07-09-2014, 10:28 PM
Nowadays, in this changing scenario of corporate and social world, the use of internet has been increased. The different business transactions and deals are going through internet and increase the use of social networking sites. Due to this, cyber crime has been increased in a corporate and social network. Cyber Attacks are reportedly being conducted world-wide on a daily basis targeting individuals, corporations and countries alike. In the cyber world, the current state of the practice regarding the technical ability to track and trace Internet-based attacks is primitive at best. Sophisticated attacks can be almost impossible to trace to their true source using current practices. The anonymity enjoyed by today’s cyber attackers poses a grave threat to the global information society, the progress of an information based international economy, and the advancement of global collaboration and cooperation in all areas of human Endeavour. Attack vectors may include so called social engineering and phishing attacks with users being duped into clicking links or visiting nefarious websites leading to exploitation or theft of personal credentials. Physical access attacks can also be successful via the use of removable media which may contain pre-loaded malware. Malware may be coded to grab copies of documents, system passwords, encrypt the hard drive or worse still destroy all data contained thereon. With the rise of the Internet, web applications, such as online banking and web-based email, have become integral to many people’s daily lives. Web applications have brought with them new classes of computer security vulnerabilities, such as Phishing and SQL Injection, In this dissertation we are discussing about Phishing and SQL-Injection techniques which can be used to harm your web applications or system for malicious intense.