cpl
DESCRIPTION
Internet SecurityTRANSCRIPT
Secure Sockets Layer (SSL)
A DEEP PEEP into Internet Security
With the sudden rise in the Internet usage across the globeover thepast few years, there has alsobeen a rise in the amount of online scams and frauds. Today, most of the Internet users are unaware of the mostprevailing online threats which pose a real challenge for their safe Internet usage. As a result, the security has become a questionable factor for themost Internet users.
However, it is still possible to effectively combat insecurity on the Internet provided that, the users are well aware of the common scams and frauds and know how to protect themselves. A study shows that over 91 percent of the Internet users are unaware of the online scams and are therefore worried about their security. If you are one among those 91 percent, then this post is for you! To start off lets begin from the Internet itself and Ill be discussing some common threats on Internet.
Need for Internet Security
With the expanding vast web of the Internet various resources such as Google are being added too which can be used in a different way to exploit good amount of Vulnerabilities in the Internet itself, i.e. using the internet against internet itself.
Google serves almost 80 per centof all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.
A few examples go on like this : Use Google for Hacking :
Type in the Google search box exactly as given below and hit enter:1. Using Google to Hack Security Cameras:
2. Using Google to Hack Personal and Confidential Documents:
3. Hacking Google to Gain Access to Free Stuffs:
inurl:viewerframe?mode=motion OR intitle:Live View / AXIS
intitle:curriculum vitae phone * * * address * e-mail OR filetype:xls inurl:email.xls OR intitle:index.of finances.xls?intitle:index.of?mp3eminem
Phishing :How it Works?How to PROTECT Yourself?
Phishing is something quite easy to perform.All you need is : Practicing Phishing :
Tips to Avoid Being a Victim of Phishing:
Secure Sockets Layer (SSL)HTTP Vs. HTTPS
What is SSL?
HTTP V/S HTTPSWorking of the SSL.
KEYLOGGING :What is a Keylogger?Hands on with Keyloggers.
Whats KEYLOGGING?
Hands on with KEYLOGGERS
What is Doxing?
Doxing Techniques:
Tips to be SAFE on INTERNET
REFERAL LINKS :
The House is open for QUERIES
Thank You
Submitted to : Submitted by :Ms. Bhavana Sharma Ashiv Sharma C.S.E.(1st Sem) Roll No.: 214Presentation on :
Internet Security
Content WarningThe content displayed is mere for educational purposes and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other, creative application of these pieces of information. Author is not responsible for any twisted use or misuse of the content which is mere informational.
20