You are on page 1of 18

COMPUTER

EXPLOITS AND
STRATEGIES TO
PROTECT
A m it p a l Sing h-0 808 691
S ume e t Jha me t -08 1082 1
S hifa li Verm a- 08 0866 1
R upind er S ing h-0 81 113 4
G ur mind er S ing h-08 146 70
M a nik B a ins -08 17 766
G r o up -5
AGENDA

Introduction​

Types of ​Computer Exploits

Examples of Computer Exploits

Strategies to protect against them

2
INTRODUCTION
A computer exploit is software or a piece of code that
recognizes the weakness of security in a particular
system or an application. By detecting, it gives
advantage of them and helps cyber criminals to hack
the system.

3
TYPES OF COMPUTER
EXPLOITS
- Kno w n E xp lo it s
- Unk no w n E xp lo it s
KNOWN EXPLOITS

Known exploits are those which have been examined already by experts
in cybersecurity.

With the help of known exploits, patches can be created by the


developers to tackle those exploits.

By releasing the patches, the information delivers the full list of fixed
issues with the help of the latest version.

5
UNKNOWN EXPLOITS

Unknown exploits have not been researched or discovered yet by experts in


cybersecurity.

It gives plenty of opportunities to the hackers due to nobody yet identified the
solution to fix this issue.

Hence, we can do nothing to prevent our machines from these exploits.

6
EXAMPLES OF COMPUTER
EXPLOITS
-MALWARE
-PHISHING
-DENIAL OF SERVICE (DOS) ATTACKS
-SQL INJECTION
-INSIDER THREATS
MALWARE
Malware is software designed to harm computer
systems, steal data or take control of a computer
system. Common types of malware include viruses,
trojans, worms, and ransomware.

8
STRATEGIES TO PROTECT AGAINST MALWARE

• Install anti-virus and anti-malware software


• Software updates
• Avoiding unknown sources
• Backing up data

9
PHISHING
Phishing is a technique used to trick users into giving
away their sensitive information such as login
credentials, financial information, or personal details.
Phishing attacks typically come in the form of emails,
phone calls, or text messages.

10
STRATEGIES TO PROTECT AGAINST PHISHING

• Employee training
• Multi-factor authentication
• Spam filters
• Web filters

11
DENIAL OF SERVICE
(DOS) ATTACKS
DoS attacks are intended to overwhelm a computer
system or network, rendering it inaccessible to
legitimate users.
Types of DoS attacks (Distributed Denial of Service
(DDoS), Application Layer DoS, etc.)

12
STRATEGIES TO PROTECT AGAINST DOS ATTACKS

• Firewalls
• Load balancers
• Intrusion detection and prevention systems (IDPS)
• VPN
• Anti-Spam

13
SQL INJECTION
SQL injection attacks involve exploiting vulnerabilities in
a web application's code to gain access to a database or
execute unauthorized commands. Attackers can use SQL
injection to steal sensitive data or modify the contents
of a database.

14
STRATEGIES TO PROTECT AGAINST SQL INJECTION

• Parameterized queries
• Input validation
• Database privileges
• Access controls

15
INSIDER THREATS
Insider threats refer to the risk or potential harm posed
to an organization's security, data, or assets by its own
employees, contractors, or other trusted individuals
with authorized access to the organization's systems
and information.

16
STRATEGIES TO PROTECT AGAINST INSIDER
THREATS

• Employee training
• Access controls
• Monitoring and auditing
• Ransomware protection
• Implement security software and appliances

17
References
Belcic, I. (2023, March 15). avast. Retrieved from www.avast.com: https://www.avast.com/c-malware

FRANKENFIELD, J. (2022, September 30). investopedia. Retrieved from www.investopedia.com:


https://www.investopedia.com/terms/d/denial-service-attack-dos.asp

Grimmick, R. (2022, June 24). varonis. Retrieved from www.varonis.com:


https://www.varonis.com/blog/insider-threats

imperva. (2022). Retrieved from www.imperva.com:


https://www.imperva.com/learn/application-security/sql-injection-sqli/#:~:text=SQL%20injection%2C%2
0also%20known%20as,lists%20or%20private%20customer%20details
.

Moes, T. (2014). softwarelab.org. Retrieved from https://softwarelab.org/:


https://softwarelab.org/what-is-a-computer-exploit/

proofpoint. (2023). Retrieved from www.proofpoint.com:


https://www.proofpoint.com/us/threat-reference/phishing#:~:text=Phishing%20is%20when%20attackers
%20send,credentials%20or%20other%20sensitive%20data
.

VELIMIROVIC, A. (2021, December 2). phoenixnap. Retrieved from www.phoenixnap.com: 18


https://phoenixnap.com/blog/prevent-ddos-attacks

You might also like