SlideShare a Scribd company logo
2
Most read
9
Most read
S.M.Towhidul Islam
181-35-2435
Cyber Security Fundamentals(Imtiaz Murshed Sir)
Following Information WE Should
Know
1. What is Cyber security?
2. Types of Cyber Attacks..
3. Web Based Attacks ….
4. System Based Attacks….
Cyber Security
•Cyber security is a practice which intends to protect
computers, networks, programs and data from
unintended or unauthorized access, change or
destruction …
What is cyberAttack ?
•An attempt by hackers to damage or
destroy a computer network or system.
Types of Attack !
• Web Based Attack:
These are attack on a website or web
application…
• System Based Attack:
Attacks that are intended to compromise a
computer or a computer network…
Web BasedAttack
• DoS
• dDoS
• Brute Force
• Session Hijacking
• Man in Middle
• sQl Injection
• Phishing
• Sniffing
• Spoofing
• Social engineering
• Whaling
System BasedAttacks
• Virus
•worms
•Trojan Horse
•Back Doors
•Bots
Web Based Attack
Dos Attack: A DOS attack is an attempt to make a system or server unavailable for legitimate users and
finally, to take the service down.
SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications, in which
anonymously statements are inserted into an entry field for execution.
Brute Force: A Brute Force Attack is the simplest method to gain access to a site or server. It tries various
combinations of usernames and passwords again and again until it gets in.
MIMA: MIMA-Attacker intercept the connection between client and server and acts as a bridge between
them.
Snipping Attack: Sniffer Attack- A sniffer is an application or device that can read, monitor, and capture
network data exchanges and read network packets.
Phishing Attack: Phishing- is the attempt to obtain sensitive information by disguising as a trustworthy
entity in an electronic communication.
Social engineering: Social engineering is a form of techniques employed by cybercriminals designed
to lure unsuspecting users into sending them their confidential data, infecting their computers with
malware or opening links to infected sites.
WHALING: A whaling attack is a kind of phishing scam and CEO fraud that targets high profile executives with
access to highly valuable information.
System Based Attack
VIRUS: A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to
replicate itself.
WORMS: A computer worm is a standalone Malware computer program that replicates itself in order to spread
other computers
TROJAN HORSE: Trojan horse is a program that claims to rid your computer of viruses but instead introduces
viruses onto your computer.
BACKDOOR: A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a
computer or its data.
BOTNET: A botnet is a group of computers connected in a coordinated fashion for malicious purposes.
THANK YOU

More Related Content

PDF
Recent cyber Attacks
PPTX
Introduction to information security
PPTX
Types of Cyber-Attacks
DOCX
CLASS VII COMPUTER SECURITY
PPTX
Cyber attack
DOCX
Cyer security
PPTX
Network security (vulnerabilities, threats, and attacks)
Recent cyber Attacks
Introduction to information security
Types of Cyber-Attacks
CLASS VII COMPUTER SECURITY
Cyber attack
Cyer security
Network security (vulnerabilities, threats, and attacks)

What's hot (20)

PPT
1 security goals
PPTX
Computer security threats & prevention
PPT
Trojan horse nitish nagar
PDF
Cyber Attack Analysis
PPTX
Security threats and safety measures
DOCX
Cyber
PPTX
Cyber threats
PPTX
Dos attack
PPTX
Cyber crime , threats and their security measures
PPTX
Cyber security
PPTX
Computer virus
PPTX
Information Technology - System Threats
PPTX
IT Security Presentation
PDF
Cyber security slideshare_oct_2020
PPTX
Computer Security 101
PPTX
1.2 security 1
PPTX
Hacking and virus presentation
PPTX
cyber_security
PPTX
Basic concepts in computer security
PPS
Virus & Computer security threats
1 security goals
Computer security threats & prevention
Trojan horse nitish nagar
Cyber Attack Analysis
Security threats and safety measures
Cyber
Cyber threats
Dos attack
Cyber crime , threats and their security measures
Cyber security
Computer virus
Information Technology - System Threats
IT Security Presentation
Cyber security slideshare_oct_2020
Computer Security 101
1.2 security 1
Hacking and virus presentation
cyber_security
Basic concepts in computer security
Virus & Computer security threats
Ad

Similar to Attack types (20)

PPTX
A Taken on Cyber Attacks - The Cyber Physical System.pptx
PPTX
Cyber.pptx
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
3-types of attacks_Types of attacks.pptx
PPTX
Types of Cyber Attacks
PPTX
Types of attacks in cyber security
PPTX
cybersecurity
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
PPTX
Cyber Crime And Security
PPTX
CyberSecurity and Importance of cybersecurity
PPT
Computer Security
PPT
Computer Security
PPTX
Types of cyber attacks
PPTX
Cyber Crime And Cyber Security
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
PPTX
Cyber security
PPTX
unit 5 FCS efujhgdkkifevnurdviutfjiutdffgii
PPT
Types of attack -Part2
PPTX
Exploring the Spectrum of Cyber Attacks .pptx
A Taken on Cyber Attacks - The Cyber Physical System.pptx
Cyber.pptx
SEMINAR ON CYBER SECURITY.pptx
3-types of attacks_Types of attacks.pptx
Types of Cyber Attacks
Types of attacks in cyber security
cybersecurity
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx c...
Cyber Crime And Security
CyberSecurity and Importance of cybersecurity
Computer Security
Computer Security
Types of cyber attacks
Cyber Crime And Cyber Security
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
Cyber security
unit 5 FCS efujhgdkkifevnurdviutfjiutdffgii
Types of attack -Part2
Exploring the Spectrum of Cyber Attacks .pptx
Ad

More from S.M. Towhidul Islam (6)

PPTX
Enterprise resource planning(ERP)
PDF
Endpoint security
PDF
Cryptography
PPTX
Internal audit
PPTX
Sensitive data
PPTX
Sub-Queries
Enterprise resource planning(ERP)
Endpoint security
Cryptography
Internal audit
Sensitive data
Sub-Queries

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPT
What is a Computer? Input Devices /output devices
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
The various Industrial Revolutions .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
O2C Customer Invoices to Receipt V15A.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Modernising the Digital Integration Hub
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
DP Operators-handbook-extract for the Mautical Institute
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
Programs and apps: productivity, graphics, security and other tools
Enhancing emotion recognition model for a student engagement use case through...
What is a Computer? Input Devices /output devices
Getting started with AI Agents and Multi-Agent Systems
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
The various Industrial Revolutions .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Group 1 Presentation -Planning and Decision Making .pptx
Module 1.ppt Iot fundamentals and Architecture
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
O2C Customer Invoices to Receipt V15A.pptx

Attack types

  • 1. S.M.Towhidul Islam 181-35-2435 Cyber Security Fundamentals(Imtiaz Murshed Sir)
  • 2. Following Information WE Should Know 1. What is Cyber security? 2. Types of Cyber Attacks.. 3. Web Based Attacks …. 4. System Based Attacks….
  • 3. Cyber Security •Cyber security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction …
  • 4. What is cyberAttack ? •An attempt by hackers to damage or destroy a computer network or system.
  • 5. Types of Attack ! • Web Based Attack: These are attack on a website or web application… • System Based Attack: Attacks that are intended to compromise a computer or a computer network…
  • 6. Web BasedAttack • DoS • dDoS • Brute Force • Session Hijacking • Man in Middle • sQl Injection • Phishing • Sniffing • Spoofing • Social engineering • Whaling
  • 8. Web Based Attack Dos Attack: A DOS attack is an attempt to make a system or server unavailable for legitimate users and finally, to take the service down. SQL Injection: SQL injection is a code injection technique, used to attack data-driven applications, in which anonymously statements are inserted into an entry field for execution. Brute Force: A Brute Force Attack is the simplest method to gain access to a site or server. It tries various combinations of usernames and passwords again and again until it gets in. MIMA: MIMA-Attacker intercept the connection between client and server and acts as a bridge between them. Snipping Attack: Sniffer Attack- A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. Phishing Attack: Phishing- is the attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication. Social engineering: Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data, infecting their computers with malware or opening links to infected sites. WHALING: A whaling attack is a kind of phishing scam and CEO fraud that targets high profile executives with access to highly valuable information.
  • 9. System Based Attack VIRUS: A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. WORMS: A computer worm is a standalone Malware computer program that replicates itself in order to spread other computers TROJAN HORSE: Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. BACKDOOR: A backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. BOTNET: A botnet is a group of computers connected in a coordinated fashion for malicious purposes.