LAVANYA C&I-converted - 2
LAVANYA C&I-converted - 2
LAVANYA C&I-converted - 2
SECURITY ATTACKS
Creativity
Creativity is the act of turning of new and imaginative ideas into reality-creativity is
characterized by the ability to perceive the world in new ways, to find hidden patterns ,to make
connections between seemingly unrelated phenomena,and to generate solutions .creativity is the
ability to develop and express ourselves and our ideas in new ways . it can be defined in many
ways , such as such as how a person explores ideas of uses different ways to slove the issues and
how one experiences life .
Innovation
Innovation in its modern meaning is “ a new idea, creative thought ,new imagination in firm of
devices or method” Innovation is often also viewed as the application of better solution that meet
New requirements in particular needs or existing market needs .The process of translating an
idea or invention into a good or service that creates value or for which customer will pay….
Brain storming
: Brain storming is a group creativity technique by which efforts are made to find a conclusion
for a specific problem by gathering a list of ideas spontaneously contribution by its members…
people are able to think more freely and they suggest as many spontaneous new ideas as
possible. It is the process of free thinking and generating ideas without being bound by restraints
such as “Is this a good or bad ideas? Is one of the best – known techniques available for creative
problem solving Innovation:
PROBLEM :
Information Security Attacks
AIM :
Security Assurance Is Essential To Enabling A Network To Perform Its Intended Function
Security Attacks
PROCEDURE :
INTRODUCTION
Information security isn’t all approximately securing records from unauthorized get admission
to . Information security is largely the excersise of stopping unauthorized get admission to, use,
disclosure , modification, inspection , regarding or destruction of records. Information can we
physical or electric one . Information can be something like ur details or we can say your profile
on social media , your statistics in cell phone your biometrics and many others .a Thus
information security spans such a lot of studies areas like cryptography , mobile computing ,
cyber forensics , online social media and so on .
Information security programs are build around 3 objectives ,commonly known as CIA-
confidentiality, integrity, availability
2.Integrity- means maintaining accuracy and completeness of data. This meaning data cannot
be edited in an unauthorized way.
a) Functional specialities
b) Business approaches
c) Culture
Management Dimension
Managers perceive Enterprise challenges in the surrounding. Information structure supply
equipment and statistics wished by the manager to allocate , coordinate and reveal their
paintings , make choice , creative new products and services and make lengthy range strategic
decision .
Technology Dimension
Management uses era to perform there functions. It consists of laptop hardware , software
program date control era , networking / Telecom generation .it’s one of the many tools
managers use to cope with the trade .
Types of Information security system
1) Transaction processing system (TPS):
Transaction processing system are record device that strategies information
resulting from the occurrences of commercial enterprises transaction
Many exceptional sorts of report are produced in MIS. And some of the reviews are
precise file , on call for record , ad-hoc and n exception file
4) Export system :
Export system include know how in order to useful to resource managers in diagnosing
problems or in Hassel solving .This structure are based on the concept of synthetic intelligent
studies
• Modification of messages
It manner that some portion of a message or altered that message is delete or reordered to
supply on unauthorised affect
• Denial of service
It prevents regular use of conversation facilities these assault may additionally h e a specific
Target for instance an entity might also suppress all messages directed to a particular
destination
Passive attacks
A passive assault attempt to analyze make use of information from the machine however
does not affect system resources .passive attacks are in the nature of eaves dropping or
monetoring of transmission .The goal of the oponant is to achieve data is being transmitted
.Types of passive assault are as following
• Traffic analysis
Suppose that we have an manner of masking of information , so that the attacker even
supposing captured the message could not extract any information from the message
For instance , as noted through main antivirus agency Kaspersky lab , “The variety of latest
malicious files proced by Kaspersky labs in lab detection technology reached 3,60000 a day in
2017 that’s 250 new malware threats every minute malware is a combination of two phrases
malicious and software . So malware basically a malicious software that can be perform
malicious operation on system , Malware can be divided into two clauses :
• Inspection methods
• Malware actions
• Virus
They have the capacity to copy themselves with the aid of hooking them to the program on the
host computer like songs , videos and so forth after which all around the internet .there creeper
virus was first detected ARPANETMalware on the idea of action :
• Adware
_adware isn’t always precisely malicious but they do breach privateness of the users. They
display advertisements on pcs computer or inner man or woman packages. They come attached
with free to apply software consequently most important source of sales for such builders.
They monitor your pursuits and show relevant advertisements.
• Spyware_
it is a application or we can say a software that video display units your activities on computer
and reveal amased records to involved party. Spyware are commonly dropped by using trojans,
viruses or worms. Once dropped they installs themselves and sits silently to keep away from
detection.
One of the maximum common instance of adware KEYLOGGER. The primary task of keylogger is
to record user keystroks with timestamp. Thus shooting interesting records like user name,
password, credit card information and so forth.
• Ransomeware_
it is sort of Malware in order to either encrypt your documents or will lock your
computer making it inaccessible both partially or fully then a screen will
beansomeware_ it is kind of Malware on the way to both encrypt your files or will lock
your computer making it in accessible both partly or totally.
• Scareware_
IT masquerades as a tool assist fix your device however when the software program is
achieved it’s going to infect your device or completely smash it. The software will show
a message to frighten you and force to take some movement like pay them to restore
your machine.
• Rootkits_
Designed to benefit root get right of entry to or we will say administrative privileges
with in the consumer gadget. Once received the basis get admission to, the exploiter
can do anything from stealing non - public files to non-public information.
• Zombies-
THE painting similar to Spyware. Infection mechanism is equal however they don’t spy
and steal facts as an alternative they await the command from hackers.
➢ Social Engineering –
IS The artwork of manipulating humans in order that they give up their private data like
financial institution account details, password and many others.
CONCLUSION :
Because information security is not solely a technical endeavor,a wide range of
background and skills will be needed is an effective national information security workforce .