SlideShare a Scribd company logo
SECURITY
Presented By Nidhi Yadav
CYBER
India_Internship
VIP 2023 -Industry Problem Statement
KIET Groups of Institutions, Ghaziabad
Nidhi Yadav
2100290110102
COMPUTER SCIENCE AND INFORMATION
Components and Structure of Campus
30 1 1 R o u t e r s
S e r i a l D C E C a b l e
Sw i t c h e s (Cisco 3 6 5
0 - 24 PS,2 9 6 0 - 2 4TT
)
Pr i n t e r s
PC ' s
La p t o p - PT
Explanation:
A brief explanation of how these components can contribute to the
cybersecurity of your campus network:
Routers: Routers are responsible for directing traffic between different
networks. Implement strong access control lists (ACLs) and firewall rules
on routers to control incoming and outgoing traffic, preventing unauthorized
access and potential threats.
Serial DCE Cable: Serial DCE cables are used to connect routers and
switches. Ensure that physical access to these cables is restricted to
authorized personnel only, as tampering with the physical connections can
lead to network disruptions or unauthorized access.
Switches (Cisco 3650-24PS, 2960-24TT): Switches are essential for local
communication. Enable port security on switches to prevent unauthorized devices
from connecting to network ports and implement VLANs to segment traffic and
enhance security.
Servers :Servers house critical data and applications. Implement strong authentication
mechanisms, apply regular security patches, and use intrusion detection/prevention
systems to safeguard server assets from cyber threats.
Printers: Printers can be an entry point for attackers to gain unauthorized access to
your network. Ensure printers are on a separate network or segment them using
VLANs to minimize the impact of potential breaches.
Switches and Servers (as well as other network devices): Monitor network
devices and servers for unusual activities using security information and event
management (SIEM) solutions. This helps detect potential security breaches
early and allows for timely action.
• 3650-24PS (PoE Switch): If the 3650-24PS supports Power over Ethernet
(PoE), ensure proper security measures are in place to prevent unauthorized
access to powered devices, such as IP phones or cameras, to avoid potential
attacks.
• PCs and Laptops (including PT Laptop): Secure endpoints with up-to-date
anti-malware software, enforce strong password policies, and educate
users about phishing and social engineering risks. Consider using endpoint
detection and response (EDR) solutions for advanced threat detection.
• Printers: Regularly update printer firmware to patch vulnerabilities and
disable unnecessary services to reduce the attack surface.
• PCs and Laptops: Enforce encryption on laptops to protect sensitive data
in case of theft or loss.
• Laptop-PT: As a virtual environment, ensure the security of the
Laptop-PT by running it on secure hosts with up-to-date
virtualization software and monitoring its network activity.
• Address for main campus to cloud is
10.10.10.4/30
and cloud to server is 20.0.0.0/30.
• Address for main campus to other branch is
10.10.10.0/30.
• VLAN Portslike VLAN 10 and
192.168.1.0/24, so
on.....
“Remember, a comprehensive cybersecurity strategy involves a
combination of network security, endpoint protection, access control,
monitoring, and user education. Regular security assessments and
audits can help identify vulnerabilities and ensure that your campus
network remains resilient against potential cyber threats”.
MY CAMPUSNETWORK
SECURITY RISKS & SOLUTIONS
Security Risks:
1. Insider Threats
2. Malware and Ransomware Attacks
3. Phishing and Social Engineering
4. DDoS Attacks
5. Unpatched Vulnerabilities
6. Unauthorized Access
7. Physical Security Threats
8. Data Breaches
9. IoT and BYOD Risks
10. Lack of Incident Response Plan
Solutions:
1. Implement access controls and least privilege principles.
2. Deploy and update anti-malware and anti-ransomware solutions.
3. Conduct regular security awareness training.
4. Use email security gateways and implement multi-factor authentication (MFA).
5. Deploy DDoS protection solutions and redundant network infrastructure.
6. Establish a robust patch management process.
7. Implement strong network segmentation and use firewalls.
8. Secure physical access points and use surveillance.
9. Encrypt sensitive data and enforce data loss prevention (DLP) policies.
10. Segment IoT devices and implement network access control (NAC).
11. Develop and test an incident response plan.
Unauthorized Access
Unauthorized individuals gaining access to the campus network,
compromising sensitiveinformation or causing disruption.
Solution: Strong Access Controls and
Authentication Measures
Implement strong access controls, including multi-factor authentication,
and enforce robust password policies. Regularly review and update access
privileges and monitor network logs for suspicious activities.
Malware and Viruses
Campus networks are vulnerable to malware and viruses that can spread
rapidly and infect multiple devices, leading to data breaches or system
failures.
Solution: Robust Antivirus and Anti-Malware
Protection
Deploy up-to-date antivirus and anti-malware software across the network.
Regularly update operating systems and applications with security patches.
Educate users about safe browsing habits and caution against downloading
suspicious attachments or visiting potentially harmful websites
Insider Threats
Employees or students with malicious intent may abuse their privileges
or access rights to compromise the network or steal sensitivedata.
Solution: Addressing Insider Threats through Least
Privilege and Security Awareness
Implement least privilege principles, granting users only the necessary access
required for their roles. Conduct regular security awareness training to
educate employees and students about their responsibilities and the potential
consequences of insider threats. Implement user activity monitoring and
behavior analytics to detect anomalous behavior.
Data Breaches
Inadequate security measures exposing sensitive data, such as personal
information, academic records, or financial details, to unauthorized
parties.
Solution: Safeguarding Data through Encryption and
Data Loss Prevention (DLP)
Encrypt sensitive data at rest and in transit using strong encryption
algorithms. Implement data loss prevention (DLP) solutions to monitor and
prevent unauthorized data exfiltration. Regularly conduct security audits
and vulnerability assessments to identify and remediate potential
vulnerabilities.
Denial-of-Service (DoS) Attacks
Attackers overwhelming the campus network's resources, rendering it
unavailable to legitimate users.
Solution: Mitigating Denial-of-Service (DoS) Attacks
with Network Protection Measures
Deploy robust network firewalls and intrusion prevention systems to
detect and mitigate DoS attacks. Use traffic shaping and rate limiting
techniques to manage and prioritize network traffic. Establish
partnerships with Internet Service Providers (ISPs) to assist in mitigating
large-scale DoS attacks.
Thank You!

More Related Content

Similar to security_assessment_report_nidhi yadav.pptx

Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
prosunghosh7
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
Firas Alsayied
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal
 

Similar to security_assessment_report_nidhi yadav.pptx (20)

PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
Needs of Network security.pptx. Cryptography
Needs of Network security.pptx.  CryptographyNeeds of Network security.pptx.  Cryptography
Needs of Network security.pptx. Cryptography
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
INT 1010 06-6.pdf
INT 1010 06-6.pdfINT 1010 06-6.pdf
INT 1010 06-6.pdf
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Study of campus network security
Study of campus network securityStudy of campus network security
Study of campus network security
 

More from Akttripathi

More from Akttripathi (7)

SHREYA_CISCO.pptx
SHREYA_CISCO.pptxSHREYA_CISCO.pptx
SHREYA_CISCO.pptx
 
CISCO ASSIGNMENT.pptx
CISCO ASSIGNMENT.pptxCISCO ASSIGNMENT.pptx
CISCO ASSIGNMENT.pptx
 
4.1 What Are Routine Assessments.pptx.pptx
4.1 What Are Routine Assessments.pptx.pptx4.1 What Are Routine Assessments.pptx.pptx
4.1 What Are Routine Assessments.pptx.pptx
 
Algebra 2 Fundamentals of Mathematics for JEE MAINS and Advanced ( PDFDrive )...
Algebra 2 Fundamentals of Mathematics for JEE MAINS and Advanced ( PDFDrive )...Algebra 2 Fundamentals of Mathematics for JEE MAINS and Advanced ( PDFDrive )...
Algebra 2 Fundamentals of Mathematics for JEE MAINS and Advanced ( PDFDrive )...
 
3 Security Engineering Domain.pptx
3 Security Engineering Domain.pptx3 Security Engineering Domain.pptx
3 Security Engineering Domain.pptx
 
mdm-intro-chapter1.ppt
mdm-intro-chapter1.pptmdm-intro-chapter1.ppt
mdm-intro-chapter1.ppt
 
Class 3 3
Class 3 3Class 3 3
Class 3 3
 

Recently uploaded

Recently uploaded (20)

INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

security_assessment_report_nidhi yadav.pptx

  • 1. SECURITY Presented By Nidhi Yadav CYBER India_Internship VIP 2023 -Industry Problem Statement KIET Groups of Institutions, Ghaziabad Nidhi Yadav 2100290110102 COMPUTER SCIENCE AND INFORMATION
  • 2. Components and Structure of Campus 30 1 1 R o u t e r s S e r i a l D C E C a b l e Sw i t c h e s (Cisco 3 6 5 0 - 24 PS,2 9 6 0 - 2 4TT ) Pr i n t e r s PC ' s La p t o p - PT
  • 3.
  • 4. Explanation: A brief explanation of how these components can contribute to the cybersecurity of your campus network: Routers: Routers are responsible for directing traffic between different networks. Implement strong access control lists (ACLs) and firewall rules on routers to control incoming and outgoing traffic, preventing unauthorized access and potential threats. Serial DCE Cable: Serial DCE cables are used to connect routers and switches. Ensure that physical access to these cables is restricted to authorized personnel only, as tampering with the physical connections can lead to network disruptions or unauthorized access. Switches (Cisco 3650-24PS, 2960-24TT): Switches are essential for local
  • 5. communication. Enable port security on switches to prevent unauthorized devices from connecting to network ports and implement VLANs to segment traffic and enhance security. Servers :Servers house critical data and applications. Implement strong authentication mechanisms, apply regular security patches, and use intrusion detection/prevention systems to safeguard server assets from cyber threats. Printers: Printers can be an entry point for attackers to gain unauthorized access to your network. Ensure printers are on a separate network or segment them using VLANs to minimize the impact of potential breaches. Switches and Servers (as well as other network devices): Monitor network devices and servers for unusual activities using security information and event management (SIEM) solutions. This helps detect potential security breaches early and allows for timely action.
  • 6. • 3650-24PS (PoE Switch): If the 3650-24PS supports Power over Ethernet (PoE), ensure proper security measures are in place to prevent unauthorized access to powered devices, such as IP phones or cameras, to avoid potential attacks. • PCs and Laptops (including PT Laptop): Secure endpoints with up-to-date anti-malware software, enforce strong password policies, and educate users about phishing and social engineering risks. Consider using endpoint detection and response (EDR) solutions for advanced threat detection. • Printers: Regularly update printer firmware to patch vulnerabilities and disable unnecessary services to reduce the attack surface. • PCs and Laptops: Enforce encryption on laptops to protect sensitive data in case of theft or loss.
  • 7. • Laptop-PT: As a virtual environment, ensure the security of the Laptop-PT by running it on secure hosts with up-to-date virtualization software and monitoring its network activity. • Address for main campus to cloud is 10.10.10.4/30 and cloud to server is 20.0.0.0/30. • Address for main campus to other branch is 10.10.10.0/30. • VLAN Portslike VLAN 10 and 192.168.1.0/24, so on.....
  • 8. “Remember, a comprehensive cybersecurity strategy involves a combination of network security, endpoint protection, access control, monitoring, and user education. Regular security assessments and audits can help identify vulnerabilities and ensure that your campus network remains resilient against potential cyber threats”.
  • 10. SECURITY RISKS & SOLUTIONS Security Risks: 1. Insider Threats 2. Malware and Ransomware Attacks 3. Phishing and Social Engineering 4. DDoS Attacks 5. Unpatched Vulnerabilities 6. Unauthorized Access 7. Physical Security Threats 8. Data Breaches 9. IoT and BYOD Risks 10. Lack of Incident Response Plan
  • 11. Solutions: 1. Implement access controls and least privilege principles. 2. Deploy and update anti-malware and anti-ransomware solutions. 3. Conduct regular security awareness training. 4. Use email security gateways and implement multi-factor authentication (MFA). 5. Deploy DDoS protection solutions and redundant network infrastructure. 6. Establish a robust patch management process. 7. Implement strong network segmentation and use firewalls. 8. Secure physical access points and use surveillance. 9. Encrypt sensitive data and enforce data loss prevention (DLP) policies. 10. Segment IoT devices and implement network access control (NAC). 11. Develop and test an incident response plan.
  • 12. Unauthorized Access Unauthorized individuals gaining access to the campus network, compromising sensitiveinformation or causing disruption. Solution: Strong Access Controls and Authentication Measures Implement strong access controls, including multi-factor authentication, and enforce robust password policies. Regularly review and update access privileges and monitor network logs for suspicious activities.
  • 13. Malware and Viruses Campus networks are vulnerable to malware and viruses that can spread rapidly and infect multiple devices, leading to data breaches or system failures. Solution: Robust Antivirus and Anti-Malware Protection Deploy up-to-date antivirus and anti-malware software across the network. Regularly update operating systems and applications with security patches. Educate users about safe browsing habits and caution against downloading suspicious attachments or visiting potentially harmful websites
  • 14. Insider Threats Employees or students with malicious intent may abuse their privileges or access rights to compromise the network or steal sensitivedata. Solution: Addressing Insider Threats through Least Privilege and Security Awareness Implement least privilege principles, granting users only the necessary access required for their roles. Conduct regular security awareness training to educate employees and students about their responsibilities and the potential consequences of insider threats. Implement user activity monitoring and behavior analytics to detect anomalous behavior.
  • 15. Data Breaches Inadequate security measures exposing sensitive data, such as personal information, academic records, or financial details, to unauthorized parties. Solution: Safeguarding Data through Encryption and Data Loss Prevention (DLP) Encrypt sensitive data at rest and in transit using strong encryption algorithms. Implement data loss prevention (DLP) solutions to monitor and prevent unauthorized data exfiltration. Regularly conduct security audits and vulnerability assessments to identify and remediate potential vulnerabilities.
  • 16. Denial-of-Service (DoS) Attacks Attackers overwhelming the campus network's resources, rendering it unavailable to legitimate users. Solution: Mitigating Denial-of-Service (DoS) Attacks with Network Protection Measures Deploy robust network firewalls and intrusion prevention systems to detect and mitigate DoS attacks. Use traffic shaping and rate limiting techniques to manage and prioritize network traffic. Establish partnerships with Internet Service Providers (ISPs) to assist in mitigating large-scale DoS attacks.