Professional Documents
Culture Documents
A software system will simply alert administrator that suspicious activity has
taken place. The human admin then makes decision whether or not to block
traffic.
It should also be noted that nothing prevents offending user from moving
to different machine to continue attack.
2. Anomaly Detection :
It involves actual software that works to detect intrusion attempts and then
notify the administrator.
The general process is simple, system looks for any abnormal behavior.
Any activity that does not match pattern of normal user access is noted and
logged.
There are three main types of privileged passwords. They are used to
authenticate:
Service accounts
On the Windows operating system, service programs execute in the context
of either system (very privileged but has no password) or of a user account.
Required infrastructure
A privileged password management system requires extensive
infrastructure:
A mechanism to schedule password changes.
Connectors to various kinds of systems.
Mechanism to update various participants with new password values.
Extensive auditing.
Encrypted storage.
Authentication for parties that wish to retrieve password values.
Access controls and authorization to decide whether password
disclosure is appropriate.
Replicated storage to ensure that hardware failure or a site disaster
does not lead to loss of data.
Types of Malware:
Viruses –
A Virus is a malicious executable code attached to another executable
file. The virus spreads when an infected file is passed from system to
system.
Worms –
Worms replicate themselves on the system, attaching themselves to
different files and looking for pathways between computers, such as
computer network that shares common file storage areas. Worms
usually slow down networks.
Spyware –
Its purpose is to steal private information from a computer system for a
third party. Spyware collects information and sends it to the hacker.
Trojan horse –
A Trojan horse is malware that carries out malicious operations under
the appearance of a desired operation such as playing an online game.
Ransomware –
Ransomware grasps a computer system or the data it contains until the
victim makes a payment.
Q)What is a DDoS attack?
In a distributed denial-of-service (DDoS) attack, multiple compromised
computer systems attack a target and cause a denial of service for users of
the targeted resource. The target can be a server, website or other network
resource.
Many types of threat actors, ranging from individual criminal hackers to
organized crime rings and government agencies, carry out DDoS attacks. In
certain situations.
Q)Digital Cash
Digital cash is a system of purchasing cash credits in relatively small
amounts, storing the credits in your computer, and then spending them
when making electronic purchases over the Internet. Theoretically, digital
cash could be spent in very small increments, such as tenths of a cent
(U.S.) or less.
Advantages:-
Lower Cost: Firstly, the cost of using digital cash is extremely low. Normal
bank transactions require huge amounts of infrastructure.
Disadvantages:-
Not Traceable: The digital cash uses the internet, which makes traceability
difficult.
Forgery: Digital cash systems pose some unique risks. Since cash is
digital, it is likely that hackers might break into the system.
Q)Applications of ML
1. Cyber Threat Identification
Cybersecurity is a very important component of all companies. After all, if a
hacker manages to enter their systems, they are toast! The most difficult
component of cybersecurity is finding out if the connection requests into the
system are legitimate and any suspicious looking activities such as receiving
and sending large amounts of data are the work of professionals in the
company or some cyber threats.
4. Fighting AI Threats
Many hackers are now taking advantage of technology and using machine
learning to find the holes in security and hack systems. Therefore, it is very
important that companies fight fire with fire and use machine learning for
cybersecurity as well.
5. Email Monitoring
It is very important to monitor the official Email accounts of employees in a
company to prevent cybersecurity attacks such as phishing. Phishing attacks
can be done by sending fraudulent Emails to employees and asking them for
private information