cpl

20
A DEEP PEEP into Internet Security

Upload: yoyo-asdf

Post on 15-Sep-2015

225 views

Category:

Documents


12 download

DESCRIPTION

Internet Security

TRANSCRIPT

Secure Sockets Layer (SSL)

A DEEP PEEP into Internet Security

With the sudden rise in the Internet usage across the globeover thepast few years, there has alsobeen a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the mostprevailing online threats which pose a real challenge for their safe Internet usage. As a result, the security has become a questionable factor for themost Internet users.

However, it is still possible to effectively combat insecurity on the Internet provided that, the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91 percent of the Internet users are unaware of the online scams and are therefore worried about their security. If you are one among those 91 percent, then this post is for you! To start off lets begin from the Internet itself and Ill be discussing some common threats on Internet.

Need for Internet Security

With the expanding vast web of the Internet various resources such as Google are being added too which can be used in a different way to exploit good amount of Vulnerabilities in the Internet itself, i.e. using the internet against internet itself.

Google serves almost 80 per centof all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

A few examples go on like this : Use Google for Hacking :

Type in the Google search box exactly as given below and hit enter:1. Using Google to Hack Security Cameras:

2. Using Google to Hack Personal and Confidential Documents:

3. Hacking Google to Gain Access to Free Stuffs:

inurl:viewerframe?mode=motion OR intitle:Live View / AXIS

intitle:curriculum vitae phone * * * address * e-mail OR filetype:xls inurl:email.xls OR intitle:index.of finances.xls?intitle:index.of?mp3eminem

Phishing :How it Works?How to PROTECT Yourself?

Phishing is something quite easy to perform.All you need is : Practicing Phishing :

Tips to Avoid Being a Victim of Phishing:

Secure Sockets Layer (SSL)HTTP Vs. HTTPS

What is SSL?

HTTP V/S HTTPSWorking of the SSL.

KEYLOGGING :What is a Keylogger?Hands on with Keyloggers.

Whats KEYLOGGING?

Hands on with KEYLOGGERS

What is Doxing?

Doxing Techniques:

Tips to be SAFE on INTERNET

REFERAL LINKS :

The House is open for QUERIES

Thank You

Submitted to : Submitted by :Ms. Bhavana Sharma Ashiv Sharma C.S.E.(1st Sem) Roll No.: 214Presentation on :

Internet Security

Content WarningThe content displayed is mere for educational purposes and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other, creative application of these pieces of information. Author is not responsible for any twisted use or misuse of the content which is mere informational.

20