Professional Documents
Culture Documents
Explain what is threat in computer network? Explain Patriotic Hackers with real
country side example.
A network security threat is exactly that: a threat to your network and data
systems. Any attempt to breach your network and obtain access to your data is
a network threat.
Patriotic hacking is a term for computer hacking or system cracking in which
citizens or supporters of a country, traditionally industrialized Western
countries but increasingly developing countries, attempt to perpetrate attacks
on, or block attacks by, perceived enemies of the state.
Examples:
. War in Iraq – 2003
. Summer Olympics – 2008
. Op Vijaya by Indian Hackers – 2015
. Retaliation on India - 2017
What is Cyber Terrorism, explain this term with real scenario example.
Cyber terrorism (also known as digital terrorism) is defined as disruptive
attacks by recognised terrorist organisations against computer systems with
the intent of generating alarm, panic, or the physical disruption of the
information system.
While we’ve become used to hearing about cyber attacks, cyber
terrorism instils a different type of worry. Computer hackers have long worked
to gain access to classified information for financial gain, meaning terrorists
could do the same
The internet can be used by terrorists to finance their operations, train other
terrorists, and plan terror attacks. The more mainstream idea of cyber terrorism
is the hacking of government or private servers to access sensitive information
or even siphon funds for use in terror activities. However, there is currently no
universally accepted definition of cyber terrorism.
Examples of cyber terrorism
● Introduction of viruses to vulnerable data networks.
● Hacking of servers to disrupt communication and steal sensitive
information.
● Defacing websites and making them inaccessible to the public thereby
●
a. OSI Model
OSI or Open System Interconnection model was developed by International
Standards Organization (ISO). It gives a layered networking framework that
conceptualizes how communications should be done between heterogeneous
systems. It has seven interconnected layers. The seven layers of the OSI Model
are a physical layer, data link layer, network layer, transport layer, session layer,
presentation layer, and application layer
b. TCP/IP
TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite
of communication protocols used to interconnect network devices on the
internet. TCP/IP is also used as a communications protocol in a private
computer network (an intranet or extranet).
The entire IP suite -- a set of rules and procedures -- is commonly referred to
as TCP/IP. TCP and IP are the two main protocols, though others are included in
the suite. The TCP/IP protocol suite functions as an abstraction layer between
internet applications and the routing and switching fabric.
c. Vulnerabilities
Vulnerability is the inability to resist a hazard or to respond when a disaster has
occurred. For instance, people who live on plains are more vulnerable to floods
than people who live higher up. In actual fact, vulnerability depends on several
factors, such as people's age and state of health, local environmental and
sanitary conditions, as well as on the quality and state of local buildings and
their location with respect to any hazards.
d. Packets
In computer networks, a packet is a container or box that carries data over a
TCP/IP network and internetworks. A packet is the most fundamental logical
arbitration of data that is passed over a network.
A packet normally represents the smallest amount of data that can traverse
over a network at a single time. A TCP/IP network packet contains several
pieces of information, including the data it is carrying, source destination IP
addresses, and other constraints required for quality of service and packet
handling.
Software as a Service(SaaS)
Software-as-a-Service (SaaS) is a way of delivering services and applications
over the Internet. Instead of installing and maintaining software, we simply
access it via the Internet, freeing ourselves from the complex software and
hardware management. It removes the need to install and run applications on
our own computers or in the data centers eliminating the expenses of hardware
as well as software maintenance. The various companies providing Software as
a service are Cloud9 Analytics, Salesforce.com, Cloud Switch, Microsoft Office
365, Big Commerce, Eloqua, dropBox, and Cloud Tran.
Platform as a Service(PaaS)
PaaS is a category of cloud computing that provides a platform and
environment to allow developers to build applications and services over the
internet. PaaS services are hosted in the cloud and accessed by users simply
via their web browser.
A PaaS provider hosts the hardware and software on its own infrastructure. The
various companies providing Platform as a service are Amazon Web services
Elastic Beanstalk, Salesforce, Windows Azure, Google App Engine, cloud Bess
and IBM smart cloud.
Infrastructure as a Service(IaaS)
Infrastructure as a service (IaaS) is a service model that delivers computer
infrastructure on an outsourced basis to support various operations. Typically
IaaS is a service where infrastructure is provided as outsourcing to enterprises
such as networking equipment, devices, database, and web servers.
It is also known as Hardware as a Service (HaaS). The various companies
providing Infrastructure as a service are Amazon web services, Bluestack, IBM,
Openstack, Rackspace, and Vmware.
Explain DDOS with suitable example and explain the impact of DDOS in any
organization.
● A denial-of-service (DoS) attack is a type of cyber attack in which a
malicious actor aims to render a computer or other device unavailable
to its intended users by interrupting the device's normal functioning.
DoS attacks typically function by overwhelming or flooding a targeted
machine with requests until normal traffic is unable to be processed,
resulting in denial-of-service to addition users. A DoS attack is
characterized by using a single computer to launch the attack.
● In a distributed denial-of-service attack (DDoS attack), the
●