SlideShare a Scribd company logo
Every network and system has some loop holes and weaknesses so the intruders tries to get in to
that network and hack the system. Network has so many weaknesses some of them are Operating
system weakness, configuration weakness, technology weakness.
- Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the
network or device and tries to get in to that system. There are operating systems like UNIX,
LINUX, Windows all these operating systems have some loop holes, these loop holes must be
rectified. Passwords must be very typical that they would not have a chance of guessing that one.
Every networks runs with some protocols. some of them are http, ftp, icmp. These are less
insecure so these protocols must be secured properly.
- Coming to the threats these are nothing but hackers and crackers that try to get in to that
network and change the data. There atr several trypes of threats like hackers, crackers, phisher
etc., The hackers try to get in to the network through a unauthorizes access and get the system in
his control and the cracker gets in to the network through by sending some different viruses and
gets the access over the network o0r system. Pischer in the sense they send so many mails which
is not useful to us when we open to them we might effect with the viruses and this is one type of
threat to the system.
Solution
Every network and system has some loop holes and weaknesses so the intruders tries to get in to
that network and hack the system. Network has so many weaknesses some of them are Operating
system weakness, configuration weakness, technology weakness.
- Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the
network or device and tries to get in to that system. There are operating systems like UNIX,
LINUX, Windows all these operating systems have some loop holes, these loop holes must be
rectified. Passwords must be very typical that they would not have a chance of guessing that one.
Every networks runs with some protocols. some of them are http, ftp, icmp. These are less
insecure so these protocols must be secured properly.
- Coming to the threats these are nothing but hackers and crackers that try to get in to that
network and change the data. There atr several trypes of threats like hackers, crackers, phisher
etc., The hackers try to get in to the network through a unauthorizes access and get the system in
his control and the cracker gets in to the network through by sending some different viruses and
gets the access over the network o0r system. Pischer in the sense they send so many mails which
is not useful to us when we open to them we might effect with the viruses and this is one type of
threat to the system.

More Related Content

Similar to Every network and system has some loop holes and weaknesses so the i.pdf

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rishabha Garg
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Security Conference
 
Hacking
HackingHacking
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
AmardeepKumar621436
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
Apurv Singh Gautam
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
System tThreats
System tThreatsSystem tThreats
System tThreats
Sunipa Bera
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Hacking
HackingHacking
Hacking
Paidi Dinesh
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Computer Security
Computer SecurityComputer Security
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
Pawan Patil
 
Metasploit
MetasploitMetasploit
Metasploit
Parth Sahu
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
tehkotak4
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 

Similar to Every network and system has some loop holes and weaknesses so the i.pdf (20)

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 
Hacking
HackingHacking
Hacking
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Hacking
HackingHacking
Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical Hacking Redefined
Ethical Hacking RedefinedEthical Hacking Redefined
Ethical Hacking Redefined
 
Metasploit
MetasploitMetasploit
Metasploit
 
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdfpdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
pdfcoffee.com_modul-1-intro-to-network-security-pdf-free.pdf
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 

More from htanandpalace

PV = n(total) RT n = 1.09 8.90 0.0821 298 = .pdf
                     PV = n(total) RT n = 1.09  8.90  0.0821 298 = .pdf                     PV = n(total) RT n = 1.09  8.90  0.0821 298 = .pdf
PV = n(total) RT n = 1.09 8.90 0.0821 298 = .pdf
htanandpalace
 
Looks like C is meso. Everything else looks good!.pdf
                     Looks like C is meso. Everything else looks good!.pdf                     Looks like C is meso. Everything else looks good!.pdf
Looks like C is meso. Everything else looks good!.pdf
htanandpalace
 
Mass is the amount of material in an object or ho.pdf
                     Mass is the amount of material in an object or ho.pdf                     Mass is the amount of material in an object or ho.pdf
Mass is the amount of material in an object or ho.pdf
htanandpalace
 
What precisely is huge data A report delivered to the U.S. Congress.pdf
What precisely is huge data A report delivered to the U.S. Congress.pdfWhat precisely is huge data A report delivered to the U.S. Congress.pdf
What precisely is huge data A report delivered to the U.S. Congress.pdf
htanandpalace
 
wireless communication -wireless communication is the transfer of.pdf
wireless communication -wireless communication is the transfer of.pdfwireless communication -wireless communication is the transfer of.pdf
wireless communication -wireless communication is the transfer of.pdf
htanandpalace
 
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdfTHe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
htanandpalace
 
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdfThe Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
htanandpalace
 
Supertrampsspecies in the play imprtant role in the environment, bec.pdf
Supertrampsspecies in the play imprtant role in the environment, bec.pdfSupertrampsspecies in the play imprtant role in the environment, bec.pdf
Supertrampsspecies in the play imprtant role in the environment, bec.pdf
htanandpalace
 
The act had a profound effect on corporate governance in the United .pdf
The act had a profound effect on corporate governance in the United .pdfThe act had a profound effect on corporate governance in the United .pdf
The act had a profound effect on corporate governance in the United .pdf
htanandpalace
 
Statistical DistributionsEvery statistics book provides a list.pdf
Statistical DistributionsEvery statistics book provides a list.pdfStatistical DistributionsEvery statistics book provides a list.pdf
Statistical DistributionsEvery statistics book provides a list.pdf
htanandpalace
 
second student expressed in better formhe made z independant, and .pdf
second student expressed in better formhe made z independant, and .pdfsecond student expressed in better formhe made z independant, and .pdf
second student expressed in better formhe made z independant, and .pdf
htanandpalace
 
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdfAnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
htanandpalace
 
in He2 there are total of four electrons which can be placed on both.pdf
in He2 there are total of four electrons which can be placed on both.pdfin He2 there are total of four electrons which can be placed on both.pdf
in He2 there are total of four electrons which can be placed on both.pdf
htanandpalace
 
I think that 24SolutionI think that 24.pdf
I think that 24SolutionI think that 24.pdfI think that 24SolutionI think that 24.pdf
I think that 24SolutionI think that 24.pdf
htanandpalace
 
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdfFor n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
htanandpalace
 
Egg polarity is the orientation of the egg. In developmental biology.pdf
Egg polarity is the orientation of the egg. In developmental biology.pdfEgg polarity is the orientation of the egg. In developmental biology.pdf
Egg polarity is the orientation of the egg. In developmental biology.pdf
htanandpalace
 
COOH and NH2SolutionCOOH and NH2.pdf
COOH and NH2SolutionCOOH and NH2.pdfCOOH and NH2SolutionCOOH and NH2.pdf
COOH and NH2SolutionCOOH and NH2.pdf
htanandpalace
 
confounding -- they are both caused by something else - wealth.pdf
confounding -- they are both caused by something else - wealth.pdfconfounding -- they are both caused by something else - wealth.pdf
confounding -- they are both caused by something else - wealth.pdf
htanandpalace
 
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdfa. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
htanandpalace
 
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdfa) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
htanandpalace
 

More from htanandpalace (20)

PV = n(total) RT n = 1.09 8.90 0.0821 298 = .pdf
                     PV = n(total) RT n = 1.09  8.90  0.0821 298 = .pdf                     PV = n(total) RT n = 1.09  8.90  0.0821 298 = .pdf
PV = n(total) RT n = 1.09 8.90 0.0821 298 = .pdf
 
Looks like C is meso. Everything else looks good!.pdf
                     Looks like C is meso. Everything else looks good!.pdf                     Looks like C is meso. Everything else looks good!.pdf
Looks like C is meso. Everything else looks good!.pdf
 
Mass is the amount of material in an object or ho.pdf
                     Mass is the amount of material in an object or ho.pdf                     Mass is the amount of material in an object or ho.pdf
Mass is the amount of material in an object or ho.pdf
 
What precisely is huge data A report delivered to the U.S. Congress.pdf
What precisely is huge data A report delivered to the U.S. Congress.pdfWhat precisely is huge data A report delivered to the U.S. Congress.pdf
What precisely is huge data A report delivered to the U.S. Congress.pdf
 
wireless communication -wireless communication is the transfer of.pdf
wireless communication -wireless communication is the transfer of.pdfwireless communication -wireless communication is the transfer of.pdf
wireless communication -wireless communication is the transfer of.pdf
 
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdfTHe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
THe H2O2 concentration might be low as some H2O2 may decompose by ta.pdf
 
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdfThe Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
The Differential equation isdydx +ay = alphaxe-axIF = eaxHenc.pdf
 
Supertrampsspecies in the play imprtant role in the environment, bec.pdf
Supertrampsspecies in the play imprtant role in the environment, bec.pdfSupertrampsspecies in the play imprtant role in the environment, bec.pdf
Supertrampsspecies in the play imprtant role in the environment, bec.pdf
 
The act had a profound effect on corporate governance in the United .pdf
The act had a profound effect on corporate governance in the United .pdfThe act had a profound effect on corporate governance in the United .pdf
The act had a profound effect on corporate governance in the United .pdf
 
Statistical DistributionsEvery statistics book provides a list.pdf
Statistical DistributionsEvery statistics book provides a list.pdfStatistical DistributionsEvery statistics book provides a list.pdf
Statistical DistributionsEvery statistics book provides a list.pdf
 
second student expressed in better formhe made z independant, and .pdf
second student expressed in better formhe made z independant, and .pdfsecond student expressed in better formhe made z independant, and .pdf
second student expressed in better formhe made z independant, and .pdf
 
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdfAnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
AnswerProperties area.) Enthalpy, c.) Mass, e.) DensitySolu.pdf
 
in He2 there are total of four electrons which can be placed on both.pdf
in He2 there are total of four electrons which can be placed on both.pdfin He2 there are total of four electrons which can be placed on both.pdf
in He2 there are total of four electrons which can be placed on both.pdf
 
I think that 24SolutionI think that 24.pdf
I think that 24SolutionI think that 24.pdfI think that 24SolutionI think that 24.pdf
I think that 24SolutionI think that 24.pdf
 
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdfFor n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
For n=1,2,3 ;SolutionFor n=1,2,3 ;.pdf
 
Egg polarity is the orientation of the egg. In developmental biology.pdf
Egg polarity is the orientation of the egg. In developmental biology.pdfEgg polarity is the orientation of the egg. In developmental biology.pdf
Egg polarity is the orientation of the egg. In developmental biology.pdf
 
COOH and NH2SolutionCOOH and NH2.pdf
COOH and NH2SolutionCOOH and NH2.pdfCOOH and NH2SolutionCOOH and NH2.pdf
COOH and NH2SolutionCOOH and NH2.pdf
 
confounding -- they are both caused by something else - wealth.pdf
confounding -- they are both caused by something else - wealth.pdfconfounding -- they are both caused by something else - wealth.pdf
confounding -- they are both caused by something else - wealth.pdf
 
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdfa. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
a. Journal entry fro revaluation of assetb. Journal entry for admi.pdf
 
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdfa) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
a) 2n-1 =12-1=11it was turners syndrome so the person has one sex .pdf
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Every network and system has some loop holes and weaknesses so the i.pdf

  • 1. Every network and system has some loop holes and weaknesses so the intruders tries to get in to that network and hack the system. Network has so many weaknesses some of them are Operating system weakness, configuration weakness, technology weakness. - Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the network or device and tries to get in to that system. There are operating systems like UNIX, LINUX, Windows all these operating systems have some loop holes, these loop holes must be rectified. Passwords must be very typical that they would not have a chance of guessing that one. Every networks runs with some protocols. some of them are http, ftp, icmp. These are less insecure so these protocols must be secured properly. - Coming to the threats these are nothing but hackers and crackers that try to get in to that network and change the data. There atr several trypes of threats like hackers, crackers, phisher etc., The hackers try to get in to the network through a unauthorizes access and get the system in his control and the cracker gets in to the network through by sending some different viruses and gets the access over the network o0r system. Pischer in the sense they send so many mails which is not useful to us when we open to them we might effect with the viruses and this is one type of threat to the system. Solution Every network and system has some loop holes and weaknesses so the intruders tries to get in to that network and hack the system. Network has so many weaknesses some of them are Operating system weakness, configuration weakness, technology weakness. - Coming to the vulnerabilities factors the intrudors or hacklers tries to find the weak spot in the network or device and tries to get in to that system. There are operating systems like UNIX, LINUX, Windows all these operating systems have some loop holes, these loop holes must be rectified. Passwords must be very typical that they would not have a chance of guessing that one. Every networks runs with some protocols. some of them are http, ftp, icmp. These are less insecure so these protocols must be secured properly. - Coming to the threats these are nothing but hackers and crackers that try to get in to that network and change the data. There atr several trypes of threats like hackers, crackers, phisher etc., The hackers try to get in to the network through a unauthorizes access and get the system in his control and the cracker gets in to the network through by sending some different viruses and gets the access over the network o0r system. Pischer in the sense they send so many mails which is not useful to us when we open to them we might effect with the viruses and this is one type of threat to the system.