Cyber security and its defense

20
PRESENTED BY S.PARSHURAM FOR MORE INFORMATION PING ME AT FB:WWW.FACEBOOK.COM/ 198.168.0.O WWW.CYBERTECHPCBLOG.WORDPRESS .COM WWW.CYBERTECHPC.BLOGSPOT.COM

Transcript of Cyber security and its defense

Page 1: Cyber security and its defense

PRESENTED BY S.PARSHURAM

FOR MORE INFORMATIONPING ME ATFB:WWW.FACEBOOK.COM/198.168.0.OWWW.CYBERTECHPCBLOG.WORDPRESS.COMWWW.CYBERTECHPC.BLOGSPOT.COM

Page 2: Cyber security and its defense

CYBER SECURITY AND ITS DEFENSE

BYS.PARSHURAM REDDY

Page 3: Cyber security and its defense

WHAT IS CYBER SECURITY• As we know present generation totally depend upon the computer • And also there is also increase of security for these computers• Illegal activity to these systems are called as CYBER SECUIRITY• so how to protect our self from it• And also there is a proverb that there will be no 100%secuirity to any

systems• But we can be increase our vulnerability of our systems

Page 4: Cyber security and its defense

TYPES OF CYBER ATTACKS• Brute forcing attacks• Sql injection• Social engineering(pishing)• Dictionary attacks & shoulder surfing• Virus or worms• Ransomware• Man in the middle attack• Direct denial of service (DDOS) attack • Email and software forgering

Page 5: Cyber security and its defense

HISTORY• The fisrt recorded cyber crime was recorded in year 1820• The first spam email took in 1978 when it was sent over Arpanet• The first virus was installed on a apple computer in 1982

Page 6: Cyber security and its defense

DICTIONARY ATTACK• It is a type of attack in which hacker uses a dictionary

to crack password• This type of attacks are not so effective • And also time taken process

Page 7: Cyber security and its defense

SHOULDER SURFING• A tried and true method of

gaining acess• In this type of attacks

passwords are leaked by observing our shoulders• When typing password

Page 8: Cyber security and its defense

SNIFFING & PORT SCANNING SNIFFING

Sniffing a process of capturing and analyzing the traffic in a network

PORT SCANNINGIt is a method to probe a system for open ports

Intruder can exploit the vulnerabilities of open ports

Page 9: Cyber security and its defense

VIRUS AND WORMS• Virus and worms are the programs coded in such a way that the

its take control of whole system • Its size is 1 kb!!!!!!

Page 10: Cyber security and its defense

BRUTE FORCING ATTACK• It is method of cracking password

same as dictionary attack• But trying with number and symbols

Page 11: Cyber security and its defense

SQL INJECTION• It’s a type of attack to take

advantage of ur database• And copy your credentials and

perform hacking

Page 12: Cyber security and its defense

A BRIEF ABOUT SOCIAL ENGINEERING ATTACKS• In a word I can say that”a lazy click can smash your

career” • Clever manipulation of natural human tendency to trust• Here is example of cloning a website facebook• Actually its not a original page it’s a • Pished page

Page 13: Cyber security and its defense

RANSOMWARE• Ran+sum+ware• Its is type of attck where hacker

gain access and encrypts all data() and demands money if admin wants the data back

Page 14: Cyber security and its defense

MAN IN THE MIDDLE• Its atype oh hacking where

hackers capture network flow this is called as sniffing• Then acts as a middle man

between server and client and obtain passwords

Page 15: Cyber security and its defense

DDOS(DISTRIBUTED DENIAL OF SERVICE)

• Distributed DoS attack. A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. 

Page 16: Cyber security and its defense

EMAIL SPOOFING AND SOFTWARE FORGERING

• this is a part of social engineering attacks• In these type of attacks email are

forgeries and spammed by malicious virus and RATS• Same in the case of software's. When we

install software's the actual software does not install but other programs get installed in background

Page 17: Cyber security and its defense

PROTECTION FROM THESE ATTACKS• Before download in any thing check its

certificate• Do not open any mails of any

anonymous persons

Page 18: Cyber security and its defense

• Improve ips and ids • Keep different passwords for every account• Frequently change ur passwords atlest ones for month• If u found any odd file delete them immediately • Perform antivirus scan every day• If u observe that if ur pc lags and slows down scan ur pc and delete

new files that were created just before system lags

Page 19: Cyber security and its defense

A uQ ERI SENY

Page 20: Cyber security and its defense