Professional Documents
Culture Documents
Internet • Objective:
Security Its objective is to establish rules and measures to
use against attacks over the Internet. The Internet
represents an insecure channel for exchanging
information, which leads to a high risk
of intrusion or fraud, such
as phishing, online viruses, Trojans, worms and
more.
Role of Security in Internet and Web Services
Types of •
•
Port scan
Idle scan
Attacks • Host
• Keystroke logging
• Data scraping
• Backdoor
• Denial-of-service attack
• Spoofing
• Mixed threat attack
• Network
• Man-in-the-middle
• Man-in-the-browser
• ARP poisoning
• Ping flood
Active Attack • Ping of death
• Smurf attack
• Host
• Buffer overflow
• Heap overflow
• Stack overflow
• Format string attack
• A virus is a software program that
can spread from one computer to
another computer or one network
to another network without the
user’s knowledge and performs Computer
malicious attacks.
Virus
• It has capability to corrupt or
damage organization’s sensitive
data, destroy files, and format
hard drives.
How Does a Virus
Attack
Various Other •
•
PHISHING
SQL INJECTION
Security Threat • ROOTKIT
s
• MALWARE
• RANSOMWARE
• DATA BREACH
• ZERO DAY ATTACK
• CARELESS EMPLOYEES OF ORGANIZATION
• What are the differences between a
vulnerability, a risk, and a threat?
• Why are internal threats oftentimes
more successful than external
threats?
Review • State the difference between virus
Questions and worm.
• What is the full form of OWASP ?
• Name common types of non-
physical threats.