Cs PPT Group 1
Cs PPT Group 1
SECURITY
BRUTE FORCE
ATTACKS
CYBER
SECURITY
DATA
INTERCEPTION
CYBER
SECURITY
DDOS ATTACKS
CYBER
SECURITY
HACKING
CYBER
SECURITY
CONCLUSION
BRUTE FORCE ATTACKS
A Brute Force Attack is a hacking method that uses trial and
error to crack passwords, login credentials and encryption keys.
DATA INTERCEPTION
Data interception is a form of stealing data by tapping into a wired or
wireless communication link. The intent is to compromise privacy or
to obtain confidential information.
Unauthorized access to private data through interception, including
eavesdropping
and Man-In-The-Middle
(MITM) techniques.
DISTRIBUTED DENIAL OF
SERVICE ATTACKS
Flooding a server or other target with useless traffic from
multiple machines
operating together, causing
it to become overloaded and
unavailable.
DDoS attacks often make use
of a botnet a group of hijacked,
internet-connected devices
to carry out large-scale attacks.
Many DDoS attacks exploit limitations in the TCP/IP stack.
Types of DDOS Attacks
Network Based Attacks:
These attacks focus on consuming all the bandwidth allocated to a server. A huge volume of
requests are sent to the server which warrant a reply from the server and block all the
bandwidth for regular users. Example -UDP Floods, ICMP echo requests.
Unauthorized access, trial Unauthorized access via DDoS attack floods Unauthorized access to
and error, cracking wire/wireless tapping, servers with coordinated compromise devices,
passwords, encryption compromising privacy, traffic, uses botnets, networks, and data,
keys, compromising obtaining confidential exploits TCP/IP including theft,
individuals, organizations, info, including weaknesses for corruption, and data
and their systems. eavesdropping, MITM widespread disruption and manipulation by
techniques. unavailability. eavesdroppers.