Uploaded by itsmesid2077

cyber safety presentation

advertisement
Computer
Science
Project
Cyber safety presentation
- Shubham raj
11th A
What is cyber safety?
• Internet safety or online safety or cyber safety or E-Safety is
trying to be safe on the internet and is the act of maximizing a
user's awareness of personal safety and security risks to private
information and property associated with using the internet, and
the self-protection from computer crime.
How to keep yourself safe in internet?
• Common sense-(never respond to
Spam & disclose personal information.
• Use antivirus & Firewall.
• Create strong passwords.
• Mind your downloads- Be sure to
Review all pre-checked boxes
Prompted at download.
• Stay updated- Update O.S.,
Application & Anti-virus.
Encryption
• Encryption is a process that encodes a message or file so that
it can be only be read by certain people. Encryption uses an
algorithm to scramble, or encrypt, data and then uses a key for
the receiving party to unscramble, or decrypt, the information.
• Since any kind of data holds invaluable importance, encryption
plays a major rule in society in today’s generation by protecting
confidential data when data is transferred between devices.
• Major encryption Algorithms
1. Triple DES
2. RSA
3. Blowfish
4. Blowfish
5. AES
Common ways your
device can get
compromised.
Phishing attack – Social engineering
• What is a phishing attack. Phishing is a type of social
engineering attack often used to steal user data, including login
credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening
an email, instant message, or text message.
• ‘Blackeye’ is a common Linux tool to make phishing websites in
seconds.
• You can protect yourself from phishing
attacks by not clicking any suspicious
website, email, message or calls.
Bad usb or usb rubber ducky
• BadUSB is an attack that exploits an inherent vulnerability
in USB firmware. Such an attack reprograms a USB device,
causing it to act as a human interface device; once reengineered, the USB device is used to discreetly execute
commands or run malicious programs on the victim's computer.
• Usb rubber ducky is a device that is reprogramed to act as a
keyboard with preprogrammed codes to inject malware or sniff
data into it within seconds of plugging it in. It is very effective
because computer recognizes it as keyboard so it does not get
affected by anti virus.
• To protect yourself from bad usb never plug suspicious usb
devices in your computer.
Keylogger
• Keystroke logging, often referred to as keylogging or keyboard
capturing, is the action of recording the keys struck on a
keyboard, typically covertly, so that a person using the keyboard
is unaware that their actions are being monitored. Data can
then be retrieved by the person operating the logging program.
• Keylogger is a device which can be placed in between the wire
connecting keyboard to computer. It can also be put inside
keyboard. It can recognize the keystrokes and save them.
Because it is a physical device it cannot be recognized by anti
virus.
• To protect yourself from it always check where your keyboard is
connected and do not let anyone else open your keyboard to
install keylogger.
DOS or DDOS attacks
• In computing, a denial-of-service or distributed denial-of-service
attack is a cyber-attack in which the perpetrator seeks to make
a machine or network resource unavailable to its intended users
by temporarily or indefinitely disrupting services of a host
connected to the Internet.
• It is commonly done to servers by making a lot of bot computers
visiting the site at the same time making the server unfunctional.
• Checkpoints like ‘I am not a robot’ and honeypot servers to divert the
bot traffic is commonly used to avoid dos attacks.
Brute force attack
• In cryptography, a brute-force attack consists of an attacker
submitting many passwords or passphrases with the hope of
eventually guessing a combination correctly. The attacker
systematically checks all possible passwords and passphrases
until the correct one is found.
• It is performed by programmed codes or Linux tools like ‘john
the ripper’ to put every possible password.
• To avoid brute force websites commonly give only few tries to
get the right password after which they start putting time gaps
between tries.
Image Credits
• https://www.techsafety.org/blog/2019/10/31/cyber-safety-forsurvivors-of-domestic-violence
• https://www.crackitdown.com/2019/03/blackeye-in-kali-linux-html/
• https://sites.google.com/site/schoolcubacity/resources/internetsafety-information?overridemobile=true
Download