Want to create interactive content? It’s easy in Genially!
Semicircle Mind Map
Shushant Tripathi
Created on November 20, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
What is Network Security?
A network vulnerability is a weakness or flaw in software, hardware, or organizational process, which when compromised by the hacker, can result in a security breach.
1.) Vulnerabilites : Is a weakness that can be exploited by cyber criminals to gain unauthorized access to a computer system. Vulnerabilities is like a "Open Door" for Hacker. 2.) Exploit : With the help of vulnerability hacker gain access to system.
Basic Terminology Related To Security
Active Attack
Types of Network AttAcks
Passive Attack
DOS
Denial of Service (DoS) refers to a type of cyberattack in which an attacker seeks to make a computer system, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate or excessive traffic.
DDOS
Full form of DDOS is Distributed Denial Of Service.
Full form of MITM is Man In The Middle. The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being transmitted.
Misconfigured Firewall
Firewalls act as a barrier between a trusted internal network and untrusted external networks, controlling the flow of traffic based on defined rules.
MITM
Effects of netwORk attacks on the charity
Trust
Financial Loss
Disruption Of Services
Write a cool subtitle
Regulatory Compliance Issue
Got an idea?
Bring it to life with an interactive window
Create a new layer with all the Genially features.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
Got an idea?
Bring it to life with an interactive window
Create a new layer with all the Genially features.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
The primary goal of a Denial of Service attack is to disrupt the normal functioning of the targeted system, rendering it slow, unresponsive, or completely inaccessible. As shown in the above video.
Effects of Misconfigured Firewall
Misconfigurations in firewalls can be exploited to launch DoS attacks. For instance, if the firewall rules are not set up to handle excessive incoming traffic, it may become overwhelmed and lead to service disruptions.