SlideShare a Scribd company logo
Network Security
Talent Dzinoruma
What it is
• Any activity designed to protect the
usability and integrity of the network and
data.
• Consists of policies and practices adopted
to prevent and monitor unauthorized
access, misuse, modification or denial of
services of a computer network or
computer resource.
Why is it important
• To maintain integrity
(authentication)
• To ensure availability.
• To protect confidentiality.
Types of Attacks
• Browser Attack
• Web Attacks
• Traffic Analysis
• Brute Force Attack
• Eavesdropping
• Distributed Denial of Service
• Man In the Middle
Browser Attack
• The attacker breaches a machine through a web
browser.
• The attacker breach the website and infect it
with malware. When the user visits the site, the
site will force the malware into the system by
exploiting vulnerabilities in the system.
• Internet Explorer has the most vulnerabilities
Web Attacks
Traffic Analysis
• In the traffic analysis attack, an attacker
tries to sense the communication path
between the sender and receiver.
• An attacker can found the amount of data
which is travel from the route of sender
and receiver.
Brute Force Attack
• It is a type of network attack
• Rather than tricking a user into
downloading malware, the attacker tries to
discover the password through trial and
error.
Eavesdropping
• AKA snooping or sniffing attack
• The attacker captures the data packets.
• An attacker can find the path of the network if the
connection between parties is not encrypted.
• The main aim of this attack is to find out some
secret or confidential information from
communication.
• The attacker can read the confidential data, but he
cannot edit the data or cannot modify the data.
Distributed Denial Of Service
• It is an attack to make the network resource
unavailable to its users.
• It prevents normal use of the network.
• An attacker floods the entire network with
traffic until the network shuts down with
overload.
• The attacker may block the traffic which may
cause loss of access to the network by the
authorised user.
Distributed Denial Of Service
Man In The Middle
• The attacker alters the
communication between 2 parties
• Data/Information will be sent between
the user and the web application.
• The attacker will get in between and
spy.
• Standard Chartered issue(2008)
Man In The Middle
What to do to secure the
Network (1)
• Use VPN
• Use MAC for users
• Use firewalls which can filter the
information that might not be safe.
• Access Control
What to do to secure the
Network (2)
• Change the passwords frequently to avoid
hacking(BruteForce).
• Do not open spam emails without security.
• Use antivirus programs to detect and
prevent virus
What to do to secure the
Network (3)
• Use antimalware programs
• Implement good network encryption to
protect against passive attacks
• Use secure passwords
References
• Communication Systems and Network Technologies (CSNT)”, 2014 ,
ISBN:978-1-4799-3069-2,7-9 April 2014.
• Siddharth Ghansela “Network Security: Attacks, Tools and Techniques” ,
ijarcsse Volume 3, Issue 6, June 2013.
• Case Study: Network Clarity, SC Magazine 2014
• Cisco. (2011). What is network security?. Retrieved from cisco.com
• "Centralised Services: NewPENS moves forward - Eurocontrol.int". 17
January 2016. Archived from the original on 19 March 2017.
• K. Reimers, D. Andersson (2017) POST-SECONDARY EDUCATION
NETWORK SECURITY: THE END USER CHALLENGE AND EVOLVING
THREATS, ICERI2017 Proceedings, pp. 1787-1796.
• Multi-Vector Attacks Demand Multi-Vector Protection. MSSP Alert. July 24,
2018
• https://www.consumercomplaints.in/complaints/standard-chartered-bank-
credit-card-c595830.html

More Related Content

What's hot

BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Securityjp tj
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit vArthyR3
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Hacking and cyber security
Hacking and  cyber securityHacking and  cyber security
Hacking and cyber securityinfosecindia
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacksVaibhav Khanna
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overviewlimsh
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security STS
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Firewall
FirewallFirewall
FirewallGarmian
 

What's hot (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
Types of attack -Part2
Types of attack -Part2Types of attack -Part2
Types of attack -Part2
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cryptographic Security
Cryptographic SecurityCryptographic Security
Cryptographic Security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Network security
Network securityNetwork security
Network security
 
Hacking and cyber security
Hacking and  cyber securityHacking and  cyber security
Hacking and cyber security
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Firewall
FirewallFirewall
Firewall
 

Similar to Presentation network security

Similar to Presentation network security (20)

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
typesofattacks-180418113629.pdf
typesofattacks-180418113629.pdftypesofattacks-180418113629.pdf
typesofattacks-180418113629.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
IS-honeypot.pptx
IS-honeypot.pptxIS-honeypot.pptx
IS-honeypot.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Presentation network security

  • 2. What it is • Any activity designed to protect the usability and integrity of the network and data. • Consists of policies and practices adopted to prevent and monitor unauthorized access, misuse, modification or denial of services of a computer network or computer resource.
  • 3. Why is it important • To maintain integrity (authentication) • To ensure availability. • To protect confidentiality.
  • 4. Types of Attacks • Browser Attack • Web Attacks • Traffic Analysis • Brute Force Attack • Eavesdropping • Distributed Denial of Service • Man In the Middle
  • 5. Browser Attack • The attacker breaches a machine through a web browser. • The attacker breach the website and infect it with malware. When the user visits the site, the site will force the malware into the system by exploiting vulnerabilities in the system. • Internet Explorer has the most vulnerabilities
  • 7. Traffic Analysis • In the traffic analysis attack, an attacker tries to sense the communication path between the sender and receiver. • An attacker can found the amount of data which is travel from the route of sender and receiver.
  • 8. Brute Force Attack • It is a type of network attack • Rather than tricking a user into downloading malware, the attacker tries to discover the password through trial and error.
  • 9. Eavesdropping • AKA snooping or sniffing attack • The attacker captures the data packets. • An attacker can find the path of the network if the connection between parties is not encrypted. • The main aim of this attack is to find out some secret or confidential information from communication. • The attacker can read the confidential data, but he cannot edit the data or cannot modify the data.
  • 10. Distributed Denial Of Service • It is an attack to make the network resource unavailable to its users. • It prevents normal use of the network. • An attacker floods the entire network with traffic until the network shuts down with overload. • The attacker may block the traffic which may cause loss of access to the network by the authorised user.
  • 12. Man In The Middle • The attacker alters the communication between 2 parties • Data/Information will be sent between the user and the web application. • The attacker will get in between and spy. • Standard Chartered issue(2008)
  • 13. Man In The Middle
  • 14. What to do to secure the Network (1) • Use VPN • Use MAC for users • Use firewalls which can filter the information that might not be safe. • Access Control
  • 15. What to do to secure the Network (2) • Change the passwords frequently to avoid hacking(BruteForce). • Do not open spam emails without security. • Use antivirus programs to detect and prevent virus
  • 16. What to do to secure the Network (3) • Use antimalware programs • Implement good network encryption to protect against passive attacks • Use secure passwords
  • 17. References • Communication Systems and Network Technologies (CSNT)”, 2014 , ISBN:978-1-4799-3069-2,7-9 April 2014. • Siddharth Ghansela “Network Security: Attacks, Tools and Techniques” , ijarcsse Volume 3, Issue 6, June 2013. • Case Study: Network Clarity, SC Magazine 2014 • Cisco. (2011). What is network security?. Retrieved from cisco.com • "Centralised Services: NewPENS moves forward - Eurocontrol.int". 17 January 2016. Archived from the original on 19 March 2017. • K. Reimers, D. Andersson (2017) POST-SECONDARY EDUCATION NETWORK SECURITY: THE END USER CHALLENGE AND EVOLVING THREATS, ICERI2017 Proceedings, pp. 1787-1796. • Multi-Vector Attacks Demand Multi-Vector Protection. MSSP Alert. July 24, 2018 • https://www.consumercomplaints.in/complaints/standard-chartered-bank- credit-card-c595830.html