security and hacking ppt
DESCRIPTION
General Security threats and informationTRANSCRIPT
Presented ByAnjali GuptaSakshi khannaSakshi GargArjun Kaura Inderdeep Singh
Information Security And Hacking
WHAT IS “ IT SECURITY”
INFORMATION Information Applied to Technology Elements of Information are
Integrity, availability, Authentication, Confidentiality
Security Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear.
WHO IS VULNERABLE?
Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government
agencies Multinational corporations ANYONE ON THE NETWORK
WHAT IS HACKING? Hacking : Unauthorized use or attempts
circumvent or bypass the security mechanism of an information system
Hacktivism : Hacking for Social and political cause
Ethical Hacking : It is a methodology adopted by ethical hacker to discover the vulnerabilities existing in information system.
TYPES OF HACKERS
White Hat Hackers
Black Hat Hackers
Grey Hat Hackers
TYPES OF HACKING ATTACKS Viruses Social Engineering Worms SQL injection Trojan Horse Spoofing Social Engineering Spamming Etc..
HOW VIRUSES WORKS
HOW TROJAN HORSES WORKS
Trojan Horse is Activated when the Software or attachmentis executed.
Trojan Horse is arrives via email or software like free games
Trojan Horse release virus monitors computer activity,install backdoor or transmits information to hacker
SOCIAL ENGINEERING
Phishing Atta
ck Shoulder Surfing
PHISHING SITE
SPAMMING Sending e-mail messages in
bulk. Spamming can leave the
information system vulnerable to overload
Email Bombing : Sending huge volumes of email to an address in an attempt to overflow the mailbox
SPYWARE KEYLOGGER
• Keylogger is the action of tracking (or logging) the keys struck on a keyboard
• Screen logging: Screenshots are taken in order to capture graphics-based information
• Webcam logger
• Mobile keyloger
COUNTERMEASURE OF ATTACKS Firewall
Intrusion Detection System
Encryption
Awareness
FIREWALL
• Controls incoming and outgoing network traffics
• Builds a bridge between two networks or with external network
INTRUSION DETECTION SYSTEM
• Monitors malicious activity, policy violation and produces reports to management system
• Policy formation
ENCRYPTION
TOP TEN MOST-DESTRUCTIVE COMPUTER VIRUSES Stuxnet Conficker Virus Zeus PoisonIvy MyDoom Slammer Code Red I LOVE YOU Melissa Oompa-A
ANYNOMOUS
PROTECT YOURSELF FROM HACKERS
Keep Your Firewall Turned On Install or Update Your Antivirus
Software Never save any password Use strong passwords Don't use the same password for
everything. Do not give out your IP address Secure your Wifi network