View
49
Download
3
Category
Preview:
Citation preview
PRESENTED BY S.PARSHURAM
FOR MORE INFORMATIONPING ME ATFB:WWW.FACEBOOK.COM/198.168.0.OWWW.CYBERTECHPCBLOG.WORDPRESS.COMWWW.CYBERTECHPC.BLOGSPOT.COM
CYBER SECURITY AND ITS DEFENSE
BYS.PARSHURAM REDDY
WHAT IS CYBER SECURITY• As we know present generation totally depend upon the computer • And also there is also increase of security for these computers• Illegal activity to these systems are called as CYBER SECUIRITY• so how to protect our self from it• And also there is a proverb that there will be no 100%secuirity to any
systems• But we can be increase our vulnerability of our systems
TYPES OF CYBER ATTACKS• Brute forcing attacks• Sql injection• Social engineering(pishing)• Dictionary attacks & shoulder surfing• Virus or worms• Ransomware• Man in the middle attack• Direct denial of service (DDOS) attack • Email and software forgering
HISTORY• The fisrt recorded cyber crime was recorded in year 1820• The first spam email took in 1978 when it was sent over Arpanet• The first virus was installed on a apple computer in 1982
DICTIONARY ATTACK• It is a type of attack in which hacker uses a dictionary
to crack password• This type of attacks are not so effective • And also time taken process
SHOULDER SURFING• A tried and true method of
gaining acess• In this type of attacks
passwords are leaked by observing our shoulders• When typing password
SNIFFING & PORT SCANNING SNIFFING
Sniffing a process of capturing and analyzing the traffic in a network
PORT SCANNINGIt is a method to probe a system for open ports
Intruder can exploit the vulnerabilities of open ports
VIRUS AND WORMS• Virus and worms are the programs coded in such a way that the
its take control of whole system • Its size is 1 kb!!!!!!
BRUTE FORCING ATTACK• It is method of cracking password
same as dictionary attack• But trying with number and symbols
SQL INJECTION• It’s a type of attack to take
advantage of ur database• And copy your credentials and
perform hacking
A BRIEF ABOUT SOCIAL ENGINEERING ATTACKS• In a word I can say that”a lazy click can smash your
career” • Clever manipulation of natural human tendency to trust• Here is example of cloning a website facebook• Actually its not a original page it’s a • Pished page
RANSOMWARE• Ran+sum+ware• Its is type of attck where hacker
gain access and encrypts all data() and demands money if admin wants the data back
MAN IN THE MIDDLE• Its atype oh hacking where
hackers capture network flow this is called as sniffing• Then acts as a middle man
between server and client and obtain passwords
DDOS(DISTRIBUTED DENIAL OF SERVICE)
• Distributed DoS attack. A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
EMAIL SPOOFING AND SOFTWARE FORGERING
• this is a part of social engineering attacks• In these type of attacks email are
forgeries and spammed by malicious virus and RATS• Same in the case of software's. When we
install software's the actual software does not install but other programs get installed in background
PROTECTION FROM THESE ATTACKS• Before download in any thing check its
certificate• Do not open any mails of any
anonymous persons
• Improve ips and ids • Keep different passwords for every account• Frequently change ur passwords atlest ones for month• If u found any odd file delete them immediately • Perform antivirus scan every day• If u observe that if ur pc lags and slows down scan ur pc and delete
new files that were created just before system lags
A uQ ERI SENY
Recommended