Download presentation
Presentation is loading. Please wait.
Published byAase Holter Modified over 5 years ago
1
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Keywords Brute force attacks, DDOS, Botnet, Exploit, SQL injection Systems Security Attacking Systems
2
Understand the concept of SQL injection.
Attacks Objectives BEGINNER: Understand the meaning of DDOS and brute force attacks and explain the effects. ADVANCED: State how vulnerabilities can be exploited and how to protect against them. EXPERT: Understand the concept of SQL injection. Define: Brute Force Attack DDOS Starter activity
3
Understand the concept of SQL injection.
Definitions Objectives BEGINNER: Understand the meaning of DDOS and brute force attacks and explain the effects. ADVANCED: State how vulnerabilities can be exploited and how to protect against them. EXPERT: Understand the concept of SQL injection. Brute Force Attack: Trial and error method. Can be used for gaining access to password-based entry systems. Consists of an attacker trying possible passwords and passphrases until a correct one is found. DDOS: Overloading a website with unwanted traffic. Uses a number of computers over a network of infected machines which send requests to a website which would bring it offline. Used as a ‘botnet. Starter activity
4
SQL Injection What are the effects of a successful attack? Define:
Objectives BEGINNER: Understand the meaning of DDOS and brute force attacks and explain the effects. ADVANCED: State how vulnerabilities can be exploited and how to protect against them. EXPERT: Understand the concept of SQL injection. Define: SQL Injection What are the effects of a successful attack? Starter activity
5
SQL Injection Definition
Objectives BEGINNER: Understand the meaning of DDOS and brute force attacks and explain the effects. ADVANCED: State how vulnerabilities can be exploited and how to protect against them. EXPERT: Understand the concept of SQL injection. Where an attacker can execute malicious SQL statements using software which controls a database management system. Can affect websites that use SQL-based databases Companies that use SQL include Google, YouTube, PayPal, eBay, Cisco. Exploits that have been identified must be patched quickly to reduce impact on businesses therefore important for organisations to update infrastructure regularly. By exploiting the vulnerabilities of SQL through injection, attackers could access systems containing customer data, intellectual property and other sensitive information. Starter activity
6
SQL Injection Definition
Objectives BEGINNER: Understand the meaning of DDOS and brute force attacks and explain the effects. ADVANCED: State how vulnerabilities can be exploited and how to protect against them. EXPERT: Understand the concept of SQL injection. What is needed to carry out an SQL injection? A relational database using SQL at the time of the attack. Malicious code to be used in an SQL query when it is run in order for the injection attack to take place. The effects of a successful attack: Should an attacker gain access to the database, they could: Bypass authentication procedures and impersonate specific users. Execute queries, exposing data. Altering data, resulting in data integrity issues. Delete data Starter activity
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.