Computer Science Project Cyber safety presentation - Shubham raj 11th A What is cyber safety? • Internet safety or online safety or cyber safety or E-Safety is trying to be safe on the internet and is the act of maximizing a user's awareness of personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime. How to keep yourself safe in internet? • Common sense-(never respond to Spam & disclose personal information. • Use antivirus & Firewall. • Create strong passwords. • Mind your downloads- Be sure to Review all pre-checked boxes Prompted at download. • Stay updated- Update O.S., Application & Anti-virus. Encryption • Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. • Since any kind of data holds invaluable importance, encryption plays a major rule in society in today’s generation by protecting confidential data when data is transferred between devices. • Major encryption Algorithms 1. Triple DES 2. RSA 3. Blowfish 4. Blowfish 5. AES Common ways your device can get compromised. Phishing attack – Social engineering • What is a phishing attack. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. • ‘Blackeye’ is a common Linux tool to make phishing websites in seconds. • You can protect yourself from phishing attacks by not clicking any suspicious website, email, message or calls. Bad usb or usb rubber ducky • BadUSB is an attack that exploits an inherent vulnerability in USB firmware. Such an attack reprograms a USB device, causing it to act as a human interface device; once reengineered, the USB device is used to discreetly execute commands or run malicious programs on the victim's computer. • Usb rubber ducky is a device that is reprogramed to act as a keyboard with preprogrammed codes to inject malware or sniff data into it within seconds of plugging it in. It is very effective because computer recognizes it as keyboard so it does not get affected by anti virus. • To protect yourself from bad usb never plug suspicious usb devices in your computer. Keylogger • Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. • Keylogger is a device which can be placed in between the wire connecting keyboard to computer. It can also be put inside keyboard. It can recognize the keystrokes and save them. Because it is a physical device it cannot be recognized by anti virus. • To protect yourself from it always check where your keyboard is connected and do not let anyone else open your keyboard to install keylogger. DOS or DDOS attacks • In computing, a denial-of-service or distributed denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. • It is commonly done to servers by making a lot of bot computers visiting the site at the same time making the server unfunctional. • Checkpoints like ‘I am not a robot’ and honeypot servers to divert the bot traffic is commonly used to avoid dos attacks. Brute force attack • In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing a combination correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found. • It is performed by programmed codes or Linux tools like ‘john the ripper’ to put every possible password. • To avoid brute force websites commonly give only few tries to get the right password after which they start putting time gaps between tries. Image Credits • https://www.techsafety.org/blog/2019/10/31/cyber-safety-forsurvivors-of-domestic-violence • https://www.crackitdown.com/2019/03/blackeye-in-kali-linux-html/ • https://sites.google.com/site/schoolcubacity/resources/internetsafety-information?overridemobile=true