Want to make creations as awesome as this one?

More creations to inspire you

Transcript

Basic Terminology Related To Security

1.) Vulnerabilites : Is a weakness that can be exploited by cyber criminals to gain unauthorized access to a computer system. Vulnerabilities is like a "Open Door" for Hacker.2.) Exploit : With the help of vulnerability hacker gain access to system.

A network vulnerability is a weakness or flaw in software, hardware, or organizational process, which when compromised by the hacker, can result in a security breach.

What is Network Security?

Passive Attack

Types of Network AttAcks

Active Attack

The system tries to learn or utilize information without affecting its resources.

Passive Attack is a danger to Confidentiality.

It is very difficult to detect because they do not involve any alteration of the data.

Example of Passive Attack, 1.) Scanning a device connected to the network. 2.) Monitoring internet traffic to build data such as who is visiting what website and how frequently.

Attempts to alter system resources or affect their operation.

Active Attack is a danger to Integrity as well as availability.

Can be easily detected, because unauthorized user trying to manipulate the confidential data.

Passive Attack is a danger to Confidentiality.

Full form of DDOS is Distributed Denial Of Service.

DDOS

Denial of Service (DoS) refers to a type of cyberattack in which an attacker seeks to make a computer system, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate or excessive traffic.

DOS

MITM

Firewalls act as a barrier between a trusted internal network and untrusted external networks, controlling the flow of traffic based on defined rules.

Misconfigured Firewall

Full form of MITM is Man In The Middle.The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being transmitted.

Regulatory Compliance Issue

Write a cool subtitle

Disruption Of Services

Financial Loss

Trust

Effects of netwORk attacks on the charity

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.
  • Activate and surprise your audience.

Create a new layer with all the Genially features.

Bring it to life with an interactive window

Got an idea?

  • Generate experiences with your content.
  • It’s got the Wow effect. Very Wow.
  • Make sure your audience remembers the message.
  • Activate and surprise your audience.

Create a new layer with all the Genially features.

Bring it to life with an interactive window

Got an idea?

The primary goal of a Denial of Service attack is to disrupt the normal functioning of the targeted system, rendering it slow, unresponsive, or completely inaccessible. As shown in the above video.

Misconfigurations in firewalls can be exploited to launch DoS attacks. For instance, if the firewall rules are not set up to handle excessive incoming traffic, it may become overwhelmed and lead to service disruptions.

Effects of Misconfigured Firewall