Professional Documents
Culture Documents
REG:NO:18BCI0087
1)List the properties of security protocol. Compare any two cryptographic techniques with
neat block diagram?
ANS) There are many cyber attacks and cyber threats in daily life some of them are:
Phishing Attacks
Phishing is a type of social engineering usually employed to steal user data such as credit card
numbers and login credentials. It happens when an attacker, posing as a trusted individual, tricks the
victim to open a text message, email, or instant message. The victim is then deceived to open a
malicious link that can cause the freezing of a system as part of a ransomware attack, revealing
sensitive information, or installation of malware.
A Whale Phishing attack is a type of phishing that centres on high-profile employees such as the CFO or
CEO. It is aimed at stealing vital information since those holding higher positions in a company have
unlimited access to sensitive information. Most whaling instances manipulate the victim into permitting
high-worth wire transfers to the attacker.
Malware Attacks
Malware is a code that is made to stealthily affect a compromised computer system without the consent
of the user. This broad definition includes many particular types of malevolent software (malware) such
as spyware, ransomware, command, and control.
Ransomware
Ransomware blocks access to a victims data, typically threating delete it if a ransom is paid. There is no
guarantee that paying a ransom will regain access to the data. Ransomware is often carried out via a
Trojan delivering a payload disguised as a legitimate file.
Drive-by Attack
A drive-by attack is a common method of distributing malware. A cyber attacker looks for an insecure
website and plants a malicious script into PHP or HTTP in one of the pages. This script can install
malware into the computer that visits this website or become an IFRAME that redirects the victim’s
browser into a site controlled by the attacker. In most cases, these scripts are obfuscated, and this makes
the code to be complicated to analyze by security researchers.
Trojan Horses
A Trojan is a malicious software program that misrepresents itself to appear useful. They spread by
looking like routine software and persuading a victim to install. Trojans are considered among the most
dangerous type of all malware, as they are often designed to steal financial information.
SQL INJECTION
SQLI can have devastating effects on a business. A successful SQLI attack can cause deletion of entire
tables, unauthorized viewing of user lists, and in some cases, the attacker can gain administrative access
to a database. These can be highly detrimental to a business. When calculating the probable cost of SQLI,
you need to consider the loss of customer trust in case personal information like addresses, credit card
details, and phone numbers are stolen.
Cross-site scripting (XSS) is a kind of injection breach where the attacker sends malicious scripts into
content from otherwise reputable websites. It happens when a dubious source is allowed to attach its
own code into web applications, and the malicious code is bundled together with dynamic content that is
then sent to the victim’s browser.
Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to its
intended users. The attacks accomplish this mission by overwhelming the target with traffic or flooding it
with information that triggers a crash. In both situations, the DoS onslaught denies legitimate users such
as employees, account holders, and members of the resource or service they expected.
Password Attack
A password attack simply means an attempt to decrypt or obtain a user’s password with illegal
intentions. Crackers can use password sniffers, dictionary attacks, and cracking programs in password
attacks. There are few defense mechanisms against password attacks, but usually, the remedy is
inculcating a password policy that includes a minimum length, frequent changes, and unrecognizable
words.
Dictionary and brute-force attacks are networking attacks whereby the attacker attempts to log into a
user’s account by systematically checking and trying all possible passwords until finding the correct one.
These are a type of cybersecurity breach that allows an attacker to eavesdrop a communication between
two entities. The attack occurs between two legitimate communicating parties, enabling the attacker to
intercept communication they should otherwise not be able to access. Thus the name “man-in-the-
middle.” The attacker “listens” to the conversation by intercepting the public key message transmission
and retransmits the message while interchanging the requested key with his own.
Insider Threats
Not every network attack is performed by someone outside an organization. Inside attacks are malicious
attacks performed on a computer system or network by an individual authorized to access the system.
Insiders that carry out these attacks have the edge over external attackers since they have authorized
system access. They may also understand the system policies and network architecture. Furthermore,
there is less security against insider attacks since most organizations focus on defending against external
attacks.
This article has reviewed the top cyber-security attacks that hackers use to disrupt and compromise
information systems. For you to mount a good defense mechanism, you need to understand the offense.
This review of the most common cyberattacks shows you that attackers have many options while
choosing attacks to compromise and disrupt information systems. You also need to be proactive in
defending and securing your network. Maintain an updated antivirus database, train your employees,
keep your passwords strong, and use a low-privilege IT environment model to protect yourself against
cyber attacks.
If your company hasn't already done so, it should conduct a thorough security audit of its IT assets
and practices. This audit will review the security practices and policies of your central IT systems, as
well as your end-user departments and at the 'edges' of your enterprise, like the automated
machines and IoT you might be employing at remote manufacturing plants. The audit should look
not only at the software and hardware techniques you have in place to protect security but also at
remote site personnel habits and compliance with security policies.