0% found this document useful (0 votes)
56 views13 pages

Cs PPT Group 1

The document discusses various cyber security threats including brute force attacks which use trial and error to crack passwords, data interception which involves stealing private data by tapping wireless communications, distributed denial of service (DDoS) attacks which flood servers with useless traffic to overload them, and hacking which involves unauthorized access to compromise networks and steal or corrupt data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views13 pages

Cs PPT Group 1

The document discusses various cyber security threats including brute force attacks which use trial and error to crack passwords, data interception which involves stealing private data by tapping wireless communications, distributed denial of service (DDoS) attacks which flood servers with useless traffic to overload them, and hacking which involves unauthorized access to compromise networks and steal or corrupt data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CYBER

SECURITY

BRUTE FORCE
ATTACKS
CYBER
SECURITY

DATA
INTERCEPTION
CYBER
SECURITY

DDOS ATTACKS
CYBER
SECURITY

HACKING
CYBER
SECURITY

CONCLUSION
BRUTE FORCE ATTACKS
A Brute Force Attack is a hacking method that uses trial and
error to crack passwords, login credentials and encryption keys.
DATA INTERCEPTION
Data interception is a form of stealing data by tapping into a wired or
wireless communication link. The intent is to compromise privacy or
to obtain confidential information.
Unauthorized access to private data through interception, including
eavesdropping
and Man-In-The-Middle
(MITM) techniques.
DISTRIBUTED DENIAL OF
SERVICE ATTACKS
Flooding a server or other target with useless traffic from
multiple machines
operating together, causing
it to become overloaded and
unavailable.
DDoS attacks often make use
of a botnet a group of hijacked,
internet-connected devices
to carry out large-scale attacks.
Many DDoS attacks exploit limitations in the TCP/IP stack.
Types of DDOS Attacks
Network Based Attacks:
These attacks focus on consuming all the bandwidth allocated to a server. A huge volume of
requests are sent to the server which warrant a reply from the server and block all the
bandwidth for regular users. Example -UDP Floods, ICMP echo requests.

Protocol Based Attacks:


These consume the actual resources of a target by exhausting the firewalls and load balancers
kept in place. Layers three and four of the OSI model are compromised. Example SYN
Flooding, Ping of Death

Application Based Attacks:


Sophisticated attacks that crash the entire server by targeting application and OS level
vulnerabilities. It can stop specific applications from deliviring necessary information.
Example HTTP Flooding, BGP Hijacking.
HACKING
Hacking is the act of compromising digital devices and
networks through unauthorized access to an account or
computer system Or Hacking is the act of stealing data using
illegal means
Data can be changed, corrupted or
even stolen by the hacker also
known as the eavesdropper
Conclusion
Brute Force Attacks Data Interception DDOS Attacks Hacking

Unauthorized access, trial Unauthorized access via DDoS attack floods Unauthorized access to
and error, cracking wire/wireless tapping, servers with coordinated compromise devices,
passwords, encryption compromising privacy, traffic, uses botnets, networks, and data,
keys, compromising obtaining confidential exploits TCP/IP including theft,
individuals, organizations, info, including weaknesses for corruption, and data
and their systems. eavesdropping, MITM widespread disruption and manipulation by
techniques. unavailability. eavesdroppers.

You might also like