SlideShare a Scribd company logo
1 of 1
Download to read offline
Attack vector is a path that a hacker can easily come in tyo our website or system to do his
unnecessary functions. It will sort out the weak entries and try to come through it. There will be
many ways,
For example when we come to real incidents happening it mainly comes by unwanted links and
emails etc., with extra graphical images and everything. better avoiding all these to keep our
system safe. There are many types of attacks that are existed like cookie poisoning attack, file
corrupting, Html tag attack etc., These all enter into it to corrupt the sensitive information present
in your pc. The vulnerabilities that comes by keeping some vulnerable code that is implanted in
your actual code to attack on some other. There will be many victims are there to in the form of
links to attack.
Solution
Attack vector is a path that a hacker can easily come in tyo our website or system to do his
unnecessary functions. It will sort out the weak entries and try to come through it. There will be
many ways,
For example when we come to real incidents happening it mainly comes by unwanted links and
emails etc., with extra graphical images and everything. better avoiding all these to keep our
system safe. There are many types of attacks that are existed like cookie poisoning attack, file
corrupting, Html tag attack etc., These all enter into it to corrupt the sensitive information present
in your pc. The vulnerabilities that comes by keeping some vulnerable code that is implanted in
your actual code to attack on some other. There will be many victims are there to in the form of
links to attack.

More Related Content

Similar to Attack vector is a path that a hacker can easily come in tyo our web.pdf

Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
PavanKumarSurala
 
Explain various ways computers are being used as tools to commit cri.pdf
Explain various ways computers are being used as tools to commit cri.pdfExplain various ways computers are being used as tools to commit cri.pdf
Explain various ways computers are being used as tools to commit cri.pdf
fsenterprises
 

Similar to Attack vector is a path that a hacker can easily come in tyo our web.pdf (20)

Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Explain various ways computers are being used as tools to commit cri.pdf
Explain various ways computers are being used as tools to commit cri.pdfExplain various ways computers are being used as tools to commit cri.pdf
Explain various ways computers are being used as tools to commit cri.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Aiman
AimanAiman
Aiman
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Software security
Software securitySoftware security
Software security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security threats
Security threatsSecurity threats
Security threats
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Network security
Network securityNetwork security
Network security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 

More from aquazac

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdf
aquazac
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
aquazac
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdf
aquazac
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
aquazac
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
aquazac
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdf
aquazac
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdf
aquazac
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdf
aquazac
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
aquazac
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdf
aquazac
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
aquazac
 

More from aquazac (20)

Answer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdfAnswer Every investor expects dividend from his investments.Dividen.pdf
Answer Every investor expects dividend from his investments.Dividen.pdf
 
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdfAns. Gene is defined as the segment of DNA that gives a functional p.pdf
Ans. Gene is defined as the segment of DNA that gives a functional p.pdf
 
additional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdfadditional optmization techniques for underlying IP network must1.pdf
additional optmization techniques for underlying IP network must1.pdf
 
According to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdfAccording to the given equation, aqueous carbon dioxide reacts with .pdf
According to the given equation, aqueous carbon dioxide reacts with .pdf
 
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdfa) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
a) mean = 1.43Thus distribution is Poisson(4.2)P(X = 4) = 4.2^4.pdf
 
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
2.a. Wired Media Type and ExplinationTwisted-Pair CableTwiste.pdf
 
A person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdfA person may not choose to participate in the labour force due to La.pdf
A person may not choose to participate in the labour force due to La.pdf
 
Well.. 1) Ionic bonds are almost always metal to .pdf
                     Well.. 1) Ionic bonds are almost always metal to .pdf                     Well.. 1) Ionic bonds are almost always metal to .pdf
Well.. 1) Ionic bonds are almost always metal to .pdf
 
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
1. The answer is d) Environmental EffectsEnvironmental effects ca.pdf
 
clear clc close all Use polyfit to solve for the phase l.pdf
 clear clc close all Use polyfit to solve for the phase l.pdf clear clc close all Use polyfit to solve for the phase l.pdf
clear clc close all Use polyfit to solve for the phase l.pdf
 
The oxygen appears in both step reactions. But, i.pdf
                     The oxygen appears in both step reactions. But, i.pdf                     The oxygen appears in both step reactions. But, i.pdf
The oxygen appears in both step reactions. But, i.pdf
 
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
  PART A The element Si belongs to IVA group. Therefore, four electro.pdf  PART A The element Si belongs to IVA group. Therefore, four electro.pdf
PART A The element Si belongs to IVA group. Therefore, four electro.pdf
 
The two contributions to the cohesive energy of t.pdf
                     The two contributions to the cohesive energy of t.pdf                     The two contributions to the cohesive energy of t.pdf
The two contributions to the cohesive energy of t.pdf
 
If you are talking about an extraction design, th.pdf
                     If you are talking about an extraction design, th.pdf                     If you are talking about an extraction design, th.pdf
If you are talking about an extraction design, th.pdf
 
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdfYes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
Yes ,its true. Though both gibbons and rhesus monkeys belong to pr.pdf
 
When something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdfWhen something boils, it changes states of matter. It would go from .pdf
When something boils, it changes states of matter. It would go from .pdf
 
We need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdfWe need to discuss why there is an importance of adding residents to.pdf
We need to discuss why there is an importance of adding residents to.pdf
 
What is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdfWhat is the largest decimal integer that can be represented with the.pdf
What is the largest decimal integer that can be represented with the.pdf
 
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdfThrowing.javaimport java.util.InputMismatchException; import jav.pdf
Throwing.javaimport java.util.InputMismatchException; import jav.pdf
 
This electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdfThis electron transport is accompanied by the protons transfer into .pdf
This electron transport is accompanied by the protons transfer into .pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 

Attack vector is a path that a hacker can easily come in tyo our web.pdf

  • 1. Attack vector is a path that a hacker can easily come in tyo our website or system to do his unnecessary functions. It will sort out the weak entries and try to come through it. There will be many ways, For example when we come to real incidents happening it mainly comes by unwanted links and emails etc., with extra graphical images and everything. better avoiding all these to keep our system safe. There are many types of attacks that are existed like cookie poisoning attack, file corrupting, Html tag attack etc., These all enter into it to corrupt the sensitive information present in your pc. The vulnerabilities that comes by keeping some vulnerable code that is implanted in your actual code to attack on some other. There will be many victims are there to in the form of links to attack. Solution Attack vector is a path that a hacker can easily come in tyo our website or system to do his unnecessary functions. It will sort out the weak entries and try to come through it. There will be many ways, For example when we come to real incidents happening it mainly comes by unwanted links and emails etc., with extra graphical images and everything. better avoiding all these to keep our system safe. There are many types of attacks that are existed like cookie poisoning attack, file corrupting, Html tag attack etc., These all enter into it to corrupt the sensitive information present in your pc. The vulnerabilities that comes by keeping some vulnerable code that is implanted in your actual code to attack on some other. There will be many victims are there to in the form of links to attack.