2. Following Information WE Should
Know
1. What is Cyber security?
2. Types of Cyber Attacks..
3. Web Based Attacks ….
4. System Based Attacks….
3. Cyber Security
•Cyber security is a practice which intends to protect
computers, networks, programs and data from
unintended or unauthorized access, change or
destruction …
4. What is cyberAttack ?
•An attempt by hackers to damage or
destroy a computer network or system.
5. Types of Attack !
• Web Based Attack:
These are attack on a website or web
application…
• System Based Attack:
Attacks that are intended to compromise a
computer or a computer network…
6. Web BasedAttack
• DoS
• dDoS
• Brute Force
• Session Hijacking
• Man in Middle
• sQl Injection
• Phishing
• Sniffing
• Spoofing
• Social engineering
• Whaling
8. Web Based Attack
Dos Attack: A DOS attack is an attempt to make a system or server unavailable for legitimate users and
finally, to take the service down.
SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications, in which
anonymously statements are inserted into an entry field for execution.
Brute Force: A Brute Force Attack is the simplest method to gain access to a site or server. It tries various
combinations of usernames and passwords again and again until it gets in.
MIMA: MIMA-Attacker intercept the connection between client and server and acts as a bridge between
them.
Snipping Attack: Sniffer Attack- A sniffer is an application or device that can read, monitor, and capture
network data exchanges and read network packets.
Phishing Attack: Phishing- is the attempt to obtain sensitive information by disguising as a trustworthy
entity in an electronic communication.
Social engineering: Social engineering is a form of techniques employed by cybercriminals designed
to lure unsuspecting users into sending them their confidential data, infecting their computers with
malware or opening links to infected sites.
WHALING: A whaling attack is a kind of phishing scam and CEO fraud that targets high profile executives with
access to highly valuable information.
9. System Based Attack
VIRUS: A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to
replicate itself.
WORMS: A computer worm is a standalone Malware computer program that replicates itself in order to spread
other computers
TROJAN HORSE: Trojan horse is a program that claims to rid your computer of viruses but instead introduces
viruses onto your computer.
BACKDOOR: A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a
computer or its data.
BOTNET: A botnet is a group of computers connected in a coordinated fashion for malicious purposes.