Uploaded by parshuram.injector

Cyber security and its defence (editd)

advertisement
PRESENTED BY
S.GEETHA
(1602-13-737-310)
WHAT IS CYBER SECURITY
• As we know present generation totally depend upon the computer
• And also there is also increase of security for these computers
• Illegal activity to these systems are called as CYBER SECUIRITY
• so how to protect our self from it
• And also there is a proverb that there will be no 100%secuirity to any systems
• But we can be increase our vulnerability of our systems
TYPES OF CYBER ATTACKS
• Brute forcing attacks
• Sql injection
• Social engineering(pishing)
• Dictionary attacks & shoulder surfing
• Virus or worms
• Ransomware
• Man in the middle attack
• Direct denial of service (DDOS) attack
• Email and software forgering
HISTORY
• The first recorded cyber crime was recorded in year 1820
• The first spam email took in 1978 when it was sent over Arpanet
• The first virus was installed on a apple computer in 1982
DICTIONARY ATTACK
• It is a type of attack in which hacker uses a dictionary to crack
password
• This type of attacks are not so effective
• And also time taken process
SHOULDER SURFING
• A tried and true method of gaining
acess
• In this type of attacks passwords
are leaked by observing our
shoulders
• When typing password
SNIFFING & PORT SCANNING
SNIFFING
Sniffing a process of capturing and analyzing the traffic in a network
PORT SCANNING
It is a method to probe a system for open ports
Intruder can exploit the vulnerabilities of open ports
VIRUS AND WORMS
• Virus and worms are the programs coded in such a way that the its take control of
whole system
• Its size is 1 kb!!!!!!
BRUTE FORCING ATTACK
•
It is method of cracking password same as
dictionary attack
•
But trying with number and symbols
SQL INJECTION
• It’s a type of attack to take advantage of your
database
• And copy your credentials and perform hacking
A BRIEF ABOUT SOCIAL ENGINEERING
ATTACKS
•
•
•
•
•
In a word I can say that”a lazy click can smash your career”
Clever manipulation of natural human tendency to trust
Here is example of cloning a website facebook
Actually its not a original page it’s a
Pished page
RANSOMWARE
• Ran+sum+ware
• Its is type of attck where hacker gain
access and encrypts all data() and
demands money if admin wants the data
back
MAN IN THE MIDDLE
• Its atype oh hacking where hackers
capture network flow this is called as
sniffing
• Then acts as a middle man between server
and client and obtain passwords
DDOS(DISTRIBUTED DENIAL OF SERVICE)
• Distributed DoS attack. A distributed denial-ofservice (DDoS) attack occurs when multiple systems
flood the bandwidth or resources of a targeted
system, usually one or more web servers.
EMAIL SPOOFING AND SOFTWARE
FORGERING
• this is a part of social engineering attacks
• In these type of attacks email are forgeries and
spammed by malicious virus and RATS
• Same in the case of software's. When we install
software's the actual software does not install but
other programs get installed in background
PROTECTION FROM THESE ATTACKS
• Before download in any thing check its certificate
• Do not open any mails of any anonymous persons
• Improve ips and ids
• Keep different passwords for every account
• Frequently change ur passwords atlest ones for month
• If u found any odd file delete them immediately
• Perform antivirus scan every day
• If u observe that if ur pc lags and slows down scan ur pc and delete new files that
were created just before system lags
Download