SlideShare a Scribd company logo
Types of attacks in Cyber World
Contents
 What is cyber security?
 Types of cyber attacks
 Web-based attacks
 System-based attacks
 Methods of assistance
 Prevention
What is cyber security?
 Cyber security is a practice which intends to protect computers,
networks, programs and data from unintended or unauthorized access,
change or destruction
 Why Cyber Security?
 Now-a-days everything is going on web
 Major proportion of systems connected to internet (i.e, large inventory for intruders to
attack)
 That’s why cyber security became major concern in the world of computers over the
past decade
Types of cyber attacks
 Cyber attack is an illegal attempt to gain something from a computer
system
 These can be classified into
 Web-based attacks
 These are the attacks on a website or web application
 System-based attacks
 Attacks that are intended to compromise a computer or a computer network
Web-based attacks
 Injection attacks
 In this type of attacks, some data will be injected into a web applications to
manipulate the application and get required information
 Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,
 SQL injection (SQLi) is most common type of injection attack
 In SQLi, customized string will be passed to web application further manipulating
query interpreter and gaining access to unauthorized information
 SQLi can be prevented upto some extent by proper validation of data and by enforcing
least privilege principle
Web-based attacks
 File inclusion attack
 A file inclusion vulnerability allows an attacker to access unauthorized or sensitive
files available on the web server or to execute malicious files on the web server by
making use of the include functionality
 It can be further classified into
 Local file inclusion
 Including local files available on the server
 Remote file inclusion
 Includes and executes malicious code on a remotely hosted file
Web-based attacks
 Cross-Site Scripting (XSS)
 This can be done by editing javascript in a webpage such that it will be executed in client
browser
 It can be classified into
 Reflected XSS attack
 Stored XSS attack
 DOM-based XSS attack
 DNS Spoofing
 DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is
introduced into a Domain Name System (DNS) resolver's cache, causing the name server to
return an incorrect IP address, diverting traffic to the attacker's computer (or any other
computer).
Web-based attacks
 Denial of Service (DoS)
 DoS attack is an attempt to make a server or network resource unavailable to users
 This is generally done by flooding the server with communication requests
 DoS uses single system and single internet connection to attack a server
 Distributed Dos (DDoS) uses multiple systems and internet connections to flood a
server with requests, making it harder to counteract
 DoS can be classified into
 Volume based attacks
 goal is to saturate the bandwidth of the attacked site, and is measured in bits per second
 Protocal attacks
 consumes actual server resources, and is measured in packets per second
 Application layer attacks
 goal of these attacks is to crash the web server, and is measured in requests per second
Web-based attacks
 Brute force
 It is a trial and error method
 Generates large number of guesses and validate them to obtain actual data (passwords
in general)
 Dictionary attack
 Contains a list of commonly used passwords and validate them to get original password
 Buffer overflow
 occurs when a program or process tries to store more data in a buffer (temporary data
storage area) than it was intended to hold
Web-based attacks
 Session hijacking
 Web applications uses cookies to store state and details of user sessions
 By stealing the cookies, and attacker can have access to all of user data
 URL interpretation
 By changing certain parts of a URL, one can make a web server to deliver web pages
for which he is not authorized to browse
 Social engineering
 It is a non-technical method that relies heavily on human interaction and often
involves tricking people into breaking normal security procedures
Web-based attacks
 Man-in-the-middle attack
 Attacker intercepts the connection between
client and server and acts as a bridge between
them
 Attacker will be able to read, insert and modify
the data in the intercepted communication
 Phishing
 Phishing is the attempt to acquire sensitive information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication
 Spear phishing
 It is a form of phishing, which targets specific organizations for confidential data
 Whaling
 In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles
System-based attacks
 Virus
 A computer virus is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed
 It can also execute instructions that cause harm to system
 Worm
 It works same as a computer virus
 but it can spread into other systems in the network by exploiting the vulnerabilities
automatically
System-based attacks
 Trojan horse
 It appears to be a normal application, but when opened/executed some malicious code
will run in background
 These are generally spread by some form of social engineering
 Backdoors
 Backdoor is a method of bypassing normal authentication process
 The backdoor is written by the programmer who creates the code for the program
 It is often only known by the programmer
System-based attacks
 Bots
 Bot is an automated process that interacts with other network services
 Can be classified into
 Spyware
 Used to gather information of user without their knowledge
 Ex: Keyloggers
 Adware
 Mainly used for promotions of products
 Not so harmful
Methods to assist in cyberattacks
 Spoofing
 In spoofing, one person successfully impersonates as another by falsifying the data
 Ex: IP spoofing, email spoofing etc.,
 Sniffing
 Sniffing a process of capturing and analyzing the traffic in a network
 Port scanning
 It is a method to probe a system for open ports
 Intruder can exploit the vulnerabilities of open ports
References
 http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html
 http://resources.infosecinstitute.com/file-inclusion-attacks/
 https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
 http://searchsecurity.techtarget.com/definition/buffer-overflow
 http://ccm.net/contents/31-url-manipulation-attacks
 http://searchsecurity.techtarget.com/definition/social-engineering
 https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf
 http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
THANK YOU

More Related Content

What's hot

Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Web security
Web securityWeb security
Web security
Padam Banthia
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Cyber crime
Cyber crimeCyber crime
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
Dooremoore
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 

What's hot (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
cyber security
cyber security cyber security
cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Web security
Web securityWeb security
Web security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Similar to Types of Cyber Attacks

Network security
Network securityNetwork security
Network security
nafisarayhana1
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
S.M. Towhidul Islam
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
Bansari Shah
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
Stephanie Williams
 
Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
SANDEEPVISHWAKARMA425010
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty3
 
Security communication
Security communicationSecurity communication
Security communication
Say Shyong
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
Padamata Rameshbabu
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY1
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Computer Security
Computer SecurityComputer Security
Computer Security
Vaibhavi Patel
 
Network security
Network securityNetwork security
Network security
Md. Asifur Rahman Siddiki
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
joellemurphey
 
cyber security
cyber securitycyber security
cyber security
Naveed Ahmed Siddiqui
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
EC-Council
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 

Similar to Types of Cyber Attacks (20)

Network security
Network securityNetwork security
Network security
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Major Web Sever Threat.pptx
Major Web Sever Threat.pptxMajor Web Sever Threat.pptx
Major Web Sever Threat.pptx
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Security communication
Security communicationSecurity communication
Security communication
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security
Network securityNetwork security
Network security
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
cyber security
cyber securitycyber security
cyber security
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 

More from Rubal Sagwal

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Rubal Sagwal
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
Rubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
Rubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
Rubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
Rubal Sagwal
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
Rubal Sagwal
 

More from Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software Principles of Virtualization - Introduction to Virtualization Software
Principles of Virtualization - Introduction to Virtualization Software
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Types of Cyber Attacks

  • 1. Types of attacks in Cyber World
  • 2. Contents  What is cyber security?  Types of cyber attacks  Web-based attacks  System-based attacks  Methods of assistance  Prevention
  • 3. What is cyber security?  Cyber security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction  Why Cyber Security?  Now-a-days everything is going on web  Major proportion of systems connected to internet (i.e, large inventory for intruders to attack)  That’s why cyber security became major concern in the world of computers over the past decade
  • 4. Types of cyber attacks  Cyber attack is an illegal attempt to gain something from a computer system  These can be classified into  Web-based attacks  These are the attacks on a website or web application  System-based attacks  Attacks that are intended to compromise a computer or a computer network
  • 5. Web-based attacks  Injection attacks  In this type of attacks, some data will be injected into a web applications to manipulate the application and get required information  Ex: SQL Injection, Code Injection, Log Injection, XML Injection etc.,  SQL injection (SQLi) is most common type of injection attack  In SQLi, customized string will be passed to web application further manipulating query interpreter and gaining access to unauthorized information  SQLi can be prevented upto some extent by proper validation of data and by enforcing least privilege principle
  • 6. Web-based attacks  File inclusion attack  A file inclusion vulnerability allows an attacker to access unauthorized or sensitive files available on the web server or to execute malicious files on the web server by making use of the include functionality  It can be further classified into  Local file inclusion  Including local files available on the server  Remote file inclusion  Includes and executes malicious code on a remotely hosted file
  • 7. Web-based attacks  Cross-Site Scripting (XSS)  This can be done by editing javascript in a webpage such that it will be executed in client browser  It can be classified into  Reflected XSS attack  Stored XSS attack  DOM-based XSS attack  DNS Spoofing  DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
  • 8. Web-based attacks  Denial of Service (DoS)  DoS attack is an attempt to make a server or network resource unavailable to users  This is generally done by flooding the server with communication requests  DoS uses single system and single internet connection to attack a server  Distributed Dos (DDoS) uses multiple systems and internet connections to flood a server with requests, making it harder to counteract  DoS can be classified into  Volume based attacks  goal is to saturate the bandwidth of the attacked site, and is measured in bits per second  Protocal attacks  consumes actual server resources, and is measured in packets per second  Application layer attacks  goal of these attacks is to crash the web server, and is measured in requests per second
  • 9. Web-based attacks  Brute force  It is a trial and error method  Generates large number of guesses and validate them to obtain actual data (passwords in general)  Dictionary attack  Contains a list of commonly used passwords and validate them to get original password  Buffer overflow  occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold
  • 10. Web-based attacks  Session hijacking  Web applications uses cookies to store state and details of user sessions  By stealing the cookies, and attacker can have access to all of user data  URL interpretation  By changing certain parts of a URL, one can make a web server to deliver web pages for which he is not authorized to browse  Social engineering  It is a non-technical method that relies heavily on human interaction and often involves tricking people into breaking normal security procedures
  • 11. Web-based attacks  Man-in-the-middle attack  Attacker intercepts the connection between client and server and acts as a bridge between them  Attacker will be able to read, insert and modify the data in the intercepted communication  Phishing  Phishing is the attempt to acquire sensitive information, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication  Spear phishing  It is a form of phishing, which targets specific organizations for confidential data  Whaling  In whaling, the targets are high-ranking bankers, executives or others in powerful positions or job titles
  • 12. System-based attacks  Virus  A computer virus is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed  It can also execute instructions that cause harm to system  Worm  It works same as a computer virus  but it can spread into other systems in the network by exploiting the vulnerabilities automatically
  • 13. System-based attacks  Trojan horse  It appears to be a normal application, but when opened/executed some malicious code will run in background  These are generally spread by some form of social engineering  Backdoors  Backdoor is a method of bypassing normal authentication process  The backdoor is written by the programmer who creates the code for the program  It is often only known by the programmer
  • 14. System-based attacks  Bots  Bot is an automated process that interacts with other network services  Can be classified into  Spyware  Used to gather information of user without their knowledge  Ex: Keyloggers  Adware  Mainly used for promotions of products  Not so harmful
  • 15. Methods to assist in cyberattacks  Spoofing  In spoofing, one person successfully impersonates as another by falsifying the data  Ex: IP spoofing, email spoofing etc.,  Sniffing  Sniffing a process of capturing and analyzing the traffic in a network  Port scanning  It is a method to probe a system for open ports  Intruder can exploit the vulnerabilities of open ports
  • 16. References  http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html  http://resources.infosecinstitute.com/file-inclusion-attacks/  https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html  http://searchsecurity.techtarget.com/definition/buffer-overflow  http://ccm.net/contents/31-url-manipulation-attacks  http://searchsecurity.techtarget.com/definition/social-engineering  https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf  http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html