Want to create interactive content? It’s easy in Genially!

Get started free

Semicircle Mind Map

Shushant Tripathi

Created on November 20, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

What is Network Security?

A network vulnerability is a weakness or flaw in software, hardware, or organizational process, which when compromised by the hacker, can result in a security breach.

1.) Vulnerabilites : Is a weakness that can be exploited by cyber criminals to gain unauthorized access to a computer system. Vulnerabilities is like a "Open Door" for Hacker. 2.) Exploit : With the help of vulnerability hacker gain access to system.

Basic Terminology Related To Security

Active Attack

Types of Network AttAcks

Passive Attack

DOS

Denial of Service (DoS) refers to a type of cyberattack in which an attacker seeks to make a computer system, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate or excessive traffic.

DDOS

Full form of DDOS is Distributed Denial Of Service.

Full form of MITM is Man In The Middle. The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being transmitted.

Misconfigured Firewall

Firewalls act as a barrier between a trusted internal network and untrusted external networks, controlling the flow of traffic based on defined rules.

MITM

Effects of netwORk attacks on the charity

Trust

Financial Loss

Disruption Of Services

Write a cool subtitle

Regulatory Compliance Issue

Got an idea?

Bring it to life with an interactive window

Create a new layer with all the Genially features.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.
  • Activate and surprise your audience.

Got an idea?

Bring it to life with an interactive window

Create a new layer with all the Genially features.

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.
  • Activate and surprise your audience.

The primary goal of a Denial of Service attack is to disrupt the normal functioning of the targeted system, rendering it slow, unresponsive, or completely inaccessible. As shown in the above video.

Effects of Misconfigured Firewall

Misconfigurations in firewalls can be exploited to launch DoS attacks. For instance, if the firewall rules are not set up to handle excessive incoming traffic, it may become overwhelmed and lead to service disruptions.