KEMBAR78
Exploring the Spectrum of Cyber Attacks .pptx
CYBER SECURITY
By
Dr V KAVITHA
Associate Professor
Dept of Computer Science with Cognitive Systems
Sri Ramakrishna College of Arts & Science
Coimbatore
CYBER SECURITY
Cybersecurity is a way to protect your devices
and services connected to the internet from threats.
The threats are from Spammers, cybercriminals, and
hackers. Cybersecurity is protection against phishing
schemes, data breaches, Identity theft, and
ransomware attacks.
CYBER SCURITY
In the era of digitalisation, where
data is everything. It is a must to know that
privacy is very much vulnerable. We often
hear about a lot of cybercrimes these days,
which has affected millions of people.
Cybersecurity is not just for organizations
and business. It is very much important for
personal gadgets like Mobile phones,
tablets, and personal computers.
ROLE OF CYBER
SECURITY ENGINEER
A cybersecurity
Engineer is the one who
manages and creates the
hardware, security and
software to protect the
network. Mainly the
Cybersecurity engineer merges
electrical engineering and
computer science in
cyberspace.
ETHICAL
HACKING
The authorized practice of
hacking is Ethical Hacking. It is
done to detect vulnerabilities in
the organization's
infrastructure, system security,
identify Data breachers and
network threats. Ethical hackers
basically finds the weak aspects
in the network which can be
attacked by the hackers.
FIREWALLS
Fencing your house
safeguards your home and keeps
intruders under control; likewise,
firewalls are utilized to get PC
protection. Firewalls are network
security frameworks that restrict
unapproved entrance to an
organization.
INFORMATION
SECUTRITY
Information security is a set of
practices designed to carry private data
secure from unauthorized access and
alteration for the duration of storing or
transmitting from one location to another.
Information security is designed
and carried out to protect the print, digital,
and other private, sensitive, and private
data from unauthorized persons. It can be
used to secure data from being misused,
acknowledgment, destruction, alteration,
and disruption.
Challenges to Cybersecurity
While Cybersecurity has a lot of features and advantages, it also has some
challenges
Cost and Time Implementing and maintaining cybersecurity systems can be
−
expensive and time-consuming for organizations.
Complexity Cybersecurity systems can be complex to manage and maintain in
−
the longer run.
Constant Evolution Cyber threats are constantly evolving, which require the
−
Cybersecurity solution to be consistently adaptive to these threats.
Limited Effectiveness Despite maximum efforts, complete protection from
−
cyberattacks is impossible to attain.
CYBERATTACK
A cyberattack is an intentional
attempt to access a computer system,
network, or digital device without
authorization to steal, alter, or destroy
data. Cyberattacks can be motivated by
petty theft or acts of war.
TYPES OF CYBER SECURITY ATTACKS
COMPUTER VIRUS
A computer virus
or simply a virus is a
malicious program that
attaches itself to a
resource in the system
and becomes active
when that file is shared
or accessed within the
system. It is similar to a
biological virus, which
needs a host to become
active and cause harm
COMPUTER WORM
A worm is a malware program
that is slightly different from a virus in
functioning. It spreads by creating copies
of itself when it is accessed, and this
causes an increase in memory and boot
usage.
The processing of the system
slows down and this causes severe harm
to the system
TROJAN HORSE
The Trojan or Trojan Horse
is a malware program which is not
identified by the user at first. It
looks like a normal working file,
but in reality, it is disguised as a
resource. This is similar to the
story of the Trojan horse tale of
Greek Mythology, which is the
basis of the name “Trojan”.
COMPUTER BOMBS
A computer bomb is a
malware program that works like
a time bomb, and it needs certain
conditions in order for it to get
into action. Unlike any other
malware, it only activates once all
conditions are met. The effects
can include illegal access, deleting
data, corrupting information, etc.
EMAIL SPOOFING
Spoofing refers to the activity
of faking the identity and address of
the sender of emails. This can take
place by changing domain names,
hiding address information, and using
keywords like “critical” and “urgent”
for the user to be trapped in these fake
emails. Once active, they can cause a
variety of damage to the system
EMAIL SPOOFING
Spoofing refers to the activity
of faking the identity and address of
the sender of emails. This can take
place by changing domain names,
hiding address information, and using
keywords like “critical” and “urgent”
for the user to be trapped in these fake
emails. Once active, they can cause a
variety of damage to the system
LAPTOP
TRAPDOOR
This type of
cyberattack includes using a
backdoor strategy to pass
important and unauthorized
information to outside entities
without the consent of proper
authorities. This can involve
any loopholes in the security
systems to give such
information to external agents
DENIAL-OF-SERVICE
(DOS)
This type of attack uses
irregular and excessive traffic and
redirections on a user’s webpage,
thus restricting access to the main
resources required by the user.
This is mainly caused by visiting
unauthorized websites and pages
which can flood with lots of
advertisements in a short time
frame. It has an evolved model as
well, which is known as Distributed
Denial of Service (DDoS)
This type of attack is
characterized by the
intervention of a third-party
entity between a private
network of users/nodes.
This third-party entity can
gain access to data and
network assets, and this
may lead to loss of data as
well as illegal access
MAN-IN-THE-MIDDLE (MITM)
This type of attack is
characterized by the insertion of
malicious SQL commands inside
the website backend codework.
This action leads to the website
working without the user’s
interference on its own. This can
cause major harm to the user’s
private information
SQL INJECTION
This type of attack
is caused when an outside
entity changes the script of
the website, generally
introducing malware into the
script, mostly in the java
script file. This redirects the
user to a malicious website
and causes a variety of
problems for the user
CROSS-SITE SCRIPTING (XSS)
THANK YOU

Exploring the Spectrum of Cyber Attacks .pptx

  • 1.
    CYBER SECURITY By Dr VKAVITHA Associate Professor Dept of Computer Science with Cognitive Systems Sri Ramakrishna College of Arts & Science Coimbatore
  • 2.
    CYBER SECURITY Cybersecurity isa way to protect your devices and services connected to the internet from threats. The threats are from Spammers, cybercriminals, and hackers. Cybersecurity is protection against phishing schemes, data breaches, Identity theft, and ransomware attacks.
  • 3.
    CYBER SCURITY In theera of digitalisation, where data is everything. It is a must to know that privacy is very much vulnerable. We often hear about a lot of cybercrimes these days, which has affected millions of people. Cybersecurity is not just for organizations and business. It is very much important for personal gadgets like Mobile phones, tablets, and personal computers.
  • 4.
    ROLE OF CYBER SECURITYENGINEER A cybersecurity Engineer is the one who manages and creates the hardware, security and software to protect the network. Mainly the Cybersecurity engineer merges electrical engineering and computer science in cyberspace.
  • 5.
    ETHICAL HACKING The authorized practiceof hacking is Ethical Hacking. It is done to detect vulnerabilities in the organization's infrastructure, system security, identify Data breachers and network threats. Ethical hackers basically finds the weak aspects in the network which can be attacked by the hackers.
  • 6.
    FIREWALLS Fencing your house safeguardsyour home and keeps intruders under control; likewise, firewalls are utilized to get PC protection. Firewalls are network security frameworks that restrict unapproved entrance to an organization.
  • 7.
    INFORMATION SECUTRITY Information security isa set of practices designed to carry private data secure from unauthorized access and alteration for the duration of storing or transmitting from one location to another. Information security is designed and carried out to protect the print, digital, and other private, sensitive, and private data from unauthorized persons. It can be used to secure data from being misused, acknowledgment, destruction, alteration, and disruption.
  • 8.
    Challenges to Cybersecurity WhileCybersecurity has a lot of features and advantages, it also has some challenges Cost and Time Implementing and maintaining cybersecurity systems can be − expensive and time-consuming for organizations. Complexity Cybersecurity systems can be complex to manage and maintain in − the longer run. Constant Evolution Cyber threats are constantly evolving, which require the − Cybersecurity solution to be consistently adaptive to these threats. Limited Effectiveness Despite maximum efforts, complete protection from − cyberattacks is impossible to attain.
  • 9.
    CYBERATTACK A cyberattack isan intentional attempt to access a computer system, network, or digital device without authorization to steal, alter, or destroy data. Cyberattacks can be motivated by petty theft or acts of war.
  • 10.
    TYPES OF CYBERSECURITY ATTACKS
  • 11.
    COMPUTER VIRUS A computervirus or simply a virus is a malicious program that attaches itself to a resource in the system and becomes active when that file is shared or accessed within the system. It is similar to a biological virus, which needs a host to become active and cause harm
  • 12.
    COMPUTER WORM A wormis a malware program that is slightly different from a virus in functioning. It spreads by creating copies of itself when it is accessed, and this causes an increase in memory and boot usage. The processing of the system slows down and this causes severe harm to the system
  • 13.
    TROJAN HORSE The Trojanor Trojan Horse is a malware program which is not identified by the user at first. It looks like a normal working file, but in reality, it is disguised as a resource. This is similar to the story of the Trojan horse tale of Greek Mythology, which is the basis of the name “Trojan”.
  • 14.
    COMPUTER BOMBS A computerbomb is a malware program that works like a time bomb, and it needs certain conditions in order for it to get into action. Unlike any other malware, it only activates once all conditions are met. The effects can include illegal access, deleting data, corrupting information, etc.
  • 15.
    EMAIL SPOOFING Spoofing refersto the activity of faking the identity and address of the sender of emails. This can take place by changing domain names, hiding address information, and using keywords like “critical” and “urgent” for the user to be trapped in these fake emails. Once active, they can cause a variety of damage to the system
  • 16.
    EMAIL SPOOFING Spoofing refersto the activity of faking the identity and address of the sender of emails. This can take place by changing domain names, hiding address information, and using keywords like “critical” and “urgent” for the user to be trapped in these fake emails. Once active, they can cause a variety of damage to the system
  • 17.
    LAPTOP TRAPDOOR This type of cyberattackincludes using a backdoor strategy to pass important and unauthorized information to outside entities without the consent of proper authorities. This can involve any loopholes in the security systems to give such information to external agents
  • 18.
    DENIAL-OF-SERVICE (DOS) This type ofattack uses irregular and excessive traffic and redirections on a user’s webpage, thus restricting access to the main resources required by the user. This is mainly caused by visiting unauthorized websites and pages which can flood with lots of advertisements in a short time frame. It has an evolved model as well, which is known as Distributed Denial of Service (DDoS)
  • 19.
    This type ofattack is characterized by the intervention of a third-party entity between a private network of users/nodes. This third-party entity can gain access to data and network assets, and this may lead to loss of data as well as illegal access MAN-IN-THE-MIDDLE (MITM)
  • 20.
    This type ofattack is characterized by the insertion of malicious SQL commands inside the website backend codework. This action leads to the website working without the user’s interference on its own. This can cause major harm to the user’s private information SQL INJECTION
  • 21.
    This type ofattack is caused when an outside entity changes the script of the website, generally introducing malware into the script, mostly in the java script file. This redirects the user to a malicious website and causes a variety of problems for the user CROSS-SITE SCRIPTING (XSS)
  • 22.