SlideShare a Scribd company logo
1 of 28
NAME:NAVEED REHMAN
DEPARTMENT:CYBER SECURITY
ROLL NO:21/F BSCY 43
DATE:2 SEPTEMBER,2022
CYBER
SECURITY
What is cyber secuirty?
Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks. It's also known as
information technology security or electronic
information security.
Network security
Application security
Information security
Cloud security
Cyber Security types:
Network Security
Network security consists of the policies,
processes and practices adopted to prevent,
detect and monitor unauthorized
access.Network Security involves access
control, virus and antivirus software,
application security, network analytics, types
of network-related security (endpoint, web,
wireless), firewalls, VPN encryption and more.
Application Security
Application security is the process of
developing, adding, and testing security
features within applications to prevent
security vulnerabilities against threats such
as unauthorized access and
modificationAuthentication, authorization,
encryption, logging, and application security
testing are all examples of application
security features.
Information Security
Information security refers to the processes and
methodologies which are designed and
implemented to protect print, electronic, or any
other form of confidential, private and sensitive
information or data from unauthorized
access, use, misuse, disclosure,
destruction, modification, or
disruption.
Cloud Security
Cloud security is the protection of data stored online via
cloud computing platforms from theft, leakage, and
deletion. Methods of providing cloud security include
firewalls, penetration testing, obfuscation,
tokenization, virtual private networks (VPN)
, and avoiding public internet connections.
Cloud security is a form of cybersecurity
What is Hacking?
Hacking is the act of identifying and then
exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to
personal or organizational data. Hacking is not
always a malicious activity, but the term has
mostly negative connotations due to its
association with cybercrime.
Black hat Hacker
White hat Hacker
Grey hat Hacker
Types of Hackers:
Black Hat Hacker:
Black Hat hackers are criminals who
break into computer networks with
malicious intent. They may also
release malware that destroys files,
holds computers hostage, or steals
passwords, credit card numbers, and
other personal information.
White Hat Hacker:
White hat hackers – sometimes also called
“ethical hackers” or “good hackers” – are the
antithesis of black hats. They exploit computer
systems or networks to identify their
security flaws so they
can make recommendations for i
mprovement.
Somewhere between white and black are gray hat
hackers.Gray hat hackers may sometimes violate
laws or usual ethical standards but they do not
have the malicious intent typical of a black hat
hacker.When a gray hat hacker successfully
gains illegal access to a system or
network, they may suggest to the
system administrator that they or one of
their friends be hired to fix the problem for a fee
Grey Hat Hacker:
Methods of Hacking:
Phishing
Malware-Injecting
Cracking Passwords
Bait and Switch
Fake WAP
Cookie theft
Phishing:
Phishing is a hacking technique using which a hacker
replicates the most-accessed sites and traps the
victim by sending that spoofed link. it becomes one of
the most commonly used and deadliest attack
vectors.
Once the victim tries to login or enters some data, the
hacker gets the private information of the target
victim using the trojan running on the fake site.
Malware Injecting:
Viruses or Trojans are malicious software
programs that get installed into the victim’s
system and keep sending the victim’s data to
the hacker. They can also lock your files, serve
fraud advertisement, divert traffic, sniff your
data, or spread on all the computers
connected to your network.
trojan spyware ,worms etc.
Password cracking is the process of using
an application program to identify an
unknown or forgotten password to a
computer or network resource. It can also
be used to help a threat actor obtain
unauthorized access to resources.
Cracking Passwords:
Using Bait and Switch hacking technique, an attacker
can buy advertising spaces on the websites. Later, when
a user clicks on the ad, he might get directed to a page
that’s infected with malware. This way, they can further
install malware or adware on your computer. The ads
and download links shown in this technique are very
attractive and users are expected to end up clicking on
the same.
Bait and Switch:
A hacker can use software to fake a wireless access
point. This WAP connects to the official public place
WAP. Once you get connected to the fake WAP, a
hacker can access your data..Anyone can name
their WAP as some legit name like “Heathrow Airport
WiFi” or “Starbucks WiFi” and start spying on you.
One of the best ways to protect yourself from such
attacks is by using a quality VPN
Fake Wap:
The cookies in our browser store personal data such
as browsing history, username, and passwords for
different sites we access. Once the hacker gets
access to your cookie, he can even authenticate
himself as you on a browser.Attack is easy to carry
out if the user is not using SSL (HTTPS) for the
complete session.
Cookie theft:
Any
Questions
THANKS
FOR LISTENING

More Related Content

Similar to CYBER SECUIRTY PRESENTATION.pptx

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similar to CYBER SECUIRTY PRESENTATION.pptx (20)

my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security - All Over World
Cyber Security - All Over WorldCyber Security - All Over World
Cyber Security - All Over World
 
Seminar
SeminarSeminar
Seminar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

CYBER SECUIRTY PRESENTATION.pptx

  • 1.
  • 2. NAME:NAVEED REHMAN DEPARTMENT:CYBER SECURITY ROLL NO:21/F BSCY 43 DATE:2 SEPTEMBER,2022
  • 4. What is cyber secuirty? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
  • 5. Network security Application security Information security Cloud security Cyber Security types:
  • 6. Network Security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access.Network Security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more.
  • 7. Application Security Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modificationAuthentication, authorization, encryption, logging, and application security testing are all examples of application security features.
  • 8. Information Security Information security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.
  • 9. Cloud Security Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN) , and avoiding public internet connections. Cloud security is a form of cybersecurity
  • 10. What is Hacking? Hacking is the act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data. Hacking is not always a malicious activity, but the term has mostly negative connotations due to its association with cybercrime.
  • 11. Black hat Hacker White hat Hacker Grey hat Hacker Types of Hackers:
  • 12. Black Hat Hacker: Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.
  • 13. White Hat Hacker: White hat hackers – sometimes also called “ethical hackers” or “good hackers” – are the antithesis of black hats. They exploit computer systems or networks to identify their security flaws so they can make recommendations for i mprovement.
  • 14. Somewhere between white and black are gray hat hackers.Gray hat hackers may sometimes violate laws or usual ethical standards but they do not have the malicious intent typical of a black hat hacker.When a gray hat hacker successfully gains illegal access to a system or network, they may suggest to the system administrator that they or one of their friends be hired to fix the problem for a fee Grey Hat Hacker:
  • 15. Methods of Hacking: Phishing Malware-Injecting Cracking Passwords Bait and Switch Fake WAP Cookie theft
  • 16. Phishing: Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link. it becomes one of the most commonly used and deadliest attack vectors. Once the victim tries to login or enters some data, the hacker gets the private information of the target victim using the trojan running on the fake site.
  • 17.
  • 18. Malware Injecting: Viruses or Trojans are malicious software programs that get installed into the victim’s system and keep sending the victim’s data to the hacker. They can also lock your files, serve fraud advertisement, divert traffic, sniff your data, or spread on all the computers connected to your network. trojan spyware ,worms etc.
  • 19. Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or network resource. It can also be used to help a threat actor obtain unauthorized access to resources. Cracking Passwords:
  • 20. Using Bait and Switch hacking technique, an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware. This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same. Bait and Switch:
  • 21. A hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected to the fake WAP, a hacker can access your data..Anyone can name their WAP as some legit name like “Heathrow Airport WiFi” or “Starbucks WiFi” and start spying on you. One of the best ways to protect yourself from such attacks is by using a quality VPN Fake Wap:
  • 22. The cookies in our browser store personal data such as browsing history, username, and passwords for different sites we access. Once the hacker gets access to your cookie, he can even authenticate himself as you on a browser.Attack is easy to carry out if the user is not using SSL (HTTPS) for the complete session. Cookie theft:
  • 23.
  • 24.
  • 25.
  • 26.