CSS Unit1
CSS Unit1
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system.
There are various types of computer security which is widely used to protect the valuable
information of an organization.
Hardware, the physical part of the computer, like the system memory and disk drive
Firmware, permanent software that is etched into a hardware device’s nonvolatile
memory and is mostly invisible to the user
Software, the programming that offers services, like operating system, word processor,
internet browser to the user
1. Web-based attacks
2. System-based attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important web-based
attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the application
and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS
resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the
attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of
time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies to
store the state and user sessions. By stealing the cookies, an attacker can have access to all of the
user data.
3. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login credentials and
credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic
communication.
4. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number of
guesses and validates them to obtain actual data like user password and personal identification
number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test
an organization's network security.
5. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It
uses the single system and single internet connection to attack a server. It can be classified into the
following:
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request
per second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get original
password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a web server
to deliver web pages for which he is not authorized to browse.
It is a type of attack that allows an attacker to access unauthorized or essential files which is available
on the web server or to execute malicious files on the web server by making use of the include
functionality.
It is a type of attack that allows an attacker to intercepts the connection between client and server and
acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data
in the intercepted connection. It is also known as fabrication attack
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network. Some of
the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files without the
knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting
copies of itself into other computer programs when executed. It can also execute instructions that
cause harm to the system.
2. Worm
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will run in
the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or
other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they receive
specific input. Common examples of bots program are the crawler, chatroom bots, and
malicious bots.
Due to active attacks, the execution While due to passive attack, there is
system is always damaged. no harm to the system.
Vulnerability Types
Network Vulnerabilities: These are issues with a network’s hardware or software that expose
it to possible intrusion by an outside party. Examples include insecure Wi-Fi access points and
poorly-configured firewalls.
1. In error 404 hacking digital India part 1 chase, the cyber crime and cyber attacks hack the
information of users like bank detail and personal information.
2. It is real time incident. In this, attacker or hacker creates an attractive video so that victim
gets attracted and plays that video into system.
3. When we clicked on video to play then at the time of buffering, hacker can know our current
location and GPS history but also have complete access to our contacts, text messages,
Facebook, Whatsapp and most importantly our bank details, including our CVV number.
4. Hackers are creating a kind Trojan file, and android apk files. The apk files are distributed all
over the internet. Those who download this file will be hacked easily.
5. Potential cyber attacks that is most common in error 404 hacking :
ii ). If there is flaw in the web application , it allows the attacker to manipulate data using SQL
injection attack .
ii ). As more enterprises invite employees to access data from mobile devices , networks
become vulnerable to data theft or total destruction of the data or network .
iii) More and more users and businesses use smartphones to communicate, but also to plan
and organize their users work and also private life.
iv). Within companies, these technologies are causing profound changes in the organization of
information systems and therefore they have become the source of new risks .
2. In hijacking (also known as a man in the middle attack), the attacker takes control of an
established connection while it is in progress.
3. The attacker intercepts messages in a public key exchange and then retransmits them ,
substituting their own public key for the requested one , so that the two original parties still
appear to be communicating with each other directly .
4. The attacker uses a program that appears to be the server to the client and appears to be
the client to the server.
5. This attack may be used simply to gain access to the messages, or to enable the attacker to
modify them before retransmitting them.
Buffer overflow
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage
capacity of the memory buffer. As a result, the program attempting to write the data to the
buffer overwrites adjacent memory locations. Buffer overflows can affect all types of software.
They typically result from malformed inputs or failure to allocate enough space for the buffer. If
the transaction overwrites executable code, it can cause the program to behave unpredictably
and generate incorrect results, memory access errors, or crashes. Types of Buffer Overflow
Attacks.
Stack-based buffer overflows are more common, and leverage stack memory that only exists
during the execution time of a function.
Heap-based attacks are harder to carry out and involve flooding the memory space allocated
for a program beyond memory used for current runtime operations.
Integer overflow
It is also known as wraparound, occurs when an arithmetic operation outputs a numeric value
that falls outside allocated memory space or overflows the range of the given value of the
integer. Mostly in all programming languages, integers values are allocated limited bits of
storage.