100% found this document useful (2 votes)
662 views13 pages

Cyber Security SEMINAR

This document discusses cyber security and types of cyber attacks. It defines cyber security as protecting networks, devices, programs and data from unauthorized access or damage. The main types of cyber attacks discussed are web based attacks, which target websites and applications, and system based attacks, which aim to compromise computers and networks. Specific web based attacks explained include DoS, DDoS, brute force attacks, and SQL injection. System based attacks covered are viruses, worms, Trojan horses, backdoors and bots. The document provides brief definitions and examples of these various cyber attacks.

Uploaded by

piyush dhamgaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
662 views13 pages

Cyber Security SEMINAR

This document discusses cyber security and types of cyber attacks. It defines cyber security as protecting networks, devices, programs and data from unauthorized access or damage. The main types of cyber attacks discussed are web based attacks, which target websites and applications, and system based attacks, which aim to compromise computers and networks. Specific web based attacks explained include DoS, DDoS, brute force attacks, and SQL injection. System based attacks covered are viruses, worms, Trojan horses, backdoors and bots. The document provides brief definitions and examples of these various cyber attacks.

Uploaded by

piyush dhamgaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Dr.

Babasaheb Ambedkar Technological


University,lonere

 By: Piyush M. Dhamgaye


 Guide : Dr.A.W.Kiwelekar
 PRN: 10303320171124510066
CONTENTS
o WHAT IS CYBER SECURITY?
o TYPES OF CYBER ATTACKS
o WEB BASED ATTACKS
o SYSTEM BASED ATTACKS
o REFERENCES
WHAT IS CYBER SECURITY?

 Cyber security refers to the body of technologies,


processes, and practices designed to protect
networks, devices, programs, and data from attack,
damage, or unauthorized access. Cyber security
may also be referred to as information technology
security.
TYPES OF CYBER ATTACKS

o WEB BASED ATTACKS


These are attacks on a website or web application .

o SYSTERM BASED ATTACKS


Attacks that are intended to compromise a computer or a computer network.
Various types of WEB BASED ATTACKS
 DoS
 dDoS
 Brute Force
 Session Hijacking
 Man in Middle
 sQl Injection
 Phishing
 Sniffing
 Spoofing
 Social engineering 
 What is Dos Attack ??
A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take
the service down. This is achieved by flooding the server’s request queue with fake requests. After this,
server will not be able to handle the requests of legitimate users

 What is Brute Force Attack?


Brute force (also known as brute force cracking) is a trial and error method used by application programs
to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive
effort(using brute force) rather than employing intellectual strategies.. Brute Force
 What is SQL Injection ??
 QL injection is a code injection technique, used to attack
data-driven applications, in which anonymously
statements are inserted into an entry field for execution.
 TOOLS 1. BSQL Hacker 2. SQLmap 3. SQLninja 4. Havij
5. Safe 3 SQL injector 6. SQLsus. SQL Injection.
  In this type of attacks, some data will be injected into a
web applications to manipulate the application and get
required information
What is Phishing?

 Phishing Attack: Phishing is the attempt to obtain


sensitive information such as usernames,
passwords, and credit card details (and, indirectly,
money), often for malicious reasons, by disguising
as a trustworthy entity in an electronic
communication.
Types of SYSTERM BASED ATTACKS

 VIRUS
 WORMS
 TROJANS HORSE
 BACK DOORS
 BOTS
 VIRUS

A computer virus is a self-replicating malicious computer program that replicates by


inserting copies of itself into other computer programs when executed It can also execute
instructions that cause harm to system

 WORMS
It works same as a computer virus but it can spread into other systems in the network by
exploiting the vulnerabilities automatically.

 TROJAN HORSE
It appears to be a normal application, but when opened/executed some malicious code will
run in background These are generally spread by some form of social engineering 
 BACKDOORS
Backdoor is a method of bypassing normal authentication process
The backdoor is written by the programmer who creates the code for
the program.
It is often only known by the programmer.

 BOTS
Bot is an automated process that interacts with other network services
Can be classified into Spyware.
Used to gather information of user without their knowledge
Ex: Keyloggers  Adware  Mainly used for promotions of products 
Not so harmful
REFERENCES
 http://phpsecurity.readthedocs.org/en/latest/Injection-Attacks.html
http://resources.infosecinstitute.com/file-inclusion-attacks/
 https://www.incapsula.com/ddos/ddos-attacks/denial-of-service.html
 http://searchsecurity.techtarget.com/definition/buffer-overflow
 http://ccm.net/contents/31-url-manipulation-attacks
 http://searchsecurity.techtarget.com/definition/social-engineering
 https://www.blackhat.com/presentations/bh-asia-02/bh-asia-02-shah.pdf
 http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html
THANK YOU…..!

You might also like