Uploaded by paras987618

Presentation (1)

advertisement
Internet security
Outline
• Introduction
• Hacker security
• Hacker
• Attack example
• What should I do to be safe online
• Conlclusion
Introduction
• While the internet offers enormous advantages and opportunities, it
also presents various security risks.
• Where we access our banking records, credit card statements, tax
returns and other highly sensitive personal information.
• Banks take extensive to protect the information transmitted and
processed when banking online
• But with all the good things the Internet offers us, it also opens the
door to serious, potentially devastating threats
Internet security
Generally. Internet security include browser security, the security of
data entered through a Web form, and overall authentication and
protection of data sent via Intemet Protocol.
• We must secure our computers with technology in the same way that
we secure the doors to our offices → Security
• We must act in ways that protect us against the risks and threats that
come with Internet use > Safety
HACKER
What is hacker?
Ans - A hacker is a person skilled
in information technology who
uses their technical knowledge to
achieve a goal or overcome an
obstacle, within a computerized
system by non-standard means.
TYPES OF HACKER
Black Hat Hacker
Black-hat Hackers are
also known as
an Unethical Hacker or a
Security Cracker. These
people hack the system
illegally to steal money
or to achieve their own
illegal goal
TYPES OF HACKER
White Hat Hacker
White hat Hackers are also
known as Ethical Hackers or a
Penetration Tester. White hat
hackers are the good guys of
the hacker world.
TYPES OF HACKER
Gray Hat Hacker
Gray hat Hackers are
Hybrid between Black hat
Hackers and White hat
hackers. They can hack
any system even if they
don't have permission to
test the security of the
system but they will
never steal money or
damage the system.
HACKER PHASES
ATTACK EXAMPLE
Phishing
Phishing is a type of social
engineering where an attacker
sends a fraudulent message
designed to trick a person into
revealing sensitive information to
the attacker or to deploy
malicious software on the victim's
infrastructure like ransomware
ATTACK EXAMPLE
Pharming
PharmingPharming, a
portmanteau of the words
“phishing” and “farming”, is
an online scam similar to
phishing, where a website’s
traffic is manipulated, and
confidential information is
stolen. In essence, it is the
criminal act of producing a
fake website and then
redirecting users to it.
ATTCK EXAMPLE
SQL INJECTION
SQL injection, also known as
SQLI, is a common attack vector
that uses malicious SQL code
for backend database
manipulation to access
information that was not
intended to be displayed. This
information may include any
number of items, including
sensitive company data, user lists
or private customer details.
WHAT SHOULD I DO TO BE SAFE ONLINE
• Keep your confidential data offline.
• Check a website’s reliability.
• Use a strong password.
• Use two-factor authentication.
• Avoid suspicious online links.
• Keep your computer updated.
• Beware of free Wi-Fi and downloads.
• Double check online information.
CONCLUSION
• Whenever using internet or an online financial system, ensure that
your system is still under your control and not a spoofed puppet.
• Protecting your self from internet threats.
• Being aware of the dangers of the intemet and taking the right steps
to avoid them means you can enjoy the intemet safely.
Download