Sei sulla pagina 1di 4

Management Information System

ASSIGNMENT : 02

Types of security attacks
&
Explain hacking





Submitted to:
Maam Asfha Umber

Submitted By:
Sehrish Naseer
(Roll no 30613)

Types of Security threats or attacks


1. Spyware
2. Keylogger
3. virus
4. Trojan horse
5. Worms
6. Phishing attack
7. Password Attacks
8. Brute force attack
9. Dictionary attack
10. Denial of service attack
11. Execution methods
12. Smurf attack
13. Tear drop attack
14. Ping of death
15. Spoofing
16. Adware
17. Backdoor
18. Wabbits






Hacking
What is hacking?
Hacking is the practice of modifying the features of a system, in order to
accomplish a goal outside of the creator's original purpose. The person
who is consistently engaging in hacking activities, and has accepted
hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays,
especially in the field of computer security, but hacking exists in many
other forms, such as phone hacking, brain hacking, etc. and it's not
limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the
whole hacking term is often mistaken for any security related cyber
crime. This damages the reputation of all hackers, and is very cruel and
unfair to the law abiding ones of them, from who the term itself
originated. The goal of this website is to introduce people the true
philosophy and ethics of hackers, hopefully clearing their name and
giving them the social status they deserve.
This practice can either be ethical or unethical. The activity where one
breaks into the system but do not violate its security and credentials is
called Ethical Hacking.
Ethical hackers aim to bring into the administrators notice,
vulnerabilities and voids in the system thereby, improvising the
robustness and security. They are purely tech-geeks with immaculate
programming skills and hands-on knowledge on both computer
hardware and software. On the other hand, there are people who can
though break into systems, get access to secured accounts but their
actions are usually unauthorized while they make a backdoor entry into
your system. These people (often misinterpreted as hackers) are called
as crackers. They try and crack passwords, security codes, etc using
various hacking softwares which are already available. Such softwares
are meant to break the code using millions of trials programmed into it
by other hackers.

Potrebbero piacerti anche