SlideShare a Scribd company logo
1 of 10
Download to read offline
@infosectrain #
l
e
a
r
n
t
o
r
i
s
e
ATTACK AND ITS TYPES
PASSWORD
Hey Jerry, you know,
the world of cybersecurity can be
pretty fascinating and also a bit scary.
Have you ever wondered how hackers try
to crack passwords and gain unauthorized
access to accounts?
Definitely, Tom! It's quite concerning
how passwords can be vulnerable
to attacks. I've heard there are
different types of password attacks.
Do you know what they are?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Absolutely, Jerry! One common type is a
brute force attack, where hackers try
all possible password combinations
until they find the correct one. It can be
time-consuming but can work if the
password is weak or short.
That sounds time-consuming,
indeed. Are there any quicker
methods?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Indeed! There are dictionary attacks.
Hackers try common passwords or words
against an account, exploiting people's
tendency to use easily guessable
passwords. That is why one must always
choose strong, unique passwords to
stay secure!
Oh, I see. So, what if the password
isn't easily guessable?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Well, hackers sometimes use a technique
called a "rainbow table attack." They have a
precomputed table of password hashes
generated from many possible plaintext
passwords. These tables are created in
advance and can be quite extensive, covering
a wide range of possible passwords.
That's clever! But what if the
hacker doesn't have a precomputed
table?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
In that case, attackers resort to credential
stuffing attacks. They use lists of
usernames and passwords obtained from
previous data breaches and try those
credentials on other online accounts,
exploiting the fact that people often reuse
passwords across different platforms.
That's alarming. Are there any
other methods?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
Absolutely, Jerry! Keylogging and
shoulder surfing. Hackers can secretly
record keystrokes, including passwords,
or visually spy on people entering
their passwords.
Wow, those methods are sneaky!
Is there anything else we should be
aware of?
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
There's one more technique to mention
social engineering attacks. Hackers trick
people into sharing passwords through
deception and manipulation, posing as
tech support or using elaborate schemes.
That's quite scary. We need to be more
cautious with our passwords and take
steps to protect ourselves.
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
TIPS FOR
PASSWORD SECURITY
Set Strong Passwords
Use Unique Passwords
Enable Multi-Factor Authentication (MFA)
Utilize Password Managers
Regularly Change Passwords
Educate Users
Encrypt Passwords
Account Lockout Policies
Use HTTPs
Regular Security Updates
@infosectrain
www.infosectrain.com
#
l
e
a
r
n
t
o
r
i
s
e
FOUND THIS USEFUL?
Get More Insights Through Our FREE
Courses | Workshops | eBooks | Checklists | Mock Tests
LIKE SHARE FOLLOW

More Related Content

Similar to Password Attack and its Types-1.pdf

Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
Cikgu Syam
 

Similar to Password Attack and its Types-1.pdf (20)

Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)
 
security.pptx
security.pptxsecurity.pptx
security.pptx
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Hacking
HackingHacking
Hacking
 
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
Hack and Crack Slide
Hack and Crack SlideHack and Crack Slide
Hack and Crack Slide
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Hacking
HackingHacking
Hacking
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
No plagiarism very importantNeed responses to my teamates discus.docx
No plagiarism very importantNeed responses to my teamates discus.docxNo plagiarism very importantNeed responses to my teamates discus.docx
No plagiarism very importantNeed responses to my teamates discus.docx
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Hacking
HackingHacking
Hacking
 

More from Infosec train

More from Infosec train (20)

𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐄𝐦𝐚𝐢𝐥 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐃𝐊𝐈𝐌, 𝐒𝐏𝐅, 𝐃𝐌𝐀𝐑𝐂
𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐄𝐦𝐚𝐢𝐥 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐃𝐊𝐈𝐌, 𝐒𝐏𝐅, 𝐃𝐌𝐀𝐑𝐂𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐄𝐦𝐚𝐢𝐥 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐃𝐊𝐈𝐌, 𝐒𝐏𝐅, 𝐃𝐌𝐀𝐑𝐂
𝐄𝐥𝐞𝐯𝐚𝐭𝐞 𝐄𝐦𝐚𝐢𝐥 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐃𝐊𝐈𝐌, 𝐒𝐏𝐅, 𝐃𝐌𝐀𝐑𝐂
 
𝐓𝐨𝐩 𝟓 𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐋𝐚𝐰𝐬
𝐓𝐨𝐩 𝟓 𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐋𝐚𝐰𝐬𝐓𝐨𝐩 𝟓 𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐋𝐚𝐰𝐬
𝐓𝐨𝐩 𝟓 𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐋𝐚𝐰𝐬
 
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
𝐇𝐨𝐰 𝐭𝐨 𝐁𝐞𝐜𝐨𝐦𝐞 𝐚𝐧 𝐈𝐓 𝐀𝐮𝐝𝐢𝐭𝐨𝐫: 𝐀 𝐒𝐭𝐞𝐩-𝐛𝐲-𝐒𝐭𝐞𝐩 𝐆𝐮𝐢𝐝𝐞
 
𝐔𝐧𝐥𝐨𝐜𝐤 𝐭𝐡𝐞 𝐒𝐞𝐜𝐫𝐞𝐭𝐬 𝐭𝐨 𝐎𝐧𝐥𝐢𝐧𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐀 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐀𝐜𝐜𝐨𝐮𝐧𝐭 𝐓𝐚𝐤𝐞𝐨𝐯𝐞𝐫𝐬
𝐔𝐧𝐥𝐨𝐜𝐤 𝐭𝐡𝐞 𝐒𝐞𝐜𝐫𝐞𝐭𝐬 𝐭𝐨 𝐎𝐧𝐥𝐢𝐧𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐀 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐀𝐜𝐜𝐨𝐮𝐧𝐭 𝐓𝐚𝐤𝐞𝐨𝐯𝐞𝐫𝐬𝐔𝐧𝐥𝐨𝐜𝐤 𝐭𝐡𝐞 𝐒𝐞𝐜𝐫𝐞𝐭𝐬 𝐭𝐨 𝐎𝐧𝐥𝐢𝐧𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐀 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐀𝐜𝐜𝐨𝐮𝐧𝐭 𝐓𝐚𝐤𝐞𝐨𝐯𝐞𝐫𝐬
𝐔𝐧𝐥𝐨𝐜𝐤 𝐭𝐡𝐞 𝐒𝐞𝐜𝐫𝐞𝐭𝐬 𝐭𝐨 𝐎𝐧𝐥𝐢𝐧𝐞 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲: 𝐀 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐆𝐮𝐢𝐝𝐞 𝐭𝐨 𝐀𝐜𝐜𝐨𝐮𝐧𝐭 𝐓𝐚𝐤𝐞𝐨𝐯𝐞𝐫𝐬
 
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐀𝐠𝐚𝐢𝐧𝐬𝐭 𝐈𝐭 𝐛𝐲 𝐭𝐡𝐢𝐬 𝐑𝐞𝐥𝐚𝐭𝐞𝐝
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐀𝐠𝐚𝐢𝐧𝐬𝐭 𝐈𝐭 𝐛𝐲 𝐭𝐡𝐢𝐬 𝐑𝐞𝐥𝐚𝐭𝐞𝐝𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐀𝐠𝐚𝐢𝐧𝐬𝐭 𝐈𝐭 𝐛𝐲 𝐭𝐡𝐢𝐬 𝐑𝐞𝐥𝐚𝐭𝐞𝐝
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐑𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐚𝐧𝐝 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐀𝐠𝐚𝐢𝐧𝐬𝐭 𝐈𝐭 𝐛𝐲 𝐭𝐡𝐢𝐬 𝐑𝐞𝐥𝐚𝐭𝐞𝐝
 
𝐀𝐳𝐮𝐫𝐞 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐨𝐫 & 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞 | (𝐀𝐙-𝟏𝟎𝟒 + 𝐀𝐙-𝟓𝟎𝟎) 𝐂𝐨𝐦...
𝐀𝐳𝐮𝐫𝐞 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐨𝐫 & 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞 | (𝐀𝐙-𝟏𝟎𝟒 + 𝐀𝐙-𝟓𝟎𝟎) 𝐂𝐨𝐦...𝐀𝐳𝐮𝐫𝐞 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐨𝐫 & 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞 | (𝐀𝐙-𝟏𝟎𝟒 + 𝐀𝐙-𝟓𝟎𝟎) 𝐂𝐨𝐦...
𝐀𝐳𝐮𝐫𝐞 𝐀𝐝𝐦𝐢𝐧𝐢𝐬𝐭𝐫𝐚𝐭𝐨𝐫 & 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞 | (𝐀𝐙-𝟏𝟎𝟒 + 𝐀𝐙-𝟓𝟎𝟎) 𝐂𝐨𝐦...
 
𝐒𝐎𝐂 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞!
𝐒𝐎𝐂 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞!𝐒𝐎𝐂 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞!
𝐒𝐎𝐂 𝐒𝐩𝐞𝐜𝐢𝐚𝐥𝐢𝐬𝐭 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐂𝐨𝐮𝐫𝐬𝐞!
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠"
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠"𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠"
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠"
 
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdfThreat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
Threat_Intelligence_vs_Threat_Assessment_vs_Threat_Modeling_1.pdf
 
Threat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategyThreat hunting is a proactive cybersecurity strategy
Threat hunting is a proactive cybersecurity strategy
 
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...A Trojan virus is a type of malware that disguises itself as a legitimate fil...
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
 
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats."Viruses at Bay" depicts a powerful scene of defense against unseen threats.
"Viruses at Bay" depicts a powerful scene of defense against unseen threats.
 
Cybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffffCybersecurity Resolutions 2024.pdfffffff
Cybersecurity Resolutions 2024.pdfffffff
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠" !
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠" !𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠" !
𝐃𝐚𝐭𝐚 𝐏𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧 𝐎𝐟𝐟𝐢𝐜𝐞𝐫 (𝐃𝐏𝐎) 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠" !
 
Join us this May for a series of FREEevents
Join us this May for a series of FREEeventsJoin us this May for a series of FREEevents
Join us this May for a series of FREEevents
 
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
 
𝐃𝐚𝐭𝐚 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐒𝐪𝐮𝐚𝐝: 𝐓𝐨𝐨𝐥𝐬 𝐟𝐨𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲
𝐃𝐚𝐭𝐚 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐒𝐪𝐮𝐚𝐝: 𝐓𝐨𝐨𝐥𝐬 𝐟𝐨𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲𝐃𝐚𝐭𝐚 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐒𝐪𝐮𝐚𝐝: 𝐓𝐨𝐨𝐥𝐬 𝐟𝐨𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲
𝐃𝐚𝐭𝐚 𝐃𝐞𝐟𝐞𝐧𝐬𝐞 𝐒𝐪𝐮𝐚𝐝: 𝐓𝐨𝐨𝐥𝐬 𝐟𝐨𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲
 
𝐂𝐈𝐏𝐓 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐈𝐏𝐓 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!𝐂𝐈𝐏𝐓 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
𝐂𝐈𝐏𝐓 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠!
 
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
 
𝐔𝐧𝐯𝐞𝐢𝐥𝐢𝐧𝐠 𝐀𝐏𝐓𝟐𝟗: 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
𝐔𝐧𝐯𝐞𝐢𝐥𝐢𝐧𝐠 𝐀𝐏𝐓𝟐𝟗: 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚𝐔𝐧𝐯𝐞𝐢𝐥𝐢𝐧𝐠 𝐀𝐏𝐓𝟐𝟗: 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
𝐔𝐧𝐯𝐞𝐢𝐥𝐢𝐧𝐠 𝐀𝐏𝐓𝟐𝟗: 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 

Recently uploaded (16)

Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 

Password Attack and its Types-1.pdf

  • 2. Hey Jerry, you know, the world of cybersecurity can be pretty fascinating and also a bit scary. Have you ever wondered how hackers try to crack passwords and gain unauthorized access to accounts? Definitely, Tom! It's quite concerning how passwords can be vulnerable to attacks. I've heard there are different types of password attacks. Do you know what they are? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 3. Absolutely, Jerry! One common type is a brute force attack, where hackers try all possible password combinations until they find the correct one. It can be time-consuming but can work if the password is weak or short. That sounds time-consuming, indeed. Are there any quicker methods? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 4. Indeed! There are dictionary attacks. Hackers try common passwords or words against an account, exploiting people's tendency to use easily guessable passwords. That is why one must always choose strong, unique passwords to stay secure! Oh, I see. So, what if the password isn't easily guessable? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 5. Well, hackers sometimes use a technique called a "rainbow table attack." They have a precomputed table of password hashes generated from many possible plaintext passwords. These tables are created in advance and can be quite extensive, covering a wide range of possible passwords. That's clever! But what if the hacker doesn't have a precomputed table? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 6. In that case, attackers resort to credential stuffing attacks. They use lists of usernames and passwords obtained from previous data breaches and try those credentials on other online accounts, exploiting the fact that people often reuse passwords across different platforms. That's alarming. Are there any other methods? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 7. Absolutely, Jerry! Keylogging and shoulder surfing. Hackers can secretly record keystrokes, including passwords, or visually spy on people entering their passwords. Wow, those methods are sneaky! Is there anything else we should be aware of? @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 8. There's one more technique to mention social engineering attacks. Hackers trick people into sharing passwords through deception and manipulation, posing as tech support or using elaborate schemes. That's quite scary. We need to be more cautious with our passwords and take steps to protect ourselves. @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 9. TIPS FOR PASSWORD SECURITY Set Strong Passwords Use Unique Passwords Enable Multi-Factor Authentication (MFA) Utilize Password Managers Regularly Change Passwords Educate Users Encrypt Passwords Account Lockout Policies Use HTTPs Regular Security Updates @infosectrain www.infosectrain.com # l e a r n t o r i s e
  • 10. FOUND THIS USEFUL? Get More Insights Through Our FREE Courses | Workshops | eBooks | Checklists | Mock Tests LIKE SHARE FOLLOW