0% found this document useful (0 votes)
50 views

Cyber Attacks and Its Prevention

The document discusses cyber attacks and their prevention. It defines cyber attacks as invasions of computer networks and data intended to cause damage. It outlines several major types of cyber attacks, including denial of service attacks, phishing, cross-site scripting, SQL injection, brute force attacks, and zero-day exploits. It then provides ways to prevent cyber attacks for both personal and industry use, such as using multifactor authentication, firewalls, antivirus software, and cloud data storage. The document concludes by asking if the reader is aware of any recent cyber attacks and inviting any questions.

Uploaded by

Daivik Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Cyber Attacks and Its Prevention

The document discusses cyber attacks and their prevention. It defines cyber attacks as invasions of computer networks and data intended to cause damage. It outlines several major types of cyber attacks, including denial of service attacks, phishing, cross-site scripting, SQL injection, brute force attacks, and zero-day exploits. It then provides ways to prevent cyber attacks for both personal and industry use, such as using multifactor authentication, firewalls, antivirus software, and cloud data storage. The document concludes by asking if the reader is aware of any recent cyber attacks and inviting any questions.

Uploaded by

Daivik Parmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CYBER-ATTACKS

AND ITS PREVENTIONS


ARSH AJMERI (146778)
DAIVIK PARMAR (146440)
IT-201
CONCORDIA UNIVERSITY OF EDMONTON
WHAT IS A CYBER-ATTACK?

CYBER-ATTACK IS A OFTEN HEARD WORD IN TODAY’S WORLD THAT


CAN BE ASSOCIATED WITH MANY TERMS OR PROCESSES SUCH AS
CYBER-WARFARES, CYBERTERRORISM, HACKTIVISM, AND CYBER-
THREATS(RANSOMWARE). CYBER-ATTACK IS A FORM OF INVASION
OF COMPUTER-ORIENTED NETWORKS AND TO DATA WITH THE
INTENTION TO CAUSE DAMAGE AND TROUBLE TO A COMPUTER-
ORIENTED SYSTEM AND TO THE USER INTERFACE.
MAJOR TYPES OF CYBER-ATTACKS
• DENIAL OF SERVICE ATTACK (DDoS)
The word “Denial” in the term Denial of service attacks states the way of restricting a task or obstructing its access to the authorized user of a
designated network server or a machine. The main intention behind it is to crash the systems and block access by creating an increase in the
flow of traffic in the packets which leads to a system failure.

• PHISHING
The term ‘Phishing’ came into existence through the same process we humans carry out the process of ‘fishing’. While fishing, we look for fish
by hanging some fish food at the end of the fishing rod, the same way people who carry out phishing look for people like us. In phishing, they
try sending out emails, texts, and even making calls and might ask you to access a malicious link that at times provides them remote access to
your device, network, and server or might even compromise personal or confidential information. Spoofing is also a kind of phishing.

• CROSS-SITE SCRIPTING
Cross-site scripting is identical to phishing the major difference between the two is that in cross-site scripting the attackers use a medium of
legitimate websites or applications to run their malicious scripting which gets to the user in form of code of the website or the application
and prompts them.
(i) Stored persistent cross-site scripting
(ii) Reflected cross-site scripting
(iii) Self cross-site scripting
(iv) Blind cross-site scripting
• SQL INJECTION
SQL() Injection is another type of cyber attack in which self-created SQL (Structured query language )
scripts are been used for the manipulation of databases to get access to information that was not meant to
be distributed to an unauthorized person, such as data on medical history and research, Scientific data, and
government confidential information. This might even be the core reason for cyber-terrorism and
ransomware.

• BRUTE FORCE ATTACK


A brute Force Attack is a kind of cyber-attack in which an individual might try to eventually guess the
password or the login information using software that uses an automated algorithm that provides a
multiple set of combinations to an individual until the right set of combinations has been entered. Brute
Force attacks are mostly “trial and error” based.

• ZERO-DAY EXPLOIT
Zero Day Exploit attacks occur due to vulnerabilities in the software or the application. The attackers target
the loopholes they find in the software and the attacks occur so quickly that there is barely a reaction time
for the cyber-security analyst to fix the security glitches, and bugs and create a suitable firewall or make
changes to it.
HOW TO PREVENT CYBER-ATTACKS
WAYS TO AVOID CYBER ATTACKS IN WAYS TO PREVENT CYBER ATTACKS IN
PERSONAL LIVES INDUSTRIES
• Use of multi-factor authentication. • Creating a suitable firewall that prevents and
filters unwanted data from getting onto your
• Keeping your OS system, software, and installed
networks.
applications up-to-date.
• Using software such as “Crowd Strike” allows
• Avoid accessing sketchy links, websites, and
you to create a suitable firewall and keeps your
portals. network and VMs safe.
• Use an antivirus total protection for all • Providing contracts to Cybersecurity firms such
electronic devices. as Act Zero, Cisco, IBM, etc.
• Using a safe browser such as ‘Microsoft Edge’ to • Instead of saving the user and firm data
browse. physically save it on the cloud such as google
• Create a password with a combination of Upper cloud, azure cloud (Microsoft ), or Amazon Drive.
case and lower case letters, using signs such as Which keeps the user and firm data safe and
‘@’, ‘#’, and ‘$’ and using numbers. also provides a regular backup.
ARE YOU AWARE OF ANY RECENT CYBER-ATTACK?
ANY QUESTIONS?

THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy