لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (45%)

Cyber security Fundamentals - Confidentiality:
Confidentiality is about preventing the disclosure of data to unauthorized parties.It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attackers computer or any other computer.Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM) attacks, disclosing sensitive data. Cyber-attacks can be classified into the following categories:
1) Web-basedattacks 2) System-basedattacks
Web-based attacks
These are the attacks which occur on a website or web applications.This attack generates a large number of guesses and validates them to obtain actual data like user password and personal
identification number.Data redundancy
Types of Cyber Attacks
A cyber-attack is an exploitation of computer systems and networks.It uses malicious code to
alter computer code, logic or data and lead to cybercrimes, such as information and identity theft.Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.Example- SQL Injection, code Injection, log Injection, XML Injection etc.2.3.4.5.


النص الأصلي

Cyber security Fundamentals – Confidentiality:
Confidentiality is about preventing the disclosure of data to unauthorized parties.
It also means trying to keep the identity of authorized parties involved in sharing and holding data private and anonymous.
Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM) attacks, disclosing sensitive data.
Standard measures to establish confidentiality include:
 Data encryption
 Two-factor authentication
 Biometric verification
 Security tokens
Integrity
Integrity refers to protecting information from being modified by unauthorized parties. Standard measures to guarantee integrity include:
 Cryptographic checksums
 Using file permissions
 Uninterrupted power supplies
 Data backups
Availability
Availability is making sure that authorized parties are able to access the information when needed.
Standard measures to guarantee availability include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy
Types of Cyber Attacks
A cyber-attack is an exploitation of computer systems and networks. It uses malicious code to
alter computer code, logic or data and lead to cybercrimes, such as information and identity theft.
Cyber-attacks can be classified into the following categories:



  1. Web-basedattacks 2) System-basedattacks
    Web-based attacks
    These are the attacks which occur on a website or web applications. Some of the important
    web-based attacks are as follows-



  1. Injection attacks
    It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.
    Example- SQL Injection, code Injection, log Injection, XML Injection etc.

  2. DNS Spoofing
    DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.

  3. Session Hijacking
    It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have
    access to all of the user data.

  4. Phishing
    Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.

  5. Brute force
    It is a type of attack which uses a trial and error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal
    identification number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test an organization's network security.


تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

قراءة مهمة ا...

قراءة مهمة القراءة : القراءة هي مهمة رائعة وضرورية في حياتنا. إنها تمنحنا فرصة للتعلم والترفيه ف...

Zone electropho...

Zone electrophoresis is similar to moving boundary electrophoresis in that it uses a homogeneous buf...

المورفولوجية لل...

المورفولوجية للصحراء الشرقية تقع بين وادي والدلتا في الغرب والبحر األحمر وخليج السويس وقناة السويس ...

The visual repr...

The visual representation of the materials in figure 3, showed the brownish colours of the prepared ...

Dear MR. Ali. I...

Dear MR. Ali. I bought a cellphone charger from your store. The seller promised me that it will char...

يشمل الطب العسك...

يشمل الطب العسكري عدة مجالات، بما في ذلك: 1. الرعاية الطبية العامة للجنود وأفراد القوات المسلحة، و...

رعاية الايتام ...

رعاية الايتام نشاة الدوله السعوديه الثاله تعد الدولة السعوديه الثالثه امتدادا للدولة السعوديه الاو...

الوطن هو الكيان...

الوطن هو الكيان الذي ينتمي إليه الشخص ويعتبره أساس بدايته ونهايته، وهو الحضن الذي يضم أبناءه ويحتويه...

يجب على المؤمن ...

يجب على المؤمن أن يصدق تصديقا جازما بهذين الكتابين، وبسائر ما أنزل الله على رسله من كتب ورسالات، معت...

لتنفيذ استراتيج...

لتنفيذ استراتيجية تسويق منظمة لدعم الجمهور السعودي على الجانب الواقعي، يجب على شركة IBM مراعاة ما يل...

تمثل التربة أحد...

تمثل التربة أحد عناصر البيئة المهمة ففيها تنمو جميع المحاصيل التي تعد المصدر الرئيس تضم في حبيباتها...

اولا : المدرسة/...

اولا : المدرسة/المدخل التقليدي عتبر هذا المدخل الأقدم بين المداخل الخمسة لكنه لا يزال شائعا بين الح...