Presentation is loading. Please wait.

Presentation is loading. Please wait.

1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S.

Similar presentations


Presentation on theme: "1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S."— Presentation transcript:

1 1Balaji.S

2 2

3 COMPUTER NETWORK AND SECURITY 3Balaji.S

4 4

5 5

6 6

7 Design From Design From 7Balaji.S

8 8

9 Attacks Attacks 9Balaji.S

10 10Balaji.S

11 11Balaji.S

12 Police Website (Private) Police Accessing The Data 12Balaji.S

13 Police Website (Private) Public Police Access The Data 13Balaji.S

14 Police Website (Private) Public Police Disconnect 14Balaji.S

15 15Balaji.S

16 16Balaji.S

17 Main Server Hacker Theft 17Balaji.S

18 18Balaji.S

19 19Balaji.S

20 20Balaji.S

21 21Balaji.S

22 22Balaji.S

23 23Balaji.S

24 24Balaji.S

25 25Balaji.S

26 26Balaji.S

27 27Balaji.S

28 28Balaji.S

29 29Balaji.S

30 Database Server 30Balaji.S

31 Database Server 31Balaji.S

32 Database Server 32Balaji.S

33 Data 33Balaji.S

34 Data 34Balaji.S

35 35Balaji.S

36 36Balaji.S

37 37Balaji.S

38 Data 38Balaji.S

39 39Balaji.S

40 40Balaji.S

41 41Balaji.S

42 42Balaji.S

43 43Balaji.S

44 44Balaji.S

45 Apple 45Balaji.S

46 Apple 46Balaji.S

47 Orange 47Balaji.S

48 48

49 49Balaji.S

50 50Balaji.S

51 When an insertion attack is made, Information That didn’t previously exist is added. When an insertion attack is made, Information That didn’t previously exist is added. 51Balaji.S

52 Bank Server 52Balaji.S

53 Bank Server Data 1 Data 4 Data 5 Data 6 Data 7 Data 2 Data 3 Hacker Data 8 53Balaji.S

54 To Delete The Original Data. To Delete The Original Data. 54Balaji.S

55 Bank Server Data 1 Data 4 Data 5 Data 6 Data 7 Data 2 Data 3 Hacker Data 8 55Balaji.S

56 Bank Server Data 1 Data 4 Data 5 Data 6 Data 7 Data 2 Data 3 Hacker Data Deleting Process… 56Balaji.S

57 Bank Server Data 1 Data 4 Data 5 Data 6 Data 7 Data 2 Data 3 Hacker Data Deleting Process Completed… 57Balaji.S

58 58Balaji.S

59 59Balaji.S

60 60Balaji.S

61 61Balaji.S

62 62Balaji.S

63 63

64 Balaji.S64

65 Balaji.S65

66 Balaji.S66 Database (Private) Hacker Data

67 Balaji.S67

68 Balaji.S68

69 Balaji.S69

70 Thank You 70Balaji.S


Download ppt "1Balaji.S. 2 COMPUTER NETWORK AND SECURITY 3Balaji.S."

Similar presentations


Ads by Google