SlideShare a Scribd company logo
1 of 9
COMMON ATTACKS Dr. Mohammad
Adly
SOCIAL ENGINEERING
The ability of something or someone to influence the behavior of a
group of people
PHISHING
A form of social engineering
The phisher pretends to represent a legitimate outside organization
VIRUSES AND WORMS
Viruses
A program that runs and spreads by modifying other programs or files
A virus cannot start by itself; it needs to be activated
Once activated, a virus may do nothing more than replicate itself and spread
Worms
Need to attach itself to an existing program
Uses the network to send copies of itself to any connected hosts
Can run independently and spread quickly
Do not necessarily require activation or human intervention
TROJAN HORSE
A non-self replicating program that is written to appear like a
legitimate program, when in fact it is an attack tool
Relies upon its legitimate appearance to deceive the victim into
initiating the program
It may be relatively harmless or can contain code that can damage
the contents of the computer's hard drive
Trojans can also create a back door into a system allowing hackers
to gain access
DOS AND DDOS
DoS
DoS attacks are aggressive attacks on an individual computer or groups of
computers with the intent to deny services to intended users.
DoS attacks can target end user systems, servers, routers, and network links
DDoS
More sophisticated and potentially damaging form of the DoS attack
It is designed to saturate and overwhelm network links with useless data
BRUTE FORCE, SPYWARE, AND
COOKIES
Bruteforce
Fast computer is used to try to guess passwords
The attacker tries a large number of possibilities in rapid succession to gain access or
crack the code
Brute force attacks can cause a denial of service due to excessive traffic to a specific
resource or by locking out user accounts
Spyware
Any program that gathers personal information from your computer without your
permission or knowledge
This information is sent to advertisers or others on the Internet and can include
passwords and account numbers
Tracking Cookies
A form of spyware but are not always bad
They are used to record information about an Internet user when they visit websites
SPAM
A serious network threat that can overload ISPs, email servers and
individual end-user systems
A person or organization responsible for sending spam is called a
spammer
Spammers often make use of unsecured email servers to forward
email
Spammers can use hacking techniques to take control of home
computers such as
Viruses
Worms
Trojan horses
THANK YOU

More Related Content

Similar to information security common major attacks

Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
RobC76
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 

Similar to information security common major attacks (20)

Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

More from 3aw307 (6)

neww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptxneww mile new mile new mile new new.pptx
neww mile new mile new mile new new.pptx
 
Securing the port scanning is fundamentals
Securing the port scanning is fundamentalsSecuring the port scanning is fundamentals
Securing the port scanning is fundamentals
 
the Wireless networks security fundamentals
the Wireless networks security fundamentalsthe Wireless networks security fundamentals
the Wireless networks security fundamentals
 
Information security the firewalls fundamentals
Information security the firewalls fundamentalsInformation security the firewalls fundamentals
Information security the firewalls fundamentals
 
securing the virtual Lans Vlans fundamentals
securing the virtual Lans Vlans fundamentalssecuring the virtual Lans Vlans fundamentals
securing the virtual Lans Vlans fundamentals
 
the Network design Security fundimentals
the Network design Security fundimentalsthe Network design Security fundimentals
the Network design Security fundimentals
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 

information security common major attacks

  • 1. COMMON ATTACKS Dr. Mohammad Adly
  • 2. SOCIAL ENGINEERING The ability of something or someone to influence the behavior of a group of people
  • 3. PHISHING A form of social engineering The phisher pretends to represent a legitimate outside organization
  • 4. VIRUSES AND WORMS Viruses A program that runs and spreads by modifying other programs or files A virus cannot start by itself; it needs to be activated Once activated, a virus may do nothing more than replicate itself and spread Worms Need to attach itself to an existing program Uses the network to send copies of itself to any connected hosts Can run independently and spread quickly Do not necessarily require activation or human intervention
  • 5. TROJAN HORSE A non-self replicating program that is written to appear like a legitimate program, when in fact it is an attack tool Relies upon its legitimate appearance to deceive the victim into initiating the program It may be relatively harmless or can contain code that can damage the contents of the computer's hard drive Trojans can also create a back door into a system allowing hackers to gain access
  • 6. DOS AND DDOS DoS DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links DDoS More sophisticated and potentially damaging form of the DoS attack It is designed to saturate and overwhelm network links with useless data
  • 7. BRUTE FORCE, SPYWARE, AND COOKIES Bruteforce Fast computer is used to try to guess passwords The attacker tries a large number of possibilities in rapid succession to gain access or crack the code Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts Spyware Any program that gathers personal information from your computer without your permission or knowledge This information is sent to advertisers or others on the Internet and can include passwords and account numbers Tracking Cookies A form of spyware but are not always bad They are used to record information about an Internet user when they visit websites
  • 8. SPAM A serious network threat that can overload ISPs, email servers and individual end-user systems A person or organization responsible for sending spam is called a spammer Spammers often make use of unsecured email servers to forward email Spammers can use hacking techniques to take control of home computers such as Viruses Worms Trojan horses