Security and Hacking PPT

Preview:

DESCRIPTION

General Security threats and information

Citation preview

Presented ByAnjali GuptaSakshi khannaSakshi GargArjun Kaura Inderdeep Singh

Information Security And Hacking

WHAT IS “ IT SECURITY”

INFORMATION Information Applied to Technology Elements of Information are

Integrity, availability, Authentication, Confidentiality

Security Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear.

WHO IS VULNERABLE?

Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government

agencies Multinational corporations ANYONE ON THE NETWORK

WHAT IS HACKING? Hacking : Unauthorized use or attempts

circumvent or bypass the security mechanism of an information system

Hacktivism : Hacking for Social and political cause

Ethical Hacking : It is a methodology adopted by ethical hacker to discover the vulnerabilities existing in information system.

TYPES OF HACKERS

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

TYPES OF HACKING ATTACKS Viruses Social Engineering Worms SQL injection Trojan Horse Spoofing Social Engineering Spamming Etc..

HOW VIRUSES WORKS

HOW TROJAN HORSES WORKS

Trojan Horse is Activated when the Software or attachmentis executed.

Trojan Horse is arrives via email or software like free games

Trojan Horse release virus monitors computer activity,install backdoor or transmits information to hacker

SOCIAL ENGINEERING

Phishing Atta

ck Shoulder Surfing

PHISHING SITE

SPAMMING Sending e-mail messages in

bulk. Spamming can leave the

information system vulnerable to overload

Email Bombing : Sending huge volumes of email to an address in an attempt to overflow the mailbox 

SPYWARE KEYLOGGER

• Keylogger is the action of tracking (or logging) the keys struck on a keyboard

• Screen logging: Screenshots are taken in order to capture graphics-based information

• Webcam logger

• Mobile keyloger

COUNTERMEASURE OF ATTACKS Firewall

Intrusion Detection System

Encryption

Awareness

FIREWALL

• Controls incoming and outgoing network traffics

• Builds a bridge between two networks or with external network

INTRUSION DETECTION SYSTEM

• Monitors malicious activity, policy violation and produces reports to management system

• Policy formation

ENCRYPTION

TOP TEN MOST-DESTRUCTIVE COMPUTER VIRUSES Stuxnet Conficker Virus Zeus PoisonIvy MyDoom Slammer Code Red I LOVE YOU Melissa Oompa-A

ANYNOMOUS

PROTECT YOURSELF FROM HACKERS

Keep Your Firewall Turned On Install or Update Your Antivirus

Software Never save any password Use strong passwords Don't use the same password for

everything. Do not give out your IP address Secure your Wifi network