Internet security Outline • Introduction • Hacker security • Hacker • Attack example • What should I do to be safe online • Conlclusion Introduction • While the internet offers enormous advantages and opportunities, it also presents various security risks. • Where we access our banking records, credit card statements, tax returns and other highly sensitive personal information. • Banks take extensive to protect the information transmitted and processed when banking online • But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating threats Internet security Generally. Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Intemet Protocol. • We must secure our computers with technology in the same way that we secure the doors to our offices → Security • We must act in ways that protect us against the risks and threats that come with Internet use > Safety HACKER What is hacker? Ans - A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. TYPES OF HACKER Black Hat Hacker Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goal TYPES OF HACKER White Hat Hacker White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. TYPES OF HACKER Gray Hat Hacker Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system. HACKER PHASES ATTACK EXAMPLE Phishing Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware ATTACK EXAMPLE Pharming PharmingPharming, a portmanteau of the words “phishing” and “farming”, is an online scam similar to phishing, where a website’s traffic is manipulated, and confidential information is stolen. In essence, it is the criminal act of producing a fake website and then redirecting users to it. ATTCK EXAMPLE SQL INJECTION SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details. WHAT SHOULD I DO TO BE SAFE ONLINE • Keep your confidential data offline. • Check a website’s reliability. • Use a strong password. • Use two-factor authentication. • Avoid suspicious online links. • Keep your computer updated. • Beware of free Wi-Fi and downloads. • Double check online information. CONCLUSION • Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet. • Protecting your self from internet threats. • Being aware of the dangers of the intemet and taking the right steps to avoid them means you can enjoy the intemet safely.