SlideShare a Scribd company logo
1 of 19
Different types of attack
What is SQL injection?
 The ability to inject SQL commands into the database engine through an existing
application
SQL INJECTION
 Many web applications take user input from a form
 Often this user input is used literally in the construction of a SQL query submitted to a
database. For example:
SELECT product data FROM table WHERE product name = ‘user input product name’;
 A SQL injection attack involves placing SQL statements in the user input
HOW DOES SQL INJECTION WORK?
 Common vulnerable login query
SELECT * FROM users
WHERE login = 'victor'
AND password = '123'
(If it returns something then login)
 ASP/MS SQL Server login syntax
var sql = "SELECT * FROM users
WHERE login = '" + formusr +
"' AND password = '" + formpwd + "'";
OTHER INJECTION POSSIBILITIES
Using SQL injections, attackers can:
 Add new data to the database
 Perform an INSERT in the injected SQL
 Modify data currently in the database
 Perform an UPDATE in the injected SQL
 Often can gain access to other user's system
 capabilities by obtaining their password
MALICIOUS SOFTWARE
“A Malware is the set of instructions that run on your computer and make system do
something that an attacker wants it to do”
TYPES OF MALICIOUS SOFTWARE
 Virus
 Trojan Horse
 Worm
 Spyware
 Cookie
 Bots
COMPUTER VIRUS
Computer viruses are small software programs that are designed to spread from one
computer to another and to interfere with computer operation.
WORM
It is one of the most dangerous malicious program. It has the capability to spread, without
any human action.
HOW WORM SPREAD?
Differences Computer Viruses Computer Worms
Definition The virus is the program code that
attaches itself to application
program and when application
program run it runs along with it
The worm is code that replicate itself in
order to consume resources to bring it
down.
How does it infect a
computer
It inserts itself into a file or executable
program
It exploits a weakness in an application
or
operating system by replicating itself.
How can it
spread?
It has to rely on users transferring
infected files/programs to other
computer systems
It has to rely on users transferring
infected files/programs to other
computer systems
Does it
infect
files?
Yes, it deletes or modifies files.
Sometimes a virus also changes
the location of files.
Usually not. Worms usually only
monopolize the CPU and memory.
Whose speed is more? virus is slower than worm worm is faster than virus. E.g.The code
red worm affected 3 lack PCs in just 14
Hrs.
TROJAN
Trojan is a malicious software, which at first glance will appear to be the useful software but
will actually damage once installed or run on your computer
IMPACTS OF TROJAN
Trojan performs the following actions :
 Deleting data
 Active silly icons and change desktop
 Modifying data
 Copying data
 Disrupting the performance of computers
 Create backdoor
WHAT IS MITM ?
A man-in-the-middle (MITM) attack is a form of eavesdropping where communication
between two users is monitored and modified by an unauthorized party. Generally, the
attacker actively eavesdrops by intercepting a public key message exchange and
retransmits the message while replacing the requested key with his own.
MITM ATTACK IS ALSO KNOWN AS
 Bucket-brigade attack
 Fire brigade attack
 Monkey-in-the-middle attack
 Session hijacking
 TCP hijacking
 TCP session hijacking
NAME ORIGIN
The name "Man-in-the-Middle" is derived from the basketball scenario where two players
intend to pass a ball to each other while one player between them tries to seize it. MITM
attacks are sometimes referred to as "bucket brigade attacks“ or "fire brigade attacks."
Those names are derived from the fire brigade operation of dousing off the fire by passing
buckets from one person to another between the water source and the fire.
HOW DOES IT WORK?
Man in the middle is known most to others as "session hijacking" and to general public as
"hijacking". These hackers are primarily targeting specific data about the transactions on
computers. This can be anything from an email to a bank transaction that said the hackers
begin their investigation of the party of interest
HOW TO PREVENT FROM THIS ATTACK?
 Maintain proper coding pattern
 Don’t use third party software
 Use anti virus
 Don’t use public wife network
 All always update your operating system

More Related Content

What's hot

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threatsRemo Software
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
 

What's hot (19)

Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Computer vrise
Computer vriseComputer vrise
Computer vrise
 
Malwares
MalwaresMalwares
Malwares
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Malware
MalwareMalware
Malware
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Case study
Case studyCase study
Case study
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Data loss causes and its threats
Data loss causes and its threatsData loss causes and its threats
Data loss causes and its threats
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Virus
VirusVirus
Virus
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 

Similar to Different type of attack on computer

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Software security
Software securitySoftware security
Software securityjes_d
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
Visual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdfVisual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdfanandshingavi23
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...ijcsity
 

Similar to Different type of attack on computer (20)

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Software security
Software securitySoftware security
Software security
 
Network security
Network securityNetwork security
Network security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Cyber security
Cyber security Cyber security
Cyber security
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Visual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdfVisual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
International Journal of Computational Science and Information Technology (I...
 International Journal of Computational Science and Information Technology (I... International Journal of Computational Science and Information Technology (I...
International Journal of Computational Science and Information Technology (I...
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 

More from Safayet Hossain

Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentSafayet Hossain
 
Find Transitive closure of a Graph Using Warshall's Algorithm
Find Transitive closure of a Graph Using Warshall's AlgorithmFind Transitive closure of a Graph Using Warshall's Algorithm
Find Transitive closure of a Graph Using Warshall's AlgorithmSafayet Hossain
 
Color Guided Thermal image Super Resolution
Color Guided Thermal image Super ResolutionColor Guided Thermal image Super Resolution
Color Guided Thermal image Super ResolutionSafayet Hossain
 
Region based image segmentation
Region based image segmentationRegion based image segmentation
Region based image segmentationSafayet Hossain
 
Anti- aliasing computer graphics
Anti- aliasing computer graphicsAnti- aliasing computer graphics
Anti- aliasing computer graphicsSafayet Hossain
 
detect emotion from text
detect emotion from textdetect emotion from text
detect emotion from textSafayet Hossain
 
Remittance Management System
Remittance Management System Remittance Management System
Remittance Management System Safayet Hossain
 

More from Safayet Hossain (13)

Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud Environment
 
Epipolar geometry
Epipolar geometryEpipolar geometry
Epipolar geometry
 
Find Transitive closure of a Graph Using Warshall's Algorithm
Find Transitive closure of a Graph Using Warshall's AlgorithmFind Transitive closure of a Graph Using Warshall's Algorithm
Find Transitive closure of a Graph Using Warshall's Algorithm
 
Color Guided Thermal image Super Resolution
Color Guided Thermal image Super ResolutionColor Guided Thermal image Super Resolution
Color Guided Thermal image Super Resolution
 
Region based image segmentation
Region based image segmentationRegion based image segmentation
Region based image segmentation
 
Anti- aliasing computer graphics
Anti- aliasing computer graphicsAnti- aliasing computer graphics
Anti- aliasing computer graphics
 
detect emotion from text
detect emotion from textdetect emotion from text
detect emotion from text
 
Vector computing
Vector computingVector computing
Vector computing
 
Grid computing
Grid computing Grid computing
Grid computing
 
Green computing
Green computing Green computing
Green computing
 
E waste...
E   waste...E   waste...
E waste...
 
Economic presentation
Economic presentationEconomic presentation
Economic presentation
 
Remittance Management System
Remittance Management System Remittance Management System
Remittance Management System
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Recently uploaded (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Different type of attack on computer

  • 2. What is SQL injection?  The ability to inject SQL commands into the database engine through an existing application
  • 3. SQL INJECTION  Many web applications take user input from a form  Often this user input is used literally in the construction of a SQL query submitted to a database. For example: SELECT product data FROM table WHERE product name = ‘user input product name’;  A SQL injection attack involves placing SQL statements in the user input
  • 4. HOW DOES SQL INJECTION WORK?  Common vulnerable login query SELECT * FROM users WHERE login = 'victor' AND password = '123' (If it returns something then login)  ASP/MS SQL Server login syntax var sql = "SELECT * FROM users WHERE login = '" + formusr + "' AND password = '" + formpwd + "'";
  • 5.
  • 6. OTHER INJECTION POSSIBILITIES Using SQL injections, attackers can:  Add new data to the database  Perform an INSERT in the injected SQL  Modify data currently in the database  Perform an UPDATE in the injected SQL  Often can gain access to other user's system  capabilities by obtaining their password
  • 7. MALICIOUS SOFTWARE “A Malware is the set of instructions that run on your computer and make system do something that an attacker wants it to do”
  • 8. TYPES OF MALICIOUS SOFTWARE  Virus  Trojan Horse  Worm  Spyware  Cookie  Bots
  • 9. COMPUTER VIRUS Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 10. WORM It is one of the most dangerous malicious program. It has the capability to spread, without any human action.
  • 12. Differences Computer Viruses Computer Worms Definition The virus is the program code that attaches itself to application program and when application program run it runs along with it The worm is code that replicate itself in order to consume resources to bring it down. How does it infect a computer It inserts itself into a file or executable program It exploits a weakness in an application or operating system by replicating itself. How can it spread? It has to rely on users transferring infected files/programs to other computer systems It has to rely on users transferring infected files/programs to other computer systems Does it infect files? Yes, it deletes or modifies files. Sometimes a virus also changes the location of files. Usually not. Worms usually only monopolize the CPU and memory. Whose speed is more? virus is slower than worm worm is faster than virus. E.g.The code red worm affected 3 lack PCs in just 14 Hrs.
  • 13. TROJAN Trojan is a malicious software, which at first glance will appear to be the useful software but will actually damage once installed or run on your computer
  • 14. IMPACTS OF TROJAN Trojan performs the following actions :  Deleting data  Active silly icons and change desktop  Modifying data  Copying data  Disrupting the performance of computers  Create backdoor
  • 15. WHAT IS MITM ? A man-in-the-middle (MITM) attack is a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. Generally, the attacker actively eavesdrops by intercepting a public key message exchange and retransmits the message while replacing the requested key with his own.
  • 16. MITM ATTACK IS ALSO KNOWN AS  Bucket-brigade attack  Fire brigade attack  Monkey-in-the-middle attack  Session hijacking  TCP hijacking  TCP session hijacking
  • 17. NAME ORIGIN The name "Man-in-the-Middle" is derived from the basketball scenario where two players intend to pass a ball to each other while one player between them tries to seize it. MITM attacks are sometimes referred to as "bucket brigade attacks“ or "fire brigade attacks." Those names are derived from the fire brigade operation of dousing off the fire by passing buckets from one person to another between the water source and the fire.
  • 18. HOW DOES IT WORK? Man in the middle is known most to others as "session hijacking" and to general public as "hijacking". These hackers are primarily targeting specific data about the transactions on computers. This can be anything from an email to a bank transaction that said the hackers begin their investigation of the party of interest
  • 19. HOW TO PREVENT FROM THIS ATTACK?  Maintain proper coding pattern  Don’t use third party software  Use anti virus  Don’t use public wife network  All always update your operating system