Cyberattacksbrown1
Upcoming SlideShare
Loading in...5
×
 

Cyberattacksbrown1

on

  • 673 views

 

Statistics

Views

Total Views
673
Views on SlideShare
673
Embed Views
0

Actions

Likes
0
Downloads
58
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyberattacksbrown1 Cyberattacksbrown1 Presentation Transcript

  • CYBER ATTACKS By Sangam Lamsal College for Professional Studies
    • Introduction
    • Types of attack
    • Attacks in an organization
    • Conclusion
    • References
    10/29/11
    • Internet based conflict
    • Hitting information and communication system
    • Motives for sabotage and espionage
    • War not in the ocean, land, air and space
    • Knows no boundary
    10/29/11
  • TYPES OF ATTACK
    • Hacking of computer systems and networks
    • Illicit Media
    • Financial crimes
    10/29/11
  • TYPES OF ATTACKS
    • Online Gambling
    • Intellectual property
    • Harassments
    • Launching of virus, worms and Trojans
    10/29/11
  • TYPES OF ATTACKS
    • Denial-of-service attacks
    • Cyber terrorism
    • Economic espionage
    • Sale of illegal articles
    10/29/11
  • ATTACKS IN AN ORGANIZATION
    • E-mail abuse
    • Spam mails
    • Cyber defamation
    • Theft of source code
    10/29/11
  • ATTACKS IN AN ORGANIZATION
    • Insider attacks on personal database
    • Use of office computer for running other business
    • Information espionage
    10/29/11
    • Awareness
    • Anti-Virus (updated)
    • FW (configuration)
    • Intruder Detection Systems
    • Proper Encryption
    • Control & Inspection
    10/29/11
    • Attack similar to conventional attack
    • Effective appraisal to deter
    • If attacked- huge loss for an organization
    10/29/11
    • Sikkim Manipal University, Dr. Padma.2008 . Managing Information, Attacks on Information, Retrieved 30 September 2011.
    • Business insurance.(nd). Cyber attack types ,Retrieved30September2011. http://www.businessinsurance.com/apps/pbcs.dll/article?AID=/20110102/ISSUE01/301029963
    10/29/11
    • Thank You
    10/29/11