0% found this document useful (0 votes)
11 views

CSS Assignment 1

Cyber security assignment

Uploaded by

xotecin653
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views

CSS Assignment 1

Cyber security assignment

Uploaded by

xotecin653
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
Name — NIKHTL (uP TA Sobyeet — Cubev Security Roll = 9213B Date. - oslou\o02r3 Rrranch “ cwwi) Enq = Seemed: Assignment Od Ye“ Ex Pla _19 details @| Proxy Servers and Anonymresys + [Proxy Sewer + TH is a Sevuew thet Be esa inkeymedialy -For ‘requests From Cbents Seeking resovrtas erm tents Seeker Yesovrcas Fo othe y -sevwevs. & chen d Connoe ES FO PPXY , Sev VEY, yey eee Serica, Sven as le connoethe tN , cb Pa oY othey vesoura, available, —from a drffeun Hcovuey aNd tha brexy Useyuey evatvaste 4 the yequrt as Q say to -simpity and contol yts__complbot Fisk Bob Ghat ne conen tino 35 SS ———= a6 6 Te bes of broxy OPEN PrExIeEs An oben pexy is a ForWordin g pwry seoruny that {s actesstble by ang aden USON 5 «| Reverse prrviest A rewrite proxy Is a bevy Seve Y dna t+ appears sto chen + to be 4) ordinary Serve, Proves con be iNsdabted IN order sto eaverdva) vpen oe data Foo bla den t= machino ona ahe with «| Protocol shecihe an noaymrze Y, An anonymrzoy ov ON anon ymer rrr ee a Hee, Trterne wre ce oP LS: 2 leis a pay corner compote ¥ ee Sf as an \neermedtak and paves > S : and cthe rest bedweo a che nt comput y of =the unteme tt. Tt acs seS on the vsev's beh prete sthing trefermaten by hun ding athe hen” Jdontrhyng INFOM. hen, There aye man veasoNs ev Bnonymrery hell panimize “isle + OTRey con be vsed to prevent identity sthette , oy sto proteet Iseavelh histones From peblic disdesuna » Semo— counts abbly heavy censorship of shK.8 irkeme b+ ghia, Treterne } ye person 0 cormbote go wing anonyrnrset. Tubes : ynymreeies Somoctunas anenym2oy are implemented +o wove snly with ore parvtculay prococels “The obereho\ occoes tn his monney. O contectran iS made by the vse to the ane MYyMeDV: Prodocel inde bendont— anonymresvs — protece | independenta can be acheusd by Creating a stunneh to AN ANBNYMIDY , sicehnolegy to de varies. Protocols uwed by anonyme sewice May incloda _secies PPTP, oY open VPN. an a in ahieh & ctargoh email) Phishy oy, |Phishyng isa eybev nme y ov oe are. contracted = by Mz Perephond oy cke¥ t= Message by Someohe posi as a Pegthmets institute sto Dune Jndrud dot MO provi dingy Senskhug dota seek OF Perion alt anti fiab be. Unefermna tion Bonkiney ana cxedtt card dstaals, ond pass@e ray “Re infermecthion Vs thon used System ee thing te Krew abst compote v oan is ahah they ave designed te shed arwss Prgyvams ofa Sy Ste \ e| Worms - A Worm Ws @ PS yam thet ured! compott Y, nedoores and Sewn by hols te weblicate tdadf: scons tho netoorle Ker anvthey Mmerchtto thet hor a -sbeehie Seunity Hela and cobiet iret. comy palejleads hat do canndsrabla domage A +oyyon SHrovte vine is a tke ok Mabwarr thet dsvondeads ents ce compote. distqurre d 1 Regqitmake program. The adotive prothoe d ty prcadty sees an attacker ULC Sedan D eSHanroe ng, Back doovS — Backdoov is a term the} wefexs te tho acesss of tho ssi 8 Randisdo} oh compe VY syskeny withe xt ‘xing doteetedd » “TRe bactdoy cen be creaded by stho Aarurbobe y “Trojan —herses - SP abby Stegan ogrebhy 1 nograbhy secht yuk st bifding “de within an Ordinay 4 non seeve t= HLe we message, ts avord deteshon', tre hiddoy dota ds then cvtvetcd Gt 14s dastinehoy sdega nagrebh ee con bs or Buty, enny phen arcan exha step fev haing oy pwlkerhng data, 4 con be vied to contval “rentee ® admes tt any the ot treo 7» ete *[Dos— Al Bos, oy disk operating system, is i AN opeveshng oyster sthe [> ~ens fem ai diste du » TRe stern can olsa Yeter to Q pordticlay Family, ot ask Oberatng system , mos tamment Mg- des, ON acronym sfor Hicwsaft+ Bos, DDoS Mttacte— Ppos Adtack Treo ht | Dishsbuted Remal- of -Sewica. Lpnos ) Rtteact cand is. cybercnma, im whieh stre attactsey -fleods Qo sonuw width whee tee tC Fem aClessen gg cenfect-ed onlino, Semlta, and Stlex. Otho y distribute d dene of Sondre ortackey ane finiad® prohoated 1 Soc, ay 2 Combe tito > distrebtng oy shethyy dswh ansthax by sinoss entre sbrraka, te steaQ business SSay ty) tho Treen tims “~~ % hb ; “oy ‘a, | , | / SOL injecton (SOU) is a cybevatiacte thet INJESTS MakicwL SOL coda ints on aphlic adteromg tho attacker ts view ov rear co databace. Aerovding to 2K oben we Prop cothot) Secuny Proyett=, ynye ston soatetee Sy” Which inelede, SOL myettons, wore the thd most Sener; uth abploshon Setunityy ~wsic 1D 2021, SOL Inyecshoan ottales con howd a signa Nogoctw_o impotd of On Ovgantaben «Organs Haus atess te sensitucs company dee and pavete curbomars urfometien end SOC inpechon estates often tao that confadnhel \eefomedhon + Exposes Sonia tambpany Bota Lambromie, Useys! Pruaty Cuma an acktackey admin strshre access + yan, “system Cra an Pettacle vr Cyenore_O Access te Souv Systeoy carn brrecme tho indegairy st Your Beta. Be cov 2 +Hhe tmbac we om socert&Q sad Injecron orttac | can be Sercye 7AM Important fey business fF brach cq | Promentou Bother overttow Boeke A _Soffowr? tading \ tthe tH ceh bet ‘ exbloted by herkers t+ Qu uncuthonrsd corporate, System: Te 1S Mo sofdtusar&® secunih, Boffey oureftow VS ery ov vulnexvabili access to ow the bat - Freed vulnevabiltuu ye tT remeard —Feuvly Common, “This ts bath, becore puffer ow rfles Can ecco y th Vamoet Ways ond we dechniquer vied ste rven tb them te often eve = prove: The buttey owefro exploit stechmeawe hotkey wei deperndt on Avobbing C Passe. Aditaclss, Wriss_Eaves robbing C ps ) Addackers OLe, tools Dilee, baclee fF Snrfecy te mnteviep i and monttoy wrrelors Cemmumicohor, beturee ctouitan @] Wreless Shocking CMan eine the = MHiddile, adiat vy Te tte otters ,

You might also like