0% found this document useful (0 votes)
12 views

Intern Cs 1

The document discusses cyber security including what it is, common applications like DDoS security and web firewalls, careers in cyber security, the need for cyber security to protect data and systems, common cyber security attacks like malware and phishing, basic cyber security terminology like encryption and decryption, the difference between encryption and decryption, and types of hackers like white hat and black hat hackers.

Uploaded by

prameela1635
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Intern Cs 1

The document discusses cyber security including what it is, common applications like DDoS security and web firewalls, careers in cyber security, the need for cyber security to protect data and systems, common cyber security attacks like malware and phishing, basic cyber security terminology like encryption and decryption, the difference between encryption and decryption, and types of hackers like white hat and black hat hackers.

Uploaded by

prameela1635
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

❖ What is Cyber Security?

The technique of protecting internet-connected systems such as computers,


servers, mobile devices, electronic systems, networks, and data from malicious
attacks is known as cybersecurity. We can divide cybersecurity into two parts one
is cyber, and the other is security. Cyber refers to the technology that includes
systems, networks, programs, and data. And security is concerned with the
protection of systems, networks, applications, and information.

❖ Applications:

1)DDoS security:
DDoS stands for Distributed Denial for Service attack. In this digital
attack, the attacker uses multiple numbers of devices to keep the web server
engaged in accepting the requests sent by him from the multiple devices. It

1
creates fake website traffic on the server. To deal with this, Cybersecurity helps
to provide a DDoS mitigation service to help cope with it which diverts the
traffic to the other cloud-based servers and the situation gets resolved.
2)Web Firewall:
A web application server-based firewall gets applied on a large area
network and it checks all the incoming and outgoing traffic on the server and it
automatically tracks and removes fake and malicious website traffic. This
Cybersecurity measure helps to determine and enable auto-traffic monitoring by
reducing attack risk.
3)Antivirus and Antimalware:
Cybersecurity is used to develop Antivirus and Antimalware software for
preventing all the digital attacks on the computer and protecting these devices
from data breaches, digital attacks, and unauthorized attacks from hackers. It
also helps in maintaining network security and firewall systems for all the
connected devices on the network.
4)Bots:
Nowadays, many hackers and attackers use bots to cause multiple device
traffic on the server to make it crash. Cybersecurity helps to deal with
identifying fake users i.e. bots and make them log out of their sessions so they
don’t affect the experience of the normal users.
❖ Career in Cyber Security:
➢ Systems integration engineer
➢ IT technician
➢ Security consultant
➢ Security analyst
➢ Security engineer
➢ Security systems engineer
➢ IT security specialist

2
❖ Need of Cyber Security
➢ Data Protection
➢ Privacy Preservation
➢ Financial Security
➢ Public Safety
➢ National Security
➢ Reputation Management
❖ Common Cyber Security Attacks

1. Malware
Malware is a term used to describe malicious software, including
spyware, ransomware, viruses, and worms. Malware breaches a network
through a vulnerability, typically when a user clicks a dangerous link or
email attachment that then installs risky software. Once inside the system,
malware can do the following:
• Blocks access to key components of the network (ransomware)
• Installs malware or additional harmful software

3
• Covertly obtains information by transmitting data from the hard drive
(spyware)
• Disrupts certain components and renders the system inoperable
2. Phishing
Phishing attacks are the practice of sending fraudulent communications
that appear to come from a reputable source. It is usually done through email.
The goal is to steal sensitive data like credit card and login information, or to
install malware on the victim’s machine. Phishing is a common type of cyber
attack that everyone should learn about in order to protect themselves.
3. Man in the Middle Attack
A man-in-the-middle attack is a type of cyber threat (a form of
eavesdropping attack) in which a cybercriminal intercepts a conversation
or data transfer between two individuals. Once the cybercriminal places
themselves in the middle of a two-party communication, they seem like
genuine participants and can get sensitive information and return different
responses. The main objective of this type of attack is to gain access to our
business or customer data.
4. Distributed Denial of Service (DDoS)
It is a type of cyber threat or malicious attempt where cybercriminals
disrupt targeted servers, services, or network's regular traffic by fulfilling
legitimate requests to the target or its surrounding infrastructure with Internet
traffic. Here the requests come from several IP addresses that can make the
system unusable, overload their servers, slowing down significantly or
temporarily taking them offline, or preventing an organization from carrying
out its vital functions.
5. Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-
error method to guess all possible combinations until the correct

4
information is discovered. Cybercriminals usually use this attack to obtain
personal information about targeted passwords, login info, encryption keys,
and Personal Identification Numbers (PINS).
6. SQL Injection (SQLI)
SQL injection is a common attack that occurs when cybercriminals
use malicious SQL scripts for backend database manipulation to access
sensitive information. Once the attack is successful, the malicious actor can
view, change, or delete sensitive company data, user lists, or private customer
details stored in the SQL database.
7. Domain Name System (DNS) Attack
A DNS attack is a type of cyberattack in which cyber criminals take
advantage of flaws in the Domain Name System to redirect site users to
malicious websites (DNS hijacking) and steal data from affected computers.
It is a severe cybersecurity risk because the DNS system is an essential
element of the internet infrastructure.
❖ Basic Terminologies
➢ Plain Text
Plaintext can refer to anything which humans can understand and/or
relate to. This may be as simple as English sentences, a script, or Java code.
If you can make sense of what is written, then it is in plaintext.
➢ Cipher Text
Ciphertext, or encrypted text, is a series of randomized letters and
numbers which humans cannot make any sense of.
➢ Encryption
Encryption is a form of data security in which information is
converted to ciphertext. Only authorized people who have the key can
decipher the code and access the original plaintext information.
➢ Decryption

5
Decryption is the process of transforming data that has been rendered
unreadable through encryption back to its unencrypted form.
➢ Secret Key
A secret key is the piece of information or parameter that is used to
encrypt and decrypt messages in a symmetric, or secret-key, encryption.
❖ Difference Between Encryption and Decryption
S.NO Encryption Decryption

1 Encryption is the process of While decryption is the process


converting normal message of converting meaningless
into meaningless message. message into its original form.

2 Encryption is the process While decryption is the process


which take place at sender’s which take place at receiver’s
end. end
3 Its major task is to convert the While its main task is to
plain text into cipher text. convert the cipher text into
plain text.
4 Any message can be Whereas the encrypted
encrypted with either secret message can be decrypted with
key or public key. either secret key or private key.
5 In encryption process, sender Whereas in decryption process,
sends the data to receiver after receiver receives the
encrypted it. information(Cipher text) and
convert into plain text.

❖ Hackers
A Hacker is a person who is intensely interested in the mysterious
workings of any computer operating system. Hackers are most often
programmers. They gather advanced knowledge of operating systems and
programming languages and discover loopholes within systems and the
reasons for such loopholes.

6
❖ Types of Hackers
➢ White Hat Hackers:
White hat hackers are the one who is authorized or the certified hackers
who work for the government and organizations by performing
penetration testing and identifying loopholes in their cybersecurity. They
also ensure the protection from the malicious cyber crimes. They work
under the rules and regulations provided by the government, that’s why
they are called Ethical hackers or Cybersecurity experts.
➢ Black Hat Hackers:
They are often called Crackers. Black Hat Hackers can gain the
unauthorized access of your system and destroy your vital data. The
method of attacking they use common hacking practices they have learned
earlier. They are considered to be as criminals and can be easily identified
because of their malicious actions.
➢ Gray Hat Hackers:

Gray hat hackers fall somewhere in the category between white


hat and black hat hackers. They are not legally authorized hackers. They
work with both good and bad intentions; they can use their skills for
personal gain. It all depends upon the hacker. If a gray hat hacker uses his
skill for his personal gains, he/she is considered as black hat hackers.
➢ Blue Hat Hackers:
They are much like the white hat hackers; they work for companies
for security testing of their software right before the product launch. Blue
hat hackers are outsourced by the company unlike white hat hackers
which are employed by the (part of the) company.
➢ Red Hat Hackers:

They are also known as the eagle-eyed hackers. Like white hat
hackers, red hat hackers also aims to halt the black hat hackers. There is

7
a major difference in the way they operate. They become ruthless while
dealing with malware actions of the black hat hackers. Red hat hacker will
keep on attacking the hacker aggressively that the hacker may know it as
well have to replace the whole system.
❖ What is Cryptography?
Cryptography is the process of hiding or coding information so that only
the person a message was intended for can read it. The art of cryptography
has been used to code messages for thousands of years and continues to be
used in bank cards, computer passwords, and ecommerce.

8
Project: DOS ATTACK USING NS2
What is DOS?
Denial-of-service attacks significantly degrade the service quality
experienced by legitimate users. These attacks introduce large response
delays, excessive losses, and service interruptions, resulting in direct
impact on availability.
What is ns2?
NS2 stands for Network Simulator Version 2. It is an open-source event-
driven simulator designed specifically for research in computer
communication networks.
Why ns2?
NS2 is a powerful network simulation tool that allows us to create realistic
network scenarios and evaluate the effectiveness of various defense
mechanisms in a controlled environment. Using NS2, I can simulate and
analyze different types of DoS attacks and test countermeasures to better
understand their impact on network performance and security. This
approach allows for safer and more controlled experimentation compared
to conducting real-world tests, which can be disruptive and potentially
illegal.
Procedure:
➢ Firstly, install the Oracle VM Virtual box
➢ Later add the ubuntu into Oracle VM Virtual box
➢ Install the network stimulator

➢ Create dos.tcl file


➢ Run that file

➢ You will see that some packets has been dropped which depicts that
denial of service has happened.

9
Results:

Links:
➢ Github link: https://github.com/Tejasri1510/DOS-attack-using-ns2.git

10
CERTIFICATE: LETTER OF COMPLETION

11

You might also like