0% found this document useful (0 votes)
57 views3 pages

Murli, CSS Assignment

The document discusses various types of cyber attacks, including phishing, backdoor attacks, and the methods attackers use to manipulate victims. It highlights the importance of mutual authentication and detection measures to prevent such attacks. Additionally, it outlines the tactics employed by attackers to gain unauthorized access and control over systems and sensitive information.

Uploaded by

jhamurli40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
57 views3 pages

Murli, CSS Assignment

The document discusses various types of cyber attacks, including phishing, backdoor attacks, and the methods attackers use to manipulate victims. It highlights the importance of mutual authentication and detection measures to prevent such attacks. Additionally, it outlines the tactics employed by attackers to gain unauthorized access and control over systems and sensitive information.

Uploaded by

jhamurli40
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
[ Assignment “1 J [ess] Monti Nath Jha a BL be Shon poles 90’ 4. Mar Sn the Nidle Attack (HZIHA) "Tk Gs a cyber attock where the Otorket _seenelely welays and possi alhns oe Communion Hw tHe parties ube behave phat dhe ee directly Communi(oting with each ofhert, aS Ho atlackor has jnsorte! dhersclias ibelweern” She wo parchas, One oareph $ MITNA adbhek ud Oa Secre aoe ety whith dhe otlacke: male in leperclert Corrections with He vichims & velaus messages blu Sher male them belie they anc Jaleig BIEN AM diche llops over G pruvakt conrecher wen srlact esthe ert corvers ashur 15 contnolled Phe ablacker, The ctlacker must de abe tatermpt “alll nelevert messages posing bh te tuo vid 5 & foject new Ones- as Strqigh-femward YA MOY Ssttum stoners. lor & within the “necephon nanges Gl on i feted Ged) Setcnest ees es epaic cbs axttlelnd at OireS 40 sweet mutual authertichin. *MITHA fan’ be prevent an deleted 40d means awtherHtatioo & Bepet detection. Aterteotisn peace chee of colada thad a Bier menage bas ere bor a Jeoihimak sovece. Tan myer detechion roy Shows evden 4ho4 Beige sme dolelben altene » 7 Conifer austen THTTP heblic hey Plonicg -7 Mo clericg tenero 9. Phising Attack '— f El i 3a W ig attack, an attacker gends dhe fraudlerd Cyr spooked), fake ° Cte wise ckcaptie? messa desi. do ‘tide a porn fto a ‘9 sensitive. Fokatrotion do dhe atlacker’ on Jo cleploy malts Soltwane oF the Victims Yalastctse ike mansemuare . Pur acs chose cbtteré fntneasing) Sophistioted § oft heanspanonty mission the Sie berg dangekd , a Llewig dhe atlackert go Observe every thee while Ihe vichme ig ravigatig Like iP, i troverse any additional security boerdaves ont He vichen. The Fixst sttoncled vse a athe Herr “Phisicg” rvas Jn she cnockirg toolkit POMEL create! by Kewilah fekKoUche vin 19.95. “Aterots Jo 5 f j ic ir mpts Jo prtvert 07 navigak te fmpack of phising Freiclents intldes degis (ation , user aed au ae 1enes6 bp $e Bist = ay MASE. : “> Zipes oh phisiog \- Email Presi 5) Voice phis | DS pear Phisng 6) SHS phisi | 5) whalieg A CEO Fravd D) Pege Nijac hi 4) Clare Pring 8) lercla Phssicg 3) Reerok Bile Fholusiog Husa ype of veb wieesabiy hod iS Comme feed Jo offectuch — oplietors that selly ono Scriptirg sun dime his ie is Gus) wher an applitation builds a pot onewiebe cole sing Or abtacker cortplte) arabe sn a way thot allous ole attacker to Conrbol which Pile J exearkd Gr sucrtime - Sterssfully Gplitable a Fle Foclusise whenabil will oesol so error alfeckd web oppiatin. An cHlaskerr cor use creole Code entity fo ciak 6 ueb Geller phe yeb xrven ebb or # caer webs/t clefecerrert- AFI inclide wierabilify as distinct Bor a gerenic dicks Aevriel atlack, 8a dhed dis dravenol Js a wey ining eraut heauses file aystro access 8 File trclusion tinea uw! cobrents bow an appreciation ceoads ecde for execerhar. =7 Sypes 4 Sodlustoo '- 1) Remo File SncbusdO'- Ocaxs when the uch opplitohoO down lecdls ond Crews Acverok file, Thec memet Glee ane vsvally cbteoe! sa jhe Rem of an HTTP or (OP ORZ as a wet spe poramek7 do the ueb appliteden- ‘\ Backdoan Attack '- a i Fh eyporsrwaty toms ; 2 backdearr attack is on attmpt Jo fofi Peak a Systeeo a 0 nelulk by maliunusly Sabiog advan tage of Sofeerre tak point “Backdoans oiow fre a Hackers the Sash protoco CS SPeAPlart do of ey get into dhe Eyer oy ie 2 gain Od ministritedive ores. He de he oreal-Lfe S10 bho. Adlvardage ob the paphol R eels (ied Mais rah) la "boclederne enter? te5 Conclocsheg she elt. 4g : ss . Alkn Piieg igh Jere) Od minis teadive Percerdege dhe cuberr qthekert Covbl Porfevwn VOUS desks bile iyjecti Of Pyware, Joie emok Aerss, hack she device , Sia! seny'tie Ffermabon, emo he gystin thyputh mangymunne q mony mone - Backcbans ant onginaly Mmeors fey epi Sofhoare developens 4 ests = yes of Bac kedlean '- ) Ad minishative TD Halivos boc ledoorr "e} Potter Bors dhs atock t cho, ehwark | keep Frewall OV, Hop; 2) okies Rome busting A uxh sone pans) COrloie messages to a eg so thot Abe web server Gem monstr She user's activity ef % porwr nebsite, the MRSORS ore brow ag Cookies Jt iS A Sma piece o foferreation Shot 0 ucbste shors on (yee | Gmprt ,£ wes ax ot dhe dime 4 gore PHracdiee on Hot uebs/t. | wher Spue visi} dhe uebsik QM, gtr byowsen sends dhe | Toleornation Jack do dhe s/t. * The main aim + (ORIRS 3S to Fdendiy eesores Livers & perhaps Pricpane avthorigd web pags x Shen: web framing attacks such as Aijackicg use efarmes do jack a ; visors a: setsioo. The mast larmon ale} ite elle Rome shes, i ; \« » eT Yael pacverts asik fon fonchdo icf wher Jaded aside a Kame. a + dime Intowal at eae buastirg alles fe mone packet por F i ee . them — serzs- she cost af wat Pr o decievin do which beggars hake | @ ste delavt posewerd, months tx opps Rk extinsions Sastell atin ,

You might also like