Chapter 1
Chapter 1
INTRODUCTION
• Cyber Attacks
• Guiding Principles
• Disruption of service
Classes of vulnerability
• Human vulnerabilities
• Protocol vulnerabilistie
• Software vulnerabilities
-Buffer overflow
-Validation of user input not performed(cross-
performed(cross-site scripting)
- SQL Injection Vulnerability
• Configuration vulnerabilities