Thursday, December 19, 2019

Various Types Of Attacks On The Computer Network System

Table of Contents Introduction 3 Thesis Statement 3 Various Types of Attacks on the Computer Network System 4 Direct Attacks 4 Indirect Attacks 4 Effective Database Security Techniques 5 Security through Cryptography 5 Security through Access Control 6 Security through Steganography 6 Security through data scrambling 7 Security through Miscellaneous Techniques 7 Conclusion 8 References 9 The Security Of Database Introduction In the contemporary times, it has been widely believed that the huge computer network platform is considered to be extremely beneficial in terms of making the entire community more informative (Martà ­nez, et al, 2013). The technology of database has created a leading position for itself in the computing†¦show more content†¦Direct Attacks This type of attack specifically means that the targeted data or sensitive information is attacked directly. Due to this, it has been observed that these targeted attacks are considered to be extremely obvious and they are successful only in the condition if the database is not protected by any sort of protection mechanism (Ahmad, et al, 2011). In case there is any protection system installed at the gateway, this type of attack is failed and the attacker proceeds to the next. Indirect Attacks In this type of attack, the attack is not aimed directly at the data or information, which is targeted. Rather, in an indirect attack, information about the target and from the target is achieved through various intermediate objects. Here, attackers usually use combination of keys as well as queries. Some of them are even used for the purpose of misdirecting and cheating the secure mechanism of database security (Ambler, 2012). These are considered to be extremely dangerous for the integrity of the information systems and are acutely tedious to track effectively. The attackers and hackers of this type of attack accomplish the attacks in a number of various ways. Passive Attack. The attackers of this type of attack are involved in the process of observing the data that is present inShow MoreRelatedTypes Of Attacks On A Computer System1546 Words   |  7 PagesDifferent Types of Attacks on Computer Systems What is attack on a Computer Systems? Attack on a systems or network is defined on your network infrastructure. Attacker will first analyse network environment and collect information in order to take advantage of the existing open ports or vulnerabilities. It may include unauthorized access to company’s resources. Passive attack - In some cases, the purpose of attack is only to learn and get some information from your computer system and your computerRead MoreCyber Attacks And Its Impacts On The Confidentiality, Integrity, And Availability Of A Network1296 Words   |  6 PagesMalware Concerns The most compelling category of cyber-attacks is the malware, which negatively impacts the confidentiality, integrity, and availability of a network or system from attacks ranging from the network level up to the operating system level. Therefore, the organizations need to safeguard their network and system components at all possible levels, to avoid a possible malware intrusion (Stallings Brown, 2012). Various critical categories of malware and their attacking patterns and approachesRead MoreAdware1371 Words   |  6 Pagesperson. Attack | An attempt to exploit a vulnerability of a computer or network component Backdoor | An undocumented and often unauthor- ized access method to a computer resource that bypasses normal access controls. Black-hat hacker | A computer attacker who tries to break IT security for the challenge and to prove technical prowess. Cookie | A text file sent from a Web site to a Web browser to store for later use. Cookies contain details gleaned from visits to a Web site Cracker | A computer attackerRead MoreInformation Security Policy Of City Of New York1510 Words   |  7 Pagesthat are collected from public. All employees and contractors with access to City s information systems are required to read and acknowledge the User Responsibilities policy prior to accessing any City information systems. Security Policies: CityNet is a Department of Information Technology and Telecommunications in city of New York . It utilizes policies, processes, and technology to protect network, its applications, its hosts, and the data processed therein. The security policy is managedRead MoreThe Effect Of Computer Vandals1430 Words   |  6 PagesDeacreased Privacy 2 Types of Security Attacks 3 Definitions 3 Hacker Attacks 4 Ways to Prevent Security Attacks 5 Introduction SUMMARY: This report will cover some of the different types of viruses and people who create them (hackers). The research and studies carried out by child organizations and authorities has been analyzed thoroughly and their records have been included in this report. The report will discuss the effects of computer vandals, how the user’s computer can be remotely attackedRead MoreSecurity Policies : Security Planning Essay911 Words   |  4 PagesSecurity Policies The very important factor of network deployment is security planning. Without doing a full risk assessment, it is not possible to plan for security. This security planning involves developing security policies and implementing controls to prevent computer risks from becoming reality. Each and every organization is different and will need to plan and create policies based upon its individual security goals and needs. The risk assessment provides a baseline forRead MoreCyber Security : A Common Thing1359 Words   |  6 PagesIn this time where the use of computers and networks related to them has become a common thing, there have been developed problems with concerns about cyber-security. Cyber-security is an important factor to be considered if one is to be able to protect themselves from malicious people and software from the Internet. The majority of the threats to computer networks come from the Internet and they are often intentional, having been developed by people with malicious intent. Cyber security is an attemptRead MoreComputer Network Security : The Rising Demand1008 Words   |  5 PagesComputer Network Security: The Rising Demand Subject : Business and Technological Communications Submitted to : Mrs. Khurana Submitted by : Prashant Kumar 756/IT/13 IT-2 Synopsis This report presents brief insights into the importance of the computer network security in today’s world. The report talks about the different types of cyber threats that have cropped up in the recent times. The report talks about the vulnerability issues that a common user faces and how he/she can prevent them. The reportsRead MoreNetwork Security Is The Procedure Of Computer Or Any Computer On Your Network1430 Words   |  6 PagesNetwork security is the procedure of preventing and identifying unsanctioned use of your computer or any computer on your network. Preventative measures allow you to stop unauthorized users, also known as intruders or â€Å"hackers,† from accessing your computer system. Detection helps establish whether or not someone has attempted to break into your system, if they were successful, and what they may have done . The Internet has grown to give us the ability to shop, pay bills, and create online profilesRead MoreIntrusion Detection System F or A Network And Deal With Enormous Amount Of Network Traffic1323 Words   |  6 PagesINTRUSION DETECTION SYSTEM Rohit Mavle,Akshay Bhand, Akansha Kedari Department of Computer Engineering, K. C. College Of Engineering and Management Studies and Research durveshkambli@gmail.com navnitdhyani@gmail.com tejaisbest@gmail.com ABSTRACT There are various issues in intrusion detection system. It must detect the malicious activities going on in a network and deal with the enormous amount of network traffic. In this paper,things like accuracy and efficiency using CRFs and Layered

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.