Semicircle Mind Map
Shushant Tripathi
Created on November 20, 2023
More creations to inspire you
Transcript
Basic Terminology Related To Security
1.) Vulnerabilites : Is a weakness that can be exploited by cyber criminals to gain unauthorized access to a computer system. Vulnerabilities is like a "Open Door" for Hacker.2.) Exploit : With the help of vulnerability hacker gain access to system.
A network vulnerability is a weakness or flaw in software, hardware, or organizational process, which when compromised by the hacker, can result in a security breach.
What is Network Security?
Passive Attack
Types of Network AttAcks
Active Attack
The system tries to learn or utilize information without affecting its resources.
Passive Attack is a danger to Confidentiality.
It is very difficult to detect because they do not involve any alteration of the data.
Example of Passive Attack, 1.) Scanning a device connected to the network. 2.) Monitoring internet traffic to build data such as who is visiting what website and how frequently.
Attempts to alter system resources or affect their operation.
Active Attack is a danger to Integrity as well as availability.
Can be easily detected, because unauthorized user trying to manipulate the confidential data.
Passive Attack is a danger to Confidentiality.
Full form of DDOS is Distributed Denial Of Service.
DDOS
Denial of Service (DoS) refers to a type of cyberattack in which an attacker seeks to make a computer system, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate or excessive traffic.
DOS
MITM
Firewalls act as a barrier between a trusted internal network and untrusted external networks, controlling the flow of traffic based on defined rules.
Misconfigured Firewall
Full form of MITM is Man In The Middle.The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being transmitted.
Regulatory Compliance Issue
Write a cool subtitle
Disruption Of Services
Financial Loss
Trust
Effects of netwORk attacks on the charity
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
Create a new layer with all the Genially features.
Bring it to life with an interactive window
Got an idea?
- Generate experiences with your content.
- It’s got the Wow effect. Very Wow.
- Make sure your audience remembers the message.
- Activate and surprise your audience.
Create a new layer with all the Genially features.
Bring it to life with an interactive window
Got an idea?
The primary goal of a Denial of Service attack is to disrupt the normal functioning of the targeted system, rendering it slow, unresponsive, or completely inaccessible. As shown in the above video.
Misconfigurations in firewalls can be exploited to launch DoS attacks. For instance, if the firewall rules are not set up to handle excessive incoming traffic, it may become overwhelmed and lead to service disruptions.
Effects of Misconfigured Firewall