Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

T.

R
Izmir Bakircay University
Faculty of Economics and Administrative Sciences Management Information Systems
Undergraduate Program

Prepared By:
Yağmur Şahin
201005019

Lecturer:
Asst. Prof. HUNAIDA AVVAD

İzmir-2024
What is cyber attack?
It’s a gloating activities that wants to give harm to computer system, network or digital
substructure. These attacks generally happen from malware (viruses, worms, trojans, etc.),
information theft, phishing, DDoS (Denial of Service) attacks, or unauthorized access to
information systems type of attacks.
What is Bruce Force Attack?
Bruce Force attack unlike other cyber attack tactics, Brute Force attacks; it target weak or
predictable usernames and passwords, not choosing security vulnerabilities on websites.
In Brute Force attacks, different username and password combinations are used, hoping that
one of them will be valid, and attempts are made to crack the passwords. The goal here is to
provide access to a restricted resource, such as an administrator account or a password-
protected page. Attackers may want to steal information or infect sites with malware.
It is a simple attack method but has a high success rate.
How it is work?
Attackers have lists of commonly used credentials and real user credentials obtained through
security breaches or the dark web. Bots systematically attack websites, testing these lists of
credentials and notifying the attacker when they gain access.
How we can protect ourselves?
Using strong passwords prevents identity theft, data loss, and unauthorized access to accounts
and provides better protection. It is necessary to increase the password length; passwords that
are difficult to guess and contain a large number of characters should be used. Five-character
passwords can be cracked in a few seconds, 10-character passwords take a few years to crack,
and 20-character passwords take almost forever, so it's better to make our choices accordingly.
Information that can be found on the internet (such as the names of family members, and the
city you live in) should definitely not be included in your passwords.
Birthday Attack Cyber Attack
Birthday Attack Cyber Attack belongs to the family of brute force attacks and is based on the
probability theorem. Birthday Attack is a cryptographic attack. The reason it was a successful
attack is based on the birthday paradox problem. It is designed to take advantage of
communication between two parties. It depends on the commonality found between a fixed
degree of permutation. The Birthday Paradox Problem means that, according to probability
theory, if there are ”n” people in a room, there is a probability that a very small number of
them will have a birthday on the same day. But the important thing to note here is that we are
not matching a specific date of birth, but looking at 2 people who share birthdays.
SHA (Secure Hash Algorithm) is one of the secure hashing algorithms. These algorithms are
used to convert data into fixed character strings of a certain size, and this conversion is
important for verifying the integrity of data, authentication, creating digital signatures, and
similar security purposes.
What is SHA?
SHA algorithms are known for their ability to produce unique and secure summaries of data.
Due to these features, they are used in many areas such as digital security applications, data
integrity control and digital signature creation. However, older versions such as SHA-1 are no
longer considered secure and stronger versions must be used.

You might also like