SlideShare a Scribd company logo
Methods of Cybersecurity
Attack
by
Group 2
Naing Dan Joshua
Puebla Elvie
Virtudazo Rose Ann
Lalaguna Zyrell
Adware (short for advertising- supported software). It is a software designed to
force pre-chosen ads to display on a system.
Also known as “trap door,” this is a hidden entry to a computing device or
software that bypasses security measures, such as logins and password
protections.
Attack  It is an action that is done on a system to get its access and extract sensitive data.
Backdoor
Bot  It is a program that automates an action so that it can be done repeatedly
at a much higher rate for a more sustained period than a human operator
could. For example, sending HTTP, FTP, or Telnet at a higher rate or
calling script to create objects at a higher rate. A botnet, also known as a
“zombie army,” is a group of computers controlled without their owners’
knowledge. Botnets are used to send spam or make denial-of-service
attacks.
Brute Force
Attack
 It is an automated and the simplest kind of method to gain
access to a system or website. It tries a different combination of
usernames and passwords over and over until it gets in.
Buffer Overflow  This is a flaw that occurs when more data is written to a block of memory or
buffer than the buffer is allocated to hold.
Clone
Phishing
− It is the modification of an existing, legitimate e-mail with a
false link to trick the recipient into providing personal
information.
Cracker S/He modifies the software to access the features
which are considered undesirable by the person
cracking the software, especially copy protection
features.
Denial-of-Service Attack
(DoS)
It is a malicious attempt to make a server or a network resource
unavailable to users usually by temporarily interrupting or suspending
the services of a host connected to the Internet or DDoS (distributed
denial-of-service attack).
Exploit Kit  It is a software system designed to run on Web servers to identify software
vulnerabilities in client machines communicating with it and exploiting discovered
vulnerabilities to upload and execute malicious code on the client.
Firewall
It is a filter designed to keep unwanted intruders outside a computer
system or network while allowing safe communication between
systems and users on the inside of the firewall.
Keystroke
Logging  This is the process of tracking the keys which are pressed on a computer (and which
touchscreen points are used). It is simply the map of a computer/human interface. It is
used by gray and black hat hackers to record login IDs and passwords. Keyloggers are
usually secreted onto a device using a Trojan delivered by a phishing e-mail.
Master Program
Logic Bomb
 time bomb It is a virus secreted into a system that triggers a malicious action
when certain conditions are met. The most common version of this is the.
Malware
 It is an umbrella term
used to refer to a variety
of forms of hostile or
intrusive software,
including computer
viruses, worms, Trojan
horses, ransomware,
spyware, adware,
scareware, and other
malicious programs.
 This is the program a black hat hacker
uses to transmit commands remotely to
infected zombie drones, normally to carry
out DoS attacks or spam attacks.
Phishing
 It is an e-mail fraud
method in which the
perpetrator sends out
legitimate-looking e-mails
in an attempt to gather
personal and financial
information from
recipients.
Phreakers
 These are considered as the original computer hackers. They are those who break into
the telephone network illegally, typically to make free long-distance phone calls or to tap
phone lines.
Rootkit
 This is a stealthy type of software, typically malicious, designed to hide the existence of certain
processes or programs from normal methods of detection and enable continued privileged access
to a computer.
Shrink Wrap
Code  This is an act of exploiting holes in unpatched or poorly configured software.
Social
Engineering
 This implies deceiving someone to acquire sensitive and personal information like credit card
details or usernames and passwords.
Spam
 It is simply an unsolicited e-mail, also known as “junk e-mail,” sent to a large number of recipients
without their consent
Internet
You
Spoofing
 It is a technique used to gain unauthorized access to computers where the intruder sends
messages to a computer with an IP address indicating that the message is coming from a
trusted host.
Spyware
 This is a software that aims to
gather information about a
person or organization without
their knowledge and may send
such information to another
entity without the consumer’s
consent, or that asserts control
over a computer without the
consumer’s knowledge.
SQL Injection
 This is an SQL code injection technique used for attacking data-driven applications, in which
malicious SQL statements are inserted into an entry field for execution (e.g., to dump the database
contents to the attacker).
Threat
 It is a possible danger that can exploit an existing bug or
vulnerability to compromise the security of a computer or
network system.
Trojan
 – (also Trojan horse) It is a malicious program disguised
to look like a valid program, making it difficult to
distinguish from programs that are supposed to be there,
which is designed to destroy files, alter information, or
steal passwords and other information.
THANK YOU!

More Related Content

What's hot

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
SHUBHA CHATURVEDI
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
Nicholas Davis
 
Internet security
Internet securityInternet security
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
Martins Chibuike Onuoha
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
why security is needed
why security is neededwhy security is needed
why security is needed
sourov_das
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
rahul kundu
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
 
DON'T BE A LOW HANGING FRUIT!
DON'T BE A LOW HANGING FRUIT!DON'T BE A LOW HANGING FRUIT!
DON'T BE A LOW HANGING FRUIT!
Jason Aptekar
 
Computer Security
Computer SecurityComputer Security
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
Venkata Sreeram
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Bharat Sabne
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
Faizan Shaikh
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
 

What's hot (20)

Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Internet security
Internet securityInternet security
Internet security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
why security is needed
why security is neededwhy security is needed
why security is needed
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
DON'T BE A LOW HANGING FRUIT!
DON'T BE A LOW HANGING FRUIT!DON'T BE A LOW HANGING FRUIT!
DON'T BE A LOW HANGING FRUIT!
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Combating cyber security through forensic investigation tools
Combating cyber security through forensic investigation toolsCombating cyber security through forensic investigation tools
Combating cyber security through forensic investigation tools
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 

Similar to Methods of Cybersecurity Attacks

Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
Ave Nawsh
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
Fariha Khudzri
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
dodontn
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
aashish2cool4u
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 
Definition
DefinitionDefinition
Definition
Maruf Hasan
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Computer Security
Computer SecurityComputer Security
Computer Security
Satyajit Das
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
Komal Mehfooz
 
computer security
computer securitycomputer security
computer security
Azhar Akhtar
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 

Similar to Methods of Cybersecurity Attacks (20)

Computer security and
Computer security andComputer security and
Computer security and
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Definition
DefinitionDefinition
Definition
 
Internet security
Internet securityInternet security
Internet security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
computer security
computer securitycomputer security
computer security
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Methods of Cybersecurity Attacks

  • 1. Methods of Cybersecurity Attack by Group 2 Naing Dan Joshua Puebla Elvie Virtudazo Rose Ann Lalaguna Zyrell
  • 2. Adware (short for advertising- supported software). It is a software designed to force pre-chosen ads to display on a system. Also known as “trap door,” this is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. Attack  It is an action that is done on a system to get its access and extract sensitive data. Backdoor Bot  It is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could. For example, sending HTTP, FTP, or Telnet at a higher rate or calling script to create objects at a higher rate. A botnet, also known as a “zombie army,” is a group of computers controlled without their owners’ knowledge. Botnets are used to send spam or make denial-of-service attacks.
  • 3. Brute Force Attack  It is an automated and the simplest kind of method to gain access to a system or website. It tries a different combination of usernames and passwords over and over until it gets in. Buffer Overflow  This is a flaw that occurs when more data is written to a block of memory or buffer than the buffer is allocated to hold. Clone Phishing − It is the modification of an existing, legitimate e-mail with a false link to trick the recipient into providing personal information. Cracker S/He modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.
  • 4. Denial-of-Service Attack (DoS) It is a malicious attempt to make a server or a network resource unavailable to users usually by temporarily interrupting or suspending the services of a host connected to the Internet or DDoS (distributed denial-of-service attack). Exploit Kit  It is a software system designed to run on Web servers to identify software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. Firewall It is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall. Keystroke Logging  This is the process of tracking the keys which are pressed on a computer (and which touchscreen points are used). It is simply the map of a computer/human interface. It is used by gray and black hat hackers to record login IDs and passwords. Keyloggers are usually secreted onto a device using a Trojan delivered by a phishing e-mail.
  • 5. Master Program Logic Bomb  time bomb It is a virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version of this is the. Malware  It is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.  This is the program a black hat hacker uses to transmit commands remotely to infected zombie drones, normally to carry out DoS attacks or spam attacks. Phishing  It is an e-mail fraud method in which the perpetrator sends out legitimate-looking e-mails in an attempt to gather personal and financial information from recipients.
  • 6. Phreakers  These are considered as the original computer hackers. They are those who break into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines. Rootkit  This is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Shrink Wrap Code  This is an act of exploiting holes in unpatched or poorly configured software. Social Engineering  This implies deceiving someone to acquire sensitive and personal information like credit card details or usernames and passwords. Spam  It is simply an unsolicited e-mail, also known as “junk e-mail,” sent to a large number of recipients without their consent
  • 7. Internet You Spoofing  It is a technique used to gain unauthorized access to computers where the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. Spyware  This is a software that aims to gather information about a person or organization without their knowledge and may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge.
  • 8. SQL Injection  This is an SQL code injection technique used for attacking data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g., to dump the database contents to the attacker). Threat  It is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system. Trojan  – (also Trojan horse) It is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there, which is designed to destroy files, alter information, or steal passwords and other information.