Professional Documents
Culture Documents
EXPLOITS AND
STRATEGIES TO
PROTECT
A m it p a l Sing h-0 808 691
S ume e t Jha me t -08 1082 1
S hifa li Verm a- 08 0866 1
R upind er S ing h-0 81 113 4
G ur mind er S ing h-08 146 70
M a nik B a ins -08 17 766
G r o up -5
AGENDA
Introduction
2
INTRODUCTION
A computer exploit is software or a piece of code that
recognizes the weakness of security in a particular
system or an application. By detecting, it gives
advantage of them and helps cyber criminals to hack
the system.
3
TYPES OF COMPUTER
EXPLOITS
- Kno w n E xp lo it s
- Unk no w n E xp lo it s
KNOWN EXPLOITS
Known exploits are those which have been examined already by experts
in cybersecurity.
By releasing the patches, the information delivers the full list of fixed
issues with the help of the latest version.
5
UNKNOWN EXPLOITS
It gives plenty of opportunities to the hackers due to nobody yet identified the
solution to fix this issue.
6
EXAMPLES OF COMPUTER
EXPLOITS
-MALWARE
-PHISHING
-DENIAL OF SERVICE (DOS) ATTACKS
-SQL INJECTION
-INSIDER THREATS
MALWARE
Malware is software designed to harm computer
systems, steal data or take control of a computer
system. Common types of malware include viruses,
trojans, worms, and ransomware.
8
STRATEGIES TO PROTECT AGAINST MALWARE
9
PHISHING
Phishing is a technique used to trick users into giving
away their sensitive information such as login
credentials, financial information, or personal details.
Phishing attacks typically come in the form of emails,
phone calls, or text messages.
10
STRATEGIES TO PROTECT AGAINST PHISHING
• Employee training
• Multi-factor authentication
• Spam filters
• Web filters
11
DENIAL OF SERVICE
(DOS) ATTACKS
DoS attacks are intended to overwhelm a computer
system or network, rendering it inaccessible to
legitimate users.
Types of DoS attacks (Distributed Denial of Service
(DDoS), Application Layer DoS, etc.)
12
STRATEGIES TO PROTECT AGAINST DOS ATTACKS
• Firewalls
• Load balancers
• Intrusion detection and prevention systems (IDPS)
• VPN
• Anti-Spam
13
SQL INJECTION
SQL injection attacks involve exploiting vulnerabilities in
a web application's code to gain access to a database or
execute unauthorized commands. Attackers can use SQL
injection to steal sensitive data or modify the contents
of a database.
14
STRATEGIES TO PROTECT AGAINST SQL INJECTION
• Parameterized queries
• Input validation
• Database privileges
• Access controls
15
INSIDER THREATS
Insider threats refer to the risk or potential harm posed
to an organization's security, data, or assets by its own
employees, contractors, or other trusted individuals
with authorized access to the organization's systems
and information.
16
STRATEGIES TO PROTECT AGAINST INSIDER
THREATS
• Employee training
• Access controls
• Monitoring and auditing
• Ransomware protection
• Implement security software and appliances
17
References
Belcic, I. (2023, March 15). avast. Retrieved from www.avast.com: https://www.avast.com/c-malware