SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Department of Computer
Science & Engineering
Topic : System Based Attacks
Name: Souma Maiti
Roll No. : 27500120016
Subject: Cyber Security
Subject Code : PEC-CS702E
Year : 4th Year Semester: 7th
INTRODUCTION
• A cyber-attack is an exploitation
of computer systems and
networks. It uses malicious code
to alter computer code, logic or
data and lead to cybercrimes,
such as information and identity
theft.
• We are living in a digital era. Now
a day, most of the people use
computer and internet. Due to
the dependency on digital things,
the illegal computer activity is
growing and changing like any
type of crime.
System Based Attacks
These are the attacks which are intended to
compromise a computer or a computer network.
Some of the important system-based attacks are
as follows-
1. Virus
It is a type of malicious software program that
spread throughout the computer files without
the knowledge of a user. It is a self-replicating
malicious computer program that replicates by
inserting copies of itself into other computer
programs when executed. It can also execute
instructions that cause harm to the system.
2. Worm
It is a type of malware whose primary function is to
replicate itself to spread to uninfected computers. It
works same as the computer virus. Worms often
originate from email attachments that appear to be from
trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes
to computer setting and unusual activity, even when the
computer should be idle. It misleads the user of its true
intent. It appears to be a normal application but when
opened/executed some malicious code will run in the
background.
4. Backdoors
It is a method that bypasses the normal authentication
process. A developer may create a backdoor so that an
application or operating system can be accessed for
troubleshooting or other purposes.
5. Bots
A bot (short for "robot") is an automated process that
interacts with other network services. Some bots program
run automatically, while others only execute commands
when they receive specific input. Common examples of
bots program are the crawler, chatroom bots, and
malicious bots.
System Based Attacks - CYBER SECURITY

More Related Content

PPT
block ciphers
PPTX
Intruders
PPTX
Intrusion Detection Systems (IDS)
PPT
Logical Clocks (Distributed computing)
PPTX
Intrusion detection
 
PPTX
System and network administration network services
PPT
Software security
PPT
Addressing
block ciphers
Intruders
Intrusion Detection Systems (IDS)
Logical Clocks (Distributed computing)
Intrusion detection
 
System and network administration network services
Software security
Addressing

What's hot (20)

PDF
Classical encryption techniques
PPTX
DoS or DDoS attack
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Transport Layer Security (TLS)
PPTX
Network Forensics
PPTX
Unit 4 - Network Layer
PDF
18CS81 IOT MODULE 4 PPT.pdf
PPTX
Operating system security
PPTX
Security threats
PPTX
Semophores and it's types
PPTX
Transposition cipher techniques
PDF
Information Security Lecture Notes
PDF
Chapter 1 Introduction of Cryptography and Network security
PPTX
Block cipher modes of operation
PPT
Classical Encryption Techniques
PPTX
Introduction to Information Security
PDF
MAC Address – All you Need to Know About it
PPTX
Security services and mechanisms
PPTX
Lecture 1 ddbms
PPTX
Data Encryption Standard (DES)
Classical encryption techniques
DoS or DDoS attack
Block Ciphers and the Data Encryption Standard
Transport Layer Security (TLS)
Network Forensics
Unit 4 - Network Layer
18CS81 IOT MODULE 4 PPT.pdf
Operating system security
Security threats
Semophores and it's types
Transposition cipher techniques
Information Security Lecture Notes
Chapter 1 Introduction of Cryptography and Network security
Block cipher modes of operation
Classical Encryption Techniques
Introduction to Information Security
MAC Address – All you Need to Know About it
Security services and mechanisms
Lecture 1 ddbms
Data Encryption Standard (DES)
Ad

Similar to System Based Attacks - CYBER SECURITY (20)

PPT
CyberSecurity presentation for basic knowledge about this topic
DOCX
External threats to information system: Malicious software and computer crimes
PPTX
Computer Security Presentation
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPTX
Type of Malware and its different analysis and its types !
PPTX
Cyber crimes 12
PPTX
External threats-to-information-system
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Basics of hacking
PPTX
SECURITY THREATS.pptx SECURITY THREATS.pptx
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
PPTX
Cyber crime types
PPTX
Cyber security
PPT
COMPUTER SECURITY
PDF
Computer/Cyber/IT Security MCQ Questions
PPTX
4.2.1 computer security risks
PPT
Computer security: hackers and Viruses
PPTX
Security & Privacy - Lecture B
PPTX
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
CyberSecurity presentation for basic knowledge about this topic
External threats to information system: Malicious software and computer crimes
Computer Security Presentation
Guest Lecture-Computer and Cyber Security.pptx
Type of Malware and its different analysis and its types !
Cyber crimes 12
External threats-to-information-system
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Basics of hacking
SECURITY THREATS.pptx SECURITY THREATS.pptx
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
Cyber crime types
Cyber security
COMPUTER SECURITY
Computer/Cyber/IT Security MCQ Questions
4.2.1 computer security risks
Computer security: hackers and Viruses
Security & Privacy - Lecture B
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Ad

More from Souma Maiti (20)

PDF
Mental Health prrediction system using Machine Learning Algoritms
PDF
Loan Prediction System Using Machine Learning Algorithms Project Report
PPTX
Mental Health Prediction System Using Machine Learning
PDF
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
PPTX
Types of Cyber Security Attacks- Active & Passive Attak
PPTX
E-Commerce Analysis & Strategy Presentation
PPTX
Principles of Network Security-CIAD TRIAD
PDF
Decision Tree in Machine Learning
PDF
Idea on Entreprenaurship
PDF
Operation Research
PDF
Loan Approval Prediction Using Machine Learning
PDF
Constitution of India
PDF
COMIPLER_DESIGN_1[1].pdf
PDF
Heuristic Search Technique- Hill Climbing
DOCX
SATELLITE INTERNET AND STARLINK
PPTX
Fundamental Steps Of Image Processing
PPTX
Join in SQL - Inner, Self, Outer Join
PPTX
K means Clustering Algorithm
PDF
Errors in Numerical Analysis
PPTX
Open Systems Interconnection (OSI) MODEL
Mental Health prrediction system using Machine Learning Algoritms
Loan Prediction System Using Machine Learning Algorithms Project Report
Mental Health Prediction System Using Machine Learning
LOAN APPROVAL PRDICTION SYSTEM USING MACHINE LEARNING.
Types of Cyber Security Attacks- Active & Passive Attak
E-Commerce Analysis & Strategy Presentation
Principles of Network Security-CIAD TRIAD
Decision Tree in Machine Learning
Idea on Entreprenaurship
Operation Research
Loan Approval Prediction Using Machine Learning
Constitution of India
COMIPLER_DESIGN_1[1].pdf
Heuristic Search Technique- Hill Climbing
SATELLITE INTERNET AND STARLINK
Fundamental Steps Of Image Processing
Join in SQL - Inner, Self, Outer Join
K means Clustering Algorithm
Errors in Numerical Analysis
Open Systems Interconnection (OSI) MODEL

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Welding lecture in detail for understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Sustainable Sites - Green Building Construction
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PDF
Digital Logic Computer Design lecture notes
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
R24 SURVEYING LAB MANUAL for civil enggi
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
Welding lecture in detail for understanding
CYBER-CRIMES AND SECURITY A guide to understanding
Lecture Notes Electrical Wiring System Components
Sustainable Sites - Green Building Construction
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...

System Based Attacks - CYBER SECURITY

  • 1. Department of Computer Science & Engineering Topic : System Based Attacks Name: Souma Maiti Roll No. : 27500120016 Subject: Cyber Security Subject Code : PEC-CS702E Year : 4th Year Semester: 7th
  • 2. INTRODUCTION • A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to alter computer code, logic or data and lead to cybercrimes, such as information and identity theft. • We are living in a digital era. Now a day, most of the people use computer and internet. Due to the dependency on digital things, the illegal computer activity is growing and changing like any type of crime.
  • 3. System Based Attacks These are the attacks which are intended to compromise a computer or a computer network. Some of the important system-based attacks are as follows- 1. Virus It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.
  • 4. 2. Worm It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
  • 5. 3. Trojan horse It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background. 4. Backdoors It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. 5. Bots A bot (short for "robot") is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.