Cyber security in msccs in simple language

JayeshGupta38 10 views 14 slides Mar 06, 2025
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

Study material


Slide Content

CYBER-SECURITY PRESENTED BY: 4603 OMKAR GAWANKAR

Table of contents Network Layer Attacks Different Types of Network Layer Attacks Firewall Need of Firewall Types of Firewall IDS IPS

Network Layer Attack A network-layer attack is performed on the network layer of the OSI model, which is the second layer of the TCP/IP reference model. This means that it occurs at Layer 3 of the OSI model and Layer 3 of TCP/IP. The purpose of these attacks is to gain access to a computer system that has been isolated from other networks. The attacker wants to gain access to this system so that he can use it for his own purposes, like stealing information or installing malicious software. In order to perform a network-layer attack, an attacker needs to be able to connect directly with his target machine using either wired or wireless connections.

types of network layer attacks Various Types of Network Layer Attacks are as follows: Interception Interruption Modification Fabrication

1. Interruption An unauthorised actor accesses a service or information shared between two legitimate users. It is a passive type of attack. For Examples, Eavesdropping Packet-Sniffing Password Attacks

2. Interception An unauthorised actor disrupts a service or destroys the hardware. It is a active type of attack. For Examples, Hardware Disruption Malware Corruption Denial Of Service Malware

3. Modification An unauthorised actor gains access to a service or data and tampers with the content. It is a active type of attack. For Examples, Man In The Middle Attack Cross Side Scripting (XSS)

4. fabrication An unauthorised actor inserts malicious data in the system. It is a active type of attack. For Examples, Spoofing SQL Injection Phishing Replay Attacks

Firewall A firewall is a security device that can help protect your internet network by filtering unknown traffic and blocking outsiders from gaining access to your private data. Firewalls can provide protection through computer hardware or software. Essentially, it acts as a protective wall between a private internal network and the public Internet. Firewalls are network security systems that prevent unauthorized access to a network.

Need of firewall ➔ To Protect confidential information from those who do not explicitly need to access it. ➔ To protect our network and its resources from malicious users and accidents that originate outside of our network. ➔ A firewall keeps destructive and disruptive forces out, and controls the incoming and outcoming network traffic based on security parameters that you can control and refine.

Types of Firewall : ❖ Software Firewall: A software firewall is a simple program installed on a computer that works through port numbers and other installed software. This type of firewall is also called a Host Firewall. ❖ Hardware Firewall: A hardware firewall is a physical device that attaches between a computer network and a gateway. For example- a broadband router. A hardware firewall is sometimes referred to as an Appliance Firewall.

Intrusion detection system A system called an intrusion detection system (IDS) observes network traffic for malicious transactions and sends immediate alerts when it is observed.

Intrusion prevention system An Intrusion Prevention System (IPS) is a security technology that monitors network traffic and actively prevents or blocks potential intrusions or malicious activities.It is designed to detect and respond to threats in real-time, providing an additional layer of defense to complement other security measures

Thank you PRESENTED BY: 4603 OMKAR GAWANKAR
Tags