SlideShare ist ein Scribd-Unternehmen logo
1 von 17
B Y
G . V. S I VA K R I S H N A ,
E M P I D – E 1 1 4 1
Types of attacks in Cyber World
Contents
 What is cyber security?
 Types of cyber attacks
 Web-based attacks
 System-based attacks
 Methods of assistance
 Prevention
What is cyber security?
 Cyber security is a practice which intends to protect computers,
networks, programs and data from unintended or unauthorized access,
change or destruction
 Why Cyber Security?
 Now-a-days everything is going on web
 Major proportion of systems connected to internet (i.e, large inventory for intruders to
attack)
 That’s why cyber security became major concern in the world of computers over the
past decade
Types of cyber attacks
 Cyber attack is an illegal attempt to gain something from a computer
system
 These can be classified into
 Web-based attacks
 These are the attacks on a website or web application
 System-based attacks
 Attacks that are intended to compromise a computer or a computer network
Web-based attacks
 Injection attacks
 In this type of attacks, some data will be injected into a web applications to
manipulate the application and get required information
 Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,
 SQL injection (SQLi) is most common type of injection attack
 In SQLi, customized string will be passed to web application further manipulating
query interpreter and gaining access to unauthorized information
 SQLi can be prevented upto some extent by proper validation of data and by enforcing
least privilege principle
Web-based attacks
 File inclusion attack
 A file inclusion vulnerability allows an attacker to access unauthorized or sensitive
files available on the web server or to execute malicious files on the web server by
making use of the include functionality
 It can be further classified into
 Local file inclusion
 Including local files available on the server
 Remote file inclusion
 Includes and executes malicious code on a remotely hosted file
Web-based attacks
 Cross-Site Scripting (XSS)
 This can be done by editing javascript in a webpage such that it will be executed in client
browser
 It can be classified into
 Reflected XSS attack
 Stored XSS attack
 DOM-based XSS attack
 DNS Spoofing
 DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is
introduced into a Domain Name System (DNS) resolver's cache, causing the name server to
return an incorrect IP address, diverting traffic to the attacker's computer (or any other
computer).
Web-based attacks
 Denial of Service (DoS)
 DoS attack is an attempt to make a server or network resource unavailable to users
 This is generally done by flooding the server with communication requests
 DoS uses single system and single internet connection to attack a server
 Distributed Dos (DDoS) uses multiple systems and internet connections to flood a
server with requests, making it harder to counteract
 DoS can be classified into
 Volume based attacks
 goal is to saturate the bandwidth of the attacked site, and is measured in bits per second
 Protocal attacks
 consumes actual server resources, and is measured in packets per second
 Application layer attacks
 goal of these attacks is to crash the web server, and is measured in requests per second
Web-based attacks
 Brute force
 It is a trial and error method
 Generates large number of guesses and validate them to obtain actual data (passwords
in general)
 Dictionary attack
 Contains a list of commonly used passwords and validate them to get original password
 Buffer overflow
 occurs when a program or process tries to store more data in a buffer (temporary data
storage area) than it was intended to hold
Web-based attacks
 Session hijacking
 Web applications uses cookies to store state and details of user sessions
 By stealing the cookies, and attacker can have access to all of user data
 URL interpretation
 By changing certain parts of a URL, one can make a web server to deliver web pages
for which he is not authorized to browse
 Social engineering
 It is a non-technical method that relies heavily on human interaction and often
involves tricking people into breaking normal security procedures
Web-based attacks
 Man-in-the-middle attack
 Attacker intercepts the connection between
client and server and acts as a bridge between
them
 Attacker will be able to read, insert and modify
the data in the intercepted communication
 Phishing
 Phishing is the attempt to acquire sensitive information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication
 Spear phishing
 It is a form of phishing, which targets specific organizations for confidential data
 Whaling
 In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles
System-based attacks
 Virus
 A computer virus is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed
 It can also execute instructions that cause harm to system
 Worm
 It works same as a computer virus
 but it can spread into other systems in the network by exploiting the vulnerabilities
automatically
System-based attacks
 Trojan horse
 It appears to be a normal application, but when opened/executed some malicious code
will run in background
 These are generally spread by some form of social engineering
 Backdoors
 Backdoor is a method of bypassing normal authentication process
 The backdoor is written by the programmer who creates the code for the program
 It is often only known by the programmer
System-based attacks
 Bots
 Bot is an automated process that interacts with other network services
 Can be classified into
 Spyware
 Used to gather information of user without their knowledge
 Ex: Keyloggers
 Adware
 Mainly used for promotions of products
 Not so harmful
Methods to assist in cyberattacks
 Spoofing
 In spoofing, one person successfully impersonates as another by falsifying the data
 Ex: IP spoofing, email spoofing etc.,
 Sniffing
 Sniffing a process of capturing and analyzing the traffic in a network
 Port scanning
 It is a method to probe a system for open ports
 Intruder can exploit the vulnerabilities of open ports
References
 http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html
 http://resources.infosecinstitute.com/file-inclusion-attacks/
 https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
 http://searchsecurity.techtarget.com/definition/buffer-overflow
 http://ccm.net/contents/31-url-manipulation-attacks
 http://searchsecurity.techtarget.com/definition/social-engineering
 https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf
 http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 

Was ist angesagt? (20)

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
MALWARE
MALWAREMALWARE
MALWARE
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 

Andere mochten auch

Inventory control management
Inventory control managementInventory control management
Inventory control managementaroramahesh
 
selective inventory control
 selective inventory control selective inventory control
selective inventory controlHimani Chowhan
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)gunpreet kamboj
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor Mv Raam
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labourshahriar786
 
Child labour
Child labourChild labour
Child labourMSIT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labourAditya Kumar
 

Andere mochten auch (17)

Inventory control management
Inventory control managementInventory control management
Inventory control management
 
selective inventory control
 selective inventory control selective inventory control
selective inventory control
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Child labour
Child labourChild labour
Child labour
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labour
 
Child labour
Child labourChild labour
Child labour
 
Child labour-child-labour-project
Child labour-child-labour-projectChild labour-child-labour-project
Child labour-child-labour-project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labour
 
Child labour presentation
Child labour presentationChild labour presentation
Child labour presentation
 

Ähnlich wie Types of cyber attacks

Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service AttackStephanie Williams
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptxVIRAJDEY1
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxjoellemurphey
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2Education
 

Ähnlich wie Types of cyber attacks (20)

Network security
Network securityNetwork security
Network security
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Security communication
Security communicationSecurity communication
Security communication
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security
Network securityNetwork security
Network security
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
cyber security
cyber securitycyber security
cyber security
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Types of cyber attacks

  • 1. B Y G . V. S I VA K R I S H N A , E M P I D – E 1 1 4 1 Types of attacks in Cyber World
  • 2. Contents  What is cyber security?  Types of cyber attacks  Web-based attacks  System-based attacks  Methods of assistance  Prevention
  • 3. What is cyber security?  Cyber security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction  Why Cyber Security?  Now-a-days everything is going on web  Major proportion of systems connected to internet (i.e, large inventory for intruders to attack)  That’s why cyber security became major concern in the world of computers over the past decade
  • 4. Types of cyber attacks  Cyber attack is an illegal attempt to gain something from a computer system  These can be classified into  Web-based attacks  These are the attacks on a website or web application  System-based attacks  Attacks that are intended to compromise a computer or a computer network
  • 5. Web-based attacks  Injection attacks  In this type of attacks, some data will be injected into a web applications to manipulate the application and get required information  Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,  SQL injection (SQLi) is most common type of injection attack  In SQLi, customized string will be passed to web application further manipulating query interpreter and gaining access to unauthorized information  SQLi can be prevented upto some extent by proper validation of data and by enforcing least privilege principle
  • 6. Web-based attacks  File inclusion attack  A file inclusion vulnerability allows an attacker to access unauthorized or sensitive files available on the web server or to execute malicious files on the web server by making use of the include functionality  It can be further classified into  Local file inclusion  Including local files available on the server  Remote file inclusion  Includes and executes malicious code on a remotely hosted file
  • 7. Web-based attacks  Cross-Site Scripting (XSS)  This can be done by editing javascript in a webpage such that it will be executed in client browser  It can be classified into  Reflected XSS attack  Stored XSS attack  DOM-based XSS attack  DNS Spoofing  DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
  • 8. Web-based attacks  Denial of Service (DoS)  DoS attack is an attempt to make a server or network resource unavailable to users  This is generally done by flooding the server with communication requests  DoS uses single system and single internet connection to attack a server  Distributed Dos (DDoS) uses multiple systems and internet connections to flood a server with requests, making it harder to counteract  DoS can be classified into  Volume based attacks  goal is to saturate the bandwidth of the attacked site, and is measured in bits per second  Protocal attacks  consumes actual server resources, and is measured in packets per second  Application layer attacks  goal of these attacks is to crash the web server, and is measured in requests per second
  • 9. Web-based attacks  Brute force  It is a trial and error method  Generates large number of guesses and validate them to obtain actual data (passwords in general)  Dictionary attack  Contains a list of commonly used passwords and validate them to get original password  Buffer overflow  occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold
  • 10. Web-based attacks  Session hijacking  Web applications uses cookies to store state and details of user sessions  By stealing the cookies, and attacker can have access to all of user data  URL interpretation  By changing certain parts of a URL, one can make a web server to deliver web pages for which he is not authorized to browse  Social engineering  It is a non-technical method that relies heavily on human interaction and often involves tricking people into breaking normal security procedures
  • 11. Web-based attacks  Man-in-the-middle attack  Attacker intercepts the connection between client and server and acts as a bridge between them  Attacker will be able to read, insert and modify the data in the intercepted communication  Phishing  Phishing is the attempt to acquire sensitive information, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication  Spear phishing  It is a form of phishing, which targets specific organizations for confidential data  Whaling  In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles
  • 12. System-based attacks  Virus  A computer virus is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed  It can also execute instructions that cause harm to system  Worm  It works same as a computer virus  but it can spread into other systems in the network by exploiting the vulnerabilities automatically
  • 13. System-based attacks  Trojan horse  It appears to be a normal application, but when opened/executed some malicious code will run in background  These are generally spread by some form of social engineering  Backdoors  Backdoor is a method of bypassing normal authentication process  The backdoor is written by the programmer who creates the code for the program  It is often only known by the programmer
  • 14. System-based attacks  Bots  Bot is an automated process that interacts with other network services  Can be classified into  Spyware  Used to gather information of user without their knowledge  Ex: Keyloggers  Adware  Mainly used for promotions of products  Not so harmful
  • 15. Methods to assist in cyberattacks  Spoofing  In spoofing, one person successfully impersonates as another by falsifying the data  Ex: IP spoofing, email spoofing etc.,  Sniffing  Sniffing a process of capturing and analyzing the traffic in a network  Port scanning  It is a method to probe a system for open ports  Intruder can exploit the vulnerabilities of open ports
  • 16. References  http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html  http://resources.infosecinstitute.com/file-inclusion-attacks/  https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html  http://searchsecurity.techtarget.com/definition/buffer-overflow  http://ccm.net/contents/31-url-manipulation-attacks  http://searchsecurity.techtarget.com/definition/social-engineering  https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf  http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html