Professional Documents
Culture Documents
CCL PPT Final - PPTX (Autosaved)
CCL PPT Final - PPTX (Autosaved)
CCL PPT Final - PPTX (Autosaved)
IP spoofing.
password cracking.
Denial of service attacks.
IP spoofing
Refers to a creation of IP packets with forced sources IP
address with the purpose of concealing the identity of
sender.
Mostly used in Denial-of-Service attacks.
Most effective in computer networks where users can log
in without a username or password.
Denial-of-Service attacks
Phishing
Ping flood
Udp flood
malformed web queries
e-mail spam
SQL injection
Web sites defacing
Botnets
HOW DOES THE ATTACK TOOK PLACE?
SQL injection
• Type of cyber attack
• SQL code ( structured query language)
• Gain information
• Continues buffering
• EASIER
• ANONYMOUS
• MASS EFFECT
How real is the threat of
cyber terrorism?
The Potential threat posed by cyber terrorism has provoked
considerable alarm.
Psychological, Political and Economic forces have combined
to promote the fear of cyber terrorism.
Cyber Terrorism – An attractive option for terrorist.
Hazardous damages caused by cyber terrorism to Nation.
Nuclear Weapons and other Sensitive Military Systems , as
well as the computer system of CIA and FBI , are “air-
gapped”, making them inaccessible to outside hackers.
CASE STUDY -2