0% found this document useful (0 votes)
30 views28 pages

Module-4-Introduction To Cyber Attacks

The document provides an overview of cyber attacks, including their history, definitions, characteristics, and classifications based on purpose, severity, and network type. It highlights the evolution of cyber attacks and discusses various types such as reconnaissance, access, and denial of service attacks. The content emphasizes the importance of understanding cyber attacks due to their increasing impact on technology-dependent systems.

Uploaded by

Vrushank Bhatt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views28 pages

Module-4-Introduction To Cyber Attacks

The document provides an overview of cyber attacks, including their history, definitions, characteristics, and classifications based on purpose, severity, and network type. It highlights the evolution of cyber attacks and discusses various types such as reconnaissance, access, and denial of service attacks. The content emphasizes the importance of understanding cyber attacks due to their increasing impact on technology-dependent systems.

Uploaded by

Vrushank Bhatt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

CYBER SECURITY

Week 2: Cyberattacks – Classification of Attacks –


Vulnerabilities – Threats – Risks
Module 4: Introduction to Cyber Attacks
Course Co-Ordinator Content Reviewer Content Writer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj Ms. M. Kalaivani
Professor-Department of Professor, Assistant Consultant
Computer Science Department of Information Tata Consultancy Services
Avinashilingam Institute for Technology TCS Centre, Infopark
Home Science and Madras Institute of Technology Kakkanad, Kochi-682042.
Higher Education for Women Campus, [email protected]
(Deemed-to-be-University), Anna University, +919597390087
Coimbatore Chennai-600 044.
padmavathi.avinashilingam@ [email protected]
gmail.com +919444150081
9486772744

1
Objectives

✓Introduce the History of Cyber-attack, its


definition and characteristics
✓Describe the purpose and motivation behind
Cyber Attacks and how and why Cyber Attacks
take place

2
Learning Outcomes

✓Recall the Evolution of Cyber Attacks


✓Define Cyber Attack and its characteristics
✓Judge the purpose and motivation of Cyber
Attacks

3
Outline

Evolution of Cyber Attacks


Cyber Attack - Definition
Characteristics of Cyber Attacks
Purpose and Motivation for Cyber Attacks
Various categories of Attacks

4
Evolution of Cyber Attack

• As of October 2018, there are


• 4.2 billion active Internet users worldwide and
• 3.4 billion active social media users
• Most of the users rely on Internet technology for
their day-to-day activities
• This has led to an increase in cybercrimes and
cyber-attacks

5
First- Major Cyber Attack

• The Morris worm (1988) is the first known


major cyber-attack
• It was used as a weakness in the UNIX system
and it replicated itself
• The worm was developed by Robert Tapan
Morris
• He was the first person ever to be convicted
under the US computer fraud and abuse act

6
The Morris Internet Worm

7
Definition of Cyber Attack

• It refers to compromise in the CIA of the


resources or data stored in a Internet or
Intranet connected computer
• Deliberate exploitation of computer system
resources, networks and technology connected
through WWW
• Compromises data by injecting malicious code
into the actual code

8
Characteristics of Cyber Attacks

Regimented

Not Scrupulously
spontaneous designed or
or ad hoc Harmonized

Characteristics
of Cyber
Attacks

Demanding
Organized Time and
Resource

Enormous

9
Basic categories of Cyber Attack

Volume-based
Attacks

Cyber Attack

Application Protocol
Attacks Attacks

10
Purpose and Motivation for Cyber
Attacks

• Obstruction of Information
• Denigration in the Reputation of the country
• Denial in providing public services
• Smashing up legal Interest
• Counter International cyber security measures
• Retardation of decision-making process
• Abatement of public confidence

11
Classification of Attacks
Cyber Attack
Classification

Based on Based on Based on


purpose severity of Network Type
Legal Based on
Involvement Scope
classification

Reconnaissance Attacks in
Attack Cyber Crime Malicious MANET
Active Attacks
Cyber Large-Scale
Access Attack Attacks in
Passive Attack
Espionage WSN
Denial of Service Attacks
Cyber Non-Malicious
Attack
Terrorism Small-Scale
Attack
Cyber War

12
Classification of Cyber Attack : Based
on Purpose

Reconnaissance Attack

Based on
purpose Access Attack

Denial of Service Attack

13
Reconnaissance Attack
• This attack is also called as System mapping,
services and unauthorized detection
• Reconnaissance attacks takes place in any of
the forms
Packet
Sniffers

Queries
regarding Reconnaissance Scanning
Internet Attack the Port
Information

Sweeping
the Port

14
Access Attack

• The unapproved attacker generates access to


a device for which they have no authorization

Access Attack Types

Attacks on Secret
Code Phishing

Utilization of Trust Port Social Engineering

Port Redirection Man-in-the-Middle Attack

15
Denial of Service Attack
• It is crashing the system to render it slow or
unusable
• It may involve corruption or deletion of
data/information
• It also disables the network system by
declining services to known users

16
Legal Classification

Legal Based Classification

Cyber crime Cyberwar

Cyber Espionage Cyber Terrorism

17
Based on Severity of Involvement

Active
Attack

Based on the
severity of
involvement

18
Based on Scope

Based on Scope

Non-malicious small-scale
Malicious large-scale Attack Attack

19
Based on Network Types

Based on
Network
Types

Mobile Adhoc Wireless Sensor


Networks (MANET) Networks (WSN)

20
MANET Attacks types

Byzantine
Overlay Byzantine
Wormhole attack
Attack

MANET The Black


Attacks hole Attack

Byzantine Flood
Worm hole Rushing
Attack Attack

21
WSN Attacks

Cryptography and non-


cryptography related attacks

WSN Attacks
Attacks based on the network
layers

22
Different Types of Attacks
Name of the Description Examples
attack
Reconnaissance It involves unauthorized a) Packet Sniffers
attack detection system mapping b) Port Scanning
and services to steal data. c) Ping Sweeps and
d) DNS (Distributed Network
Services) queries
Access attack It is an attack where intruder a) Port trust utilization
gains access to a device to b) Port redirection
which he has no right for c) Dictionary attacks
access. d) Man-in-the-Middle attacks
e) Social engineering attacks
and phishing
Denial of Service It is the Intrusion into a a) Smurf
(DoS) attack system by disabling the b) SYN Flood
network with the intent to c) DNS attacks
deny service to authorized d) DDoS (Distributed Denial of
users. Service) attack 23
Different Types of Attacks
Name of the Description Examples
attack
Cyber crime It is the use of computer and a) Identity theft
Internet to exploit users for b) Credit card fraud
materialistic gain.
Cyber It is the act of using the a) Tracking Cookies
espionage internet to spy on others for b) RAT Controllable
gaining benefit.
Cyber terrorism It is the use of cyber space for a) Crashing the power grids by
creating large scale disruption al-Qaeda via a network
and destruction of life and b) Poisoning of water supply
property.
Cyber war It is the act of a nation with the a) Russia’s war on Estonia
intention of disruption of (2007)
another nation’s network to b) Russia’s war on Georgia
gain tactical and military (2008)
advantages.
24
Different Types of Attacks
Name of the Description Examples
attack
Active attacks It is the attack of data a) Masquerade
transmission to all parties b) Replay
thereby acting as a liaison c) Modification of message
enabling server compromise.
Passive attacks It is the attack which is primarily a) Traffic Analysis
eavesdropping without meddling b) Release of message
with the database. contents
Malicious It is the attack with deliberate a) Sasser attack
attack intent to cause harm resulting in
large scale disruption.
Non-malicious It is the accidental attack a) Registry corruption
attack caused due to mis-handling or b) Accidental erasing of
operational mistakes with minor hard disk
loss of data.
25
Different Types of Attacks

Name of the Description Examples


attack
Attacks in This attack aims to slow or a) Byzantine attack
MANET stop the flow of information b) Black Hole attack
between the nodes. c) Flood Rushing attack
d) Byzantine Wormhole attack
Attacks on WSN It is an attack which prevents a) Application Layer Attack
the servers from detecting b) Transport Layer Attack
and transmitting information c) Network Layer Attack
through the network. d) Multi-Layer Attacks

26
Conclusion

• Cyber Attacks have started affecting most of the


systems today because of the dependency on
technology
• It is very important to know what are Cyber
Attacks and how the Cyber Attacks affect the
system
• This section has presented the history and
evolution of Cyber Attacks, Characteristics,
along with the purpose and motive behind
Cyber Attack

27
Thank you

28

You might also like