0% found this document useful (0 votes)
15 views4 pages

Cyber Security Assignment 02

Uploaded by

Sam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Cyber Security Assignment 02

Uploaded by

Sam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Page No.

01
Date

Ncume: -Rahul R.shad


subCyben Secunity
class- IYeeA-CA.
Roll Nlo 71

02.
Assigom ent
oErplain 0D0S Atacks and Types of eomrn on 000c
Attacks!

oistribu ted. Den ialof geriCe. (opos)Att acke -£ A.


Distibuted Denial ot Senui ce (opos) cttack LS
mcliclow attem pf to dictnpt the
functioning a tangeted Ses Ves, Sesvice os
netaork by oVe ohelning it coith a flood of traffic
Unlinke denial ot Ser vie coos) attack,cohich
orainate from a Single Sounce, S
otfack Use multiple compromised yskm
xolume
patof botnet
botnet, to
to qenerate c
of traffic thct anqe a Specihic
high.
7esouce
Hoc0008 Athacks (w0rk
a Botnet ereation Attackeas Creale a bothe by
intecting multiple cleu ice CCompuens, Lo
devices)ith molencne, alloceing them to be
TemoBely controlle d
b) Traffie Genenation!h attacker instrucks the botne
to_Sendadangevolume of equest to the.
tanqet Server
ded and
OV er locded unavailable tolegitmak LSens.
)oistrupti on of Senyice: The ton get suskem.ma4
Csash gT becore Sluagish due t0 erCeive
traffic dending do a denial f Service for
7eal uses.
3) Cormmon peg of 000s Atacks:
a) Yolume- Based Attacksi
)U0p floocd i Sends a Jange number of
user Dataqram ProtoCol CUDP) packetS to
Tandom ports on Ahe tanqel, consum
its bandidth
i) ICMe fbod : Ovenahelms the tanqei ai th
Internet Control Messcoiqe potocol" (ICmP) echo
sequesr packets Cpiny s), Conduming its
b)Protocol hiacks
i)SY Cloocd Exploits the Tce handshake proceu
by sending a flosd of SYN rquegts to e
tngel Causinq it to Cxhautt avai lable
connechion esownce
i) ina to Denthi Sends malformed or OVensine
packet to a taqet, Causing it io CrOh or free2e
c) Application Layen Attacks:
HI7e Plooo : mimics leitimofe aser traffic by
SRnding HITR equeatsto ovETwhel nm a Caeb
Server tangeting its application layen
i) Stoulon' Keeps monq Connections fo the
tangtt ceb SeVeropen. and hol d them
OpenFor a lonq au posti ble, Consumins
Page No. OB
Date

2 Ekplcun the Concept OF intkllect ual Propenty and


its_4oolS in dehails
Conctpì of Intellectual Propenty CIp):
)Defination Intellectual PropRnty e fes to
Crtationg of the mind, Such cLSCu inventions,
lerary and artistic designs
Symboly nameA and imoge used in
Commence
2) PanpoLe f IP nqh aim to enCo tuage nnovatio.n
Cind CrtaHiy hy pxouiding leqa protecin,
alloolnq Cotators to Control the use of
thelr Crca hioni and benekit fironeially
3) Tpe ot 1e : Common typesOf intellectual
propenhy Includes patens, mdematke, Copytigss,
ond trnde Secet, each Senving diferent
punpose and prohe ching dilkneni clpect of
reati vit
ole the economy bypromohinq
Teseauch and deuelopmen, deadiagto
Hechnoloqical aduan ce menis and economie
qTOOth
5) Intennational Trealie , IP protection isSupponkd
by intenational treatie Such a the
Aqrtemeni on Trade- Relaed Aspech of
ielectual Propiky Righte (TRIPS),ohich
establis hes mininmum standandfox lP
paotech ion globaly
Pago No.
Datg

6) Duration of Protection 0fenent types of_Ie


hae voring duwa tÉ on ap protechion for
CEamplepatent iplcally oA for 20eons,
while Copyaignts may let for thedele
f the Author plus10 yeons
hfri
)nrinqement conSeq uen cei Unauthori2ed use o
\nfinaemenk elult in.
\eqal actionndu ding losuit and
monetaTY doma qee
2) Licensinq ASSigonnent Creatore cen icence
their P ha to gthens, othens qronting penmitioa
Por use Under Speciied conditions, or
assign zighti, Arona kning osnnship
Toole for Protecing Intelleckual pro peity
)Patents: LegaL ignts arantt d for inveasions,
pIovi cing exclustve qhhs to make,uey
and Sell 4he invention for
SpeciEied penind
)Trademonk Sumbole (o0Td 0r phrase
that identlfy Cnn disticquich
servicu rom other, prouiding brand.
protechion
3) Copyionte Legal prohection for omglnad wontke o4
Cuthor Ship including Jifenatut, muic, and.
crk pneNL nding unauthorined reproduchioa
and distibutlon
y)e Auditsi Assesment olo! o Company's lP_aceds
to identiy, valu ate, and manaqe lP iaht.e
eftecey

You might also like