Want to create interactive content? It’s easy in Genially!
Semicircle Mind Map
Shushant Tripathi
Created on November 20, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Basic Terminology Related To Security
1.) Vulnerabilites : Is a weakness that can be exploited by cyber criminals to gain unauthorized access to a computer system. Vulnerabilities is like a "Open Door" for Hacker. 2.) Exploit : With the help of vulnerability hacker gain access to system.
What is Network Security?
A network vulnerability is a weakness or flaw in software, hardware, or organizational process, which when compromised by the hacker, can result in a security breach.
Types of Network AttAcks
Active Attack
Passive Attack
DDOS
Full form of DDOS is Distributed Denial Of Service.
DOS
Denial of Service (DoS) refers to a type of cyberattack in which an attacker seeks to make a computer system, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate or excessive traffic.
Misconfigured Firewall
Firewalls act as a barrier between a trusted internal network and untrusted external networks, controlling the flow of traffic based on defined rules.
MITM
Full form of MITM is Man In The Middle. The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being transmitted.
Effects of netwORk attacks on the charity
Trust
Regulatory Compliance Issue
Disruption Of Services
Financial Loss
Write a cool subtitle
Got an idea?
Bring it to life with an interactive window
Create a new layer with all the Genially features.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
Got an idea?
Bring it to life with an interactive window
Create a new layer with all the Genially features.
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
The primary goal of a Denial of Service attack is to disrupt the normal functioning of the targeted system, rendering it slow, unresponsive, or completely inaccessible. As shown in the above video.
Effects of Misconfigured Firewall
Misconfigurations in firewalls can be exploited to launch DoS attacks. For instance, if the firewall rules are not set up to handle excessive incoming traffic, it may become overwhelmed and lead to service disruptions.