45

Internet Security

Embed Size (px)

DESCRIPTION

A brief introduction on Internet Security. After viewing this presentation you would able to find answer for the below questions... !!! How are credit cards getting hacked ? How are emails getting hacked? How are computers getting hacked ? Regards Avnish

Citation preview

Page 1: Internet Security
Page 2: Internet Security

Hacking & Cracking. Story. How to prevent yourself from getting

Hacked› Key-Loggers› Trojan› Sniffer› Phishing› Office Password Recover› Credit Cards Fraud

Ways to protect your home computers.

Page 3: Internet Security

What Is Hacking…. ?

What Is Cracking… ?

Who are Hackers… ?

Who Are Crackers…?

Page 4: Internet Security

Hacking is penetrating into someone's system with their permission and a purpose of securing it.

Hackers are the one who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.

Page 5: Internet Security

Cracking is penetrating into someone's system without their permission just for fun or to harm that system and get some crucial data…

Crackers are smart as hackers but they lack in ethics. They do it for their own amusement and with wrong intentions… They are bad guys.

Page 6: Internet Security

A 13 year old hacker in US with his other friend used to hack for fun. They always enjoyed breaking into other’s system.

After few days they crossed the line and became crackers and did all sort of hacking.

They got the Privileged rights of others without their permission but fortunately for them and for us they did nothing wrong

Page 7: Internet Security
Page 8: Internet Security

They are the zillionaries of world and their name’s are

Mr. Bill Gates & Mr. Paul Allen

Page 9: Internet Security
Page 10: Internet Security

Hackers use Key-Loggers often to hack into systems.

Its very easy to use key-logger, One can install this software anywhere & can hack PC.

Lets see a Demo for this .. !!!!

Page 11: Internet Security
Page 12: Internet Security

Avoid going to Net-Café. Don’t use Un-trusted friends Laptop OR

computer. Incase you go to Net-café check for

TASK-MANAGER and check what all processes are running.

SVCHOST.EXE

Page 13: Internet Security
Page 14: Internet Security

A Trojan is a program that may appear to be a normal program, but in fact does something malicious.

Trojans are often used to gain backdoor. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.

They simply give access to some Hacker OR Cracker.

Page 15: Internet Security

Don’t open unknown Emails (Specially Forwarded email which are zipped)

Don’t Accept any file from friends while you are talking to him online.

Checkout for SVCHOST.EXE file which is always attacked by Trojan file.

Page 16: Internet Security

A program and/or device that monitors data traveling over a network. Sniffers are used for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.

Page 17: Internet Security

Sniffers are use to Sniff packets Espically used in wi-fi connection. You can simply run any sniffer and

capture the packet within your network or outside network

Tools:- Etheral, Natas, Tcpdump

Page 18: Internet Security

Don’t connect to unknown Wifi Network. If you are using Wifi Network, make it

password protected. In-case if you are using unknown or un-

trusted Wifi connection better don’t do any credit card transactions or any other payment mode.

Change your password if you have used un-trusted or unknown Wifi Connection

Page 19: Internet Security
Page 20: Internet Security

The act of sending an e-mail to a user falsely and an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers. The Web site, however, is bogus and set up only to steal the user’s information.

Page 21: Internet Security
Page 22: Internet Security
Page 23: Internet Security

Phishing email From: *****Bank

[mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank

Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you.

https://infinity.*****bank.co.in/Verify.jsp****** Bank Limited

Page 24: Internet Security

Always check url before login into any services.› E.g

www.gmail.com might be www.gmaiil.com www.gmail.com might be www.gmails.com www.gmail.com might

bewww.mail.login.gmail.com

Use Anti Phishing Software. Don’t open any URL blindly which you

get in your email.

Page 25: Internet Security

People have a bad Habit of giving password, and forgetting the password of office application as they rarely use them.

Here what Office password recovery helps you… (Live Demo)

You can find password Software: - Advance office password

recovery

Page 26: Internet Security

1. Dictonary Attack2. Brute force attack

3. Brute force with mask

Page 27: Internet Security

Places where your credit cards can get hacked.› Restaurant.› Petrol pumps. › Shopping malls. › Computers.› iBanking.› Online Fund Transfer.› Credit Card Booking› ATM Machine

Page 28: Internet Security
Page 29: Internet Security
Page 30: Internet Security

FALSE slot Fixed tothe original cardslot. (Same colorand sticker ).Contains additionalcard reader to copyyour cardinformation ..andduplicate your card

Page 31: Internet Security
Page 32: Internet Security

32

Page 33: Internet Security

You simply have to type credit card number into www page off the vendor for online transaction

If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card

Page 34: Internet Security
Page 35: Internet Security

Use anti-virus software and firewalls - keep them up to date

Use Nod32, Avast, Norton, Kaspersky,Macfee…

Page 36: Internet Security

Use Original Windows Version, Avoid Piracy of Windows.

Regularly keep updating all softwares

Keep your operating system up to date with critical security updates and patches

This help to patch up the loopholes or vulnerabilities, which reduces hacking attempts

Page 37: Internet Security

Don't open emails or attachments from unknown sources.

If u don’t know the person whom u have received mail avoid it, or delete it.

Don’t open attachment from mail directly.

Don’t open and website link if you get and unknown person mail

Page 38: Internet Security

Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist.

As we have already checked how dictonary attack works.

The same formula would be aplied to crack Email passwords…

Page 39: Internet Security

Still people keep their password as their:-

Pet name Combination of their name+Birthday Combination of name+bike no Some write their password at the back

of keyboard or monitor etc…

Page 40: Internet Security

Always keep password having combination of upper case + lower case + Numbers + special characters

A password should be atleast 8-10 character long

E.g. Gur122-@

Page 41: Internet Security

• Don't share access to your computers with strangers

• If a stranger tries to use your computer and hack anything its ur MAC address is recorded. And Mac address can be traced

Page 42: Internet Security

Disconnect from the Internet when not in use

Update ur security on a regular basis

Make sure your employees and family members know this info too!

Page 43: Internet Security

Back-up your computer data on disks or CDs often.

Because after all no computer is 100% secure.

As we say “prevention is better than cure”

Follow this rule.

Page 44: Internet Security

Any Question… ?

Page 45: Internet Security

Reach me @ [email protected]

+919764636061

www.avnish.co.in