Post on 19-Jul-2015
Technocrats institute of Technology
Submitted by Vishwaraj Bhattrai0191cs131118Class-CS 2Sem-3rd
Submitted to Prof. Arjun Rajput
Why it is important to know ?
• Shopping• Online transactions• Banking• Social Networking
Every thing is being putted online
All Just i
n
Risk
Overview
• Social Engineering
• Men in the Middle Attack
• Secure your pc.
• Secure your online account.
• Security measures over mobile .
How attack is being carried out ?
Attacker will give you a candy (greed)
It could be an offer about product or ,lottery.In that greed you will give your credentials.
Real world examples and defense’s to them
• Email from a friend
• The message may notify that you are a winner (lottery)
• Urgently ask for help
• Foreign offers are fake
• Research the fact
Reject requests for help or offers for help
Men in the Middle Attack ?• It is a kind of cyber attack where a malicious
actor inserts him/herself into a conversation between two parties impersonate both parties and gain access to the information that the two parties were trying to send each other .
Consequences of attack and defenses
• The attack will lead to Session hijacking (stealing of your cookies and logging into your account )
• Many sensitive data specially when you are shopping (like your credit card number and pin)
• Mitm act as a silent attack and its prevention is difficult because user dosen’t know who are in network so only possible way is to have strong encryption between client and a server .
Common steps to Secure your home pc• Install a good antivirus software
• Bit defender ,Norton,Microtrend,Webroot (2014)
• Close all the unwanted ports in your computer.
• Choose a secure web browser • Chrome ,firefox .( worth to use them)• Keep a strong user account password.
• Always keep your firewall active (like comodo etc)
• Set up honeyspot ,IDS.
Secure your online account’s
Keep a two step verification (available in facebook,gmail)
Keep password in a good password manager (last pass 3.0)
Security measure’s at café’s
• Always try to browse in private mode of the browser .
• Before leaving make sure that you have properly logged out.
• Worth to do “ctrl+shift+delete” before leaving as it will delete your active cookies and browsed history so that any other cannot access your account.
Android os • A mobile device is more close to you rather then
you pc• Android is the king of mobile os more than 82%
of mobile devices runs android.• Due to its simplicity and user friendly nature it
has undergone wide acceptance.• Samsung,htc,sony one of the top vendors.• But due its wide reach to public and its open
source strategy many malwares and viruses are being developed for it and affecting the end users .
Ways to identify viral apps • Unwanted ads• Dataspikes • Unusally high bills• Apps you did’nt ask for • Apps that use
unnecessary function• Strange atctivity on
online accounts
Some awesome security and data hiding apps for android
• ESSET mobile security
• 360 mobile security
• Avast mobile security
• Avira mobile security
• AVL mobile security
• Vault
• Gallery lock pro
• Secure chat
• Resources www.kasperskylab.co.in
• Wiki www.wikipedia.com