. Then we’ll share some tips and
tools to help protect against them
Availability
What is Cybersecurity
 Cybersecurity is a practice of protecting through implementing effective cybersecurity measures
which is particularly challenging today because there are devices more than people, and attackers
are becoming more innovative.
1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause
disruption.
2. Cyberattack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
Types Cybersecurity Threats
Types of cyberattack
Most common types of cyberattack :
1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
2. Man-in-the-middle (MitM) attack
3. Password attack
4. Phishing and spear phishing attacks
5. Eavesdropping attack
6. Birthday attack
7. Malware attack
It overwhelms a system’s
resources by flooding the system
with fake requests until it cannot
respond to service requests.
1. Denial-of-service (DoS),
distributed denial-of-service
(DDoS) attacks
2. Man-in-the-middle
(MitM) attack
Hacker inserts itself between the
communications of a client and a
server,some common types of man-in-
the-middle attacks:
In a MITM attack, the two parties
involved feel like they are
communicating as they normally do.
What they do not know is that the person
actually sending the message illicitly
modifies or accesses the message before
it reaches its destination. Some ways to
protect yourself and your organization
from MITM attacks is by using strong
encryption on access points or to use a
virtual private network (VPN).
3. Password attack
passwords are the most commonly used mechanism to authenticate users to an information system,
obtaining passwords is a common and effective attack approach through outright guessing which can be done
using either a random or systematic manner:
• Brute-force password guessing means using a random approach by trying different passwords and hoping
that one work Some logic can be applied by trying passwords related to the person’s name, job title,
hobbies or similar items.
• Dictionary attack, a dictionary of common passwords is used to attempt to gain access to a user’s
computer and network. One approach is to copy an encrypted file that contains the passwords, apply the
same encryption to a dictionary of commonly used passwords, and compare the results.
In order to protect yourself from dictionary or brute-force attacks, you need to implement an account
lockout policy that will lock the account after a few invalid password attempts
4. Phishing and spear
phishing attacks
Phishing is when cybercriminals
target victims with emails that appear to be from
a legitimate company asking for sensitive
information. Phishing attacks are often used to
dupe people into handing over credit card data
and other personal information.
• Whale-phishing Attacks
A whale-phishing attack is so-named because it
goes after the “big fish” or whales of an
organization who can be valuable to attackers,
which typically include those in the C-suite or
others in charge of the organization.
• Spear-phishing Attacks
The attacker takes the time to research their
intended targets and then write messages the
target is likely to find personally relevant. These
types of attacks are aptly called “spear” phishing
because of the way the attacker hones in on one
specific target. The message will seem
legitimate, which is why it can be difficult to spot
a spear-phishing attack.
5. Eavesdropping attack
Eavesdropping attacks involve
the bad actor intercepting traffic as it is
sent through the network. In this way, an
attacker can collect usernames,
passwords, and other confidential
information like credit cards.
Eavesdropping can be active or passive.
1. Passive eavesdropping — A hacker
detects the information by listening to
the message transmission in the
network.
2. Active eavesdropping — A hacker
actively grabs the information by
disguising himself as friendly unit and
by sending queries to transmitters. This
is called probing, scanning or
tampering.
6. Birthday Attack
In a birthday attack, an attacker abuses a security feature: hash algorithms, which are used to
verify the authenticity of messages. The hash algorithm is a digital signature, and the receiver of the
message checks it before accepting the message as authentic. If a hacker can create a hash that is
identical to what the sender has appended to their message, the hacker can simply replace the
sender’s message with their own. The receiving device will accept it because it has the right hash.
7. Malware Attack
Malicious software can be described as unwanted software that is installed in your system
without your consent. It can attach itself to legitimate code and propagate; it can lurk in useful
applications or replicate itself across the Internet. Here are some of the most common types of
malware:
• The Virus — A computer virus is a type of malware. Much like a biological virus, it is a program
that can replicate itself and spread from one computer to another. It is a process of replication that
gave this type of program its name.
• Trojans — A Trojan or a Trojan horse is a program that hides in a useful program and usually has
a malicious function. A major difference between viruses and Trojans is that Trojans do not self-
replicate.
• Worms — Worms differ from viruses in that they do not attach to a host file, but are self-contained
programs that propagate across networks and computers. Worms are commonly spread through
email attachments; opening the attachment activates the worm program.
• Logic bombs — A logic bomb is a type of malicious software that is appended to an application
and is triggered by a specific occurrence, such as a logical condition or a specific date and time.
• Stealth viruses — Stealth viruses take over system functions to conceal themselves. They do this
by compromising malware detection software so that the software will report an infected area as
being uninfected.
• System or boot-record infectors — A boot-record virus attaches to the master boot record on
hard disks. When the system is started, it will look at the boot sector and load the virus into
memory, where it can propagate to other disks and computers.
Conclusion
Implementing effective cybersecurity measures is
particularly challenging today because there are more
devices than people, and attackers are becoming more
innovative.
Overall, the awareness and alertness of end-user to
discover the suspicious activity make the best and
strongest protection style.
Resources
 Stallings, W (2016). Cryptography and Network Security Principles and Practice.
6th Edition on 20 Aug 2016, United States of America, Prentice Hall.
 Sikorski M. and Honig, A. (2012). Practical Malware Analysis, William Pollock. 2012,
United States of America, San Francisco.
Cybersecurity

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 

Was ist angesagt? (20)

Application security
Application securityApplication security
Application security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Cyber security
Cyber securityCyber security
Cyber security
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 

Ähnlich wie Cybersecurity

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscapecyberprosocial
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in securityssuserec53e73
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtaufiq463421
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackPILAMPIRAYAsstProfes
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 

Ähnlich wie Cybersecurity (20)

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Exploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat LandscapeExploring Cyber Attack Types: Understanding the Threat Landscape
Exploring Cyber Attack Types: Understanding the Threat Landscape
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attack
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber security
Cyber securityCyber security
Cyber security
 

Mehr von A. Shamel

Vmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterVmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterA. Shamel
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for IraqA. Shamel
 
Buses and protocol
Buses and protocolBuses and protocol
Buses and protocolA. Shamel
 
Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)A. Shamel
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic piplineA. Shamel
 
GSM & CDMA & OFDM
GSM & CDMA & OFDMGSM & CDMA & OFDM
GSM & CDMA & OFDMA. Shamel
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Analog communication
Analog communicationAnalog communication
Analog communicationA. Shamel
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injectionA. Shamel
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filterA. Shamel
 

Mehr von A. Shamel (14)

Vmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenterVmware Data Center Virtualization ESXI and vCenter
Vmware Data Center Virtualization ESXI and vCenter
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
Buses and protocol
Buses and protocolBuses and protocol
Buses and protocol
 
Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)Serial connectors, Protocols , USB (universal serial bus)
Serial connectors, Protocols , USB (universal serial bus)
 
Omnet sem
Omnet semOmnet sem
Omnet sem
 
Foc ch4
Foc ch4Foc ch4
Foc ch4
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Arithmatic pipline
Arithmatic piplineArithmatic pipline
Arithmatic pipline
 
GSM & CDMA & OFDM
GSM & CDMA & OFDMGSM & CDMA & OFDM
GSM & CDMA & OFDM
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Analog communication
Analog communicationAnalog communication
Analog communication
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Adaptive filter
Adaptive filterAdaptive filter
Adaptive filter
 

Kürzlich hochgeladen

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Kürzlich hochgeladen (20)

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Cybersecurity

  • 1. Types of Cybersecurity attacks and how to avoid them Prepared by MS.c Eng Ahmed Shamil Noori
  • 2. Outline Introduction What is Cybersecurity Types Cybersecurity Threats Types of Cyberattack Conclusion Resources
  • 3. Introduction Security is simply the freedom from risk or danger when you create systems that store and retrieve data, it is important to protect the data from unauthorized use, disclosure, modification or destruction. Ensuring that users have the proper authority to see the data, load new data, or update existing data is an important aspect of application development. If you know what types of cyberattacks then you can know what you’re up against and it’s will be easier to implement a comprehensive security strategy. we will discuss most common security attacks and how they work. Then we’ll share some tips and tools to help protect against them Availability
  • 4. What is Cybersecurity  Cybersecurity is a practice of protecting through implementing effective cybersecurity measures which is particularly challenging today because there are devices more than people, and attackers are becoming more innovative. 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyberattack often involves politically motivated information gathering. 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear. Types Cybersecurity Threats
  • 5. Types of cyberattack Most common types of cyberattack : 1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks 2. Man-in-the-middle (MitM) attack 3. Password attack 4. Phishing and spear phishing attacks 5. Eavesdropping attack 6. Birthday attack 7. Malware attack
  • 6. It overwhelms a system’s resources by flooding the system with fake requests until it cannot respond to service requests. 1. Denial-of-service (DoS), distributed denial-of-service (DDoS) attacks
  • 7. 2. Man-in-the-middle (MitM) attack Hacker inserts itself between the communications of a client and a server,some common types of man-in- the-middle attacks: In a MITM attack, the two parties involved feel like they are communicating as they normally do. What they do not know is that the person actually sending the message illicitly modifies or accesses the message before it reaches its destination. Some ways to protect yourself and your organization from MITM attacks is by using strong encryption on access points or to use a virtual private network (VPN).
  • 8. 3. Password attack passwords are the most commonly used mechanism to authenticate users to an information system, obtaining passwords is a common and effective attack approach through outright guessing which can be done using either a random or systematic manner: • Brute-force password guessing means using a random approach by trying different passwords and hoping that one work Some logic can be applied by trying passwords related to the person’s name, job title, hobbies or similar items. • Dictionary attack, a dictionary of common passwords is used to attempt to gain access to a user’s computer and network. One approach is to copy an encrypted file that contains the passwords, apply the same encryption to a dictionary of commonly used passwords, and compare the results. In order to protect yourself from dictionary or brute-force attacks, you need to implement an account lockout policy that will lock the account after a few invalid password attempts
  • 9. 4. Phishing and spear phishing attacks Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information. • Whale-phishing Attacks A whale-phishing attack is so-named because it goes after the “big fish” or whales of an organization who can be valuable to attackers, which typically include those in the C-suite or others in charge of the organization. • Spear-phishing Attacks The attacker takes the time to research their intended targets and then write messages the target is likely to find personally relevant. These types of attacks are aptly called “spear” phishing because of the way the attacker hones in on one specific target. The message will seem legitimate, which is why it can be difficult to spot a spear-phishing attack.
  • 10. 5. Eavesdropping attack Eavesdropping attacks involve the bad actor intercepting traffic as it is sent through the network. In this way, an attacker can collect usernames, passwords, and other confidential information like credit cards. Eavesdropping can be active or passive. 1. Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network. 2. Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.
  • 11. 6. Birthday Attack In a birthday attack, an attacker abuses a security feature: hash algorithms, which are used to verify the authenticity of messages. The hash algorithm is a digital signature, and the receiver of the message checks it before accepting the message as authentic. If a hacker can create a hash that is identical to what the sender has appended to their message, the hacker can simply replace the sender’s message with their own. The receiving device will accept it because it has the right hash. 7. Malware Attack Malicious software can be described as unwanted software that is installed in your system without your consent. It can attach itself to legitimate code and propagate; it can lurk in useful applications or replicate itself across the Internet. Here are some of the most common types of malware: • The Virus — A computer virus is a type of malware. Much like a biological virus, it is a program that can replicate itself and spread from one computer to another. It is a process of replication that gave this type of program its name.
  • 12. • Trojans — A Trojan or a Trojan horse is a program that hides in a useful program and usually has a malicious function. A major difference between viruses and Trojans is that Trojans do not self- replicate. • Worms — Worms differ from viruses in that they do not attach to a host file, but are self-contained programs that propagate across networks and computers. Worms are commonly spread through email attachments; opening the attachment activates the worm program. • Logic bombs — A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time. • Stealth viruses — Stealth viruses take over system functions to conceal themselves. They do this by compromising malware detection software so that the software will report an infected area as being uninfected. • System or boot-record infectors — A boot-record virus attaches to the master boot record on hard disks. When the system is started, it will look at the boot sector and load the virus into memory, where it can propagate to other disks and computers.
  • 13.
  • 14. Conclusion Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. Overall, the awareness and alertness of end-user to discover the suspicious activity make the best and strongest protection style.
  • 15. Resources  Stallings, W (2016). Cryptography and Network Security Principles and Practice. 6th Edition on 20 Aug 2016, United States of America, Prentice Hall.  Sikorski M. and Honig, A. (2012). Practical Malware Analysis, William Pollock. 2012, United States of America, San Francisco.