5
Management Information System ASSIGNMENT : 02 “Types of security attacks & Explain hacking” Submitted to: Ma’am Asfha Umber

Management Information system

Embed Size (px)

DESCRIPTION

hacking

Citation preview

Page 1: Management Information system

Management Information System

ASSIGNMENT : 02

“Types of security attacks &

Explain hacking”

Submitted to: Ma’am Asfha Umber

Submitted By: Sehrish Naseer

(Roll no – 30613)

Page 2: Management Information system

Types of Security threats or attacks

1. Spyware2. Keylogger3. virus4. Trojan horse5. Worms6. Phishing attack7. Password Attacks8. Brute force attack9. Dictionary attack10. Denial of service attack11. Execution methods12. Smurf attack13. Tear drop attack14. Ping of death15. Spoofing16. Adware 17. Backdoor18. Wabbits

Page 3: Management Information system

Hacking

What is hacking?

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.

This practice can either be ethical or unethical. The activity where one breaks into the system but do not violate its security and credentials is called Ethical Hacking.

Ethical hackers aim to bring into the administrator’s notice, vulnerabilities and voids in the system thereby, improvising the robustness and security. They are purely tech-geeks with immaculate programming skills and hands-on knowledge on both computer hardware and software. On the other hand, there are people who can though break into systems, get access to secured accounts but their actions are usually unauthorized while they make a backdoor entry into your system. These people (often misinterpreted as hackers) are called as ‘crackers’. They try and crack passwords, security codes, etc using various hacking softwares which are already available. Such softwares

Page 4: Management Information system

are meant to break the code using millions of trials programmed into it by other hackers.