PRESENTED BY S.GEETHA (1602-13-737-310) WHAT IS CYBER SECURITY • As we know present generation totally depend upon the computer • And also there is also increase of security for these computers • Illegal activity to these systems are called as CYBER SECUIRITY • so how to protect our self from it • And also there is a proverb that there will be no 100%secuirity to any systems • But we can be increase our vulnerability of our systems TYPES OF CYBER ATTACKS • Brute forcing attacks • Sql injection • Social engineering(pishing) • Dictionary attacks & shoulder surfing • Virus or worms • Ransomware • Man in the middle attack • Direct denial of service (DDOS) attack • Email and software forgering HISTORY • The first recorded cyber crime was recorded in year 1820 • The first spam email took in 1978 when it was sent over Arpanet • The first virus was installed on a apple computer in 1982 DICTIONARY ATTACK • It is a type of attack in which hacker uses a dictionary to crack password • This type of attacks are not so effective • And also time taken process SHOULDER SURFING • A tried and true method of gaining acess • In this type of attacks passwords are leaked by observing our shoulders • When typing password SNIFFING & PORT SCANNING SNIFFING Sniffing a process of capturing and analyzing the traffic in a network PORT SCANNING It is a method to probe a system for open ports Intruder can exploit the vulnerabilities of open ports VIRUS AND WORMS • Virus and worms are the programs coded in such a way that the its take control of whole system • Its size is 1 kb!!!!!! BRUTE FORCING ATTACK • It is method of cracking password same as dictionary attack • But trying with number and symbols SQL INJECTION • It’s a type of attack to take advantage of your database • And copy your credentials and perform hacking A BRIEF ABOUT SOCIAL ENGINEERING ATTACKS • • • • • In a word I can say that”a lazy click can smash your career” Clever manipulation of natural human tendency to trust Here is example of cloning a website facebook Actually its not a original page it’s a Pished page RANSOMWARE • Ran+sum+ware • Its is type of attck where hacker gain access and encrypts all data() and demands money if admin wants the data back MAN IN THE MIDDLE • Its atype oh hacking where hackers capture network flow this is called as sniffing • Then acts as a middle man between server and client and obtain passwords DDOS(DISTRIBUTED DENIAL OF SERVICE) • Distributed DoS attack. A distributed denial-ofservice (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. EMAIL SPOOFING AND SOFTWARE FORGERING • this is a part of social engineering attacks • In these type of attacks email are forgeries and spammed by malicious virus and RATS • Same in the case of software's. When we install software's the actual software does not install but other programs get installed in background PROTECTION FROM THESE ATTACKS • Before download in any thing check its certificate • Do not open any mails of any anonymous persons • Improve ips and ids • Keep different passwords for every account • Frequently change ur passwords atlest ones for month • If u found any odd file delete them immediately • Perform antivirus scan every day • If u observe that if ur pc lags and slows down scan ur pc and delete new files that were created just before system lags