Internet security
-
Upload
antony-mathew -
Category
Internet
-
view
111 -
download
0
Transcript of Internet security
Introduction
• Operating System • Websites • Passwords • Hackers • Mobile Platform • Virus & Worms • Recent Trends • Bio metrics
Unix / Mac OS /OS X
• Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others
• Permission technology and also the user groups sandboxing.
• Root / superuser sandboxing• Virus adaptability better than its competitors.
Windows
• It is the most commonly used OS world wide.
• It was developed by Microsoft
• It uses DLL and registry model.
• It uses a user access control system.
Linux
• Linux is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel,an operating system kernel first released on 5 October 1991 by Linus Torvalds.
• Almost all the security measures of that of Unix.
• Ubuntu• Mint • Fedora • Red hat
Password
• Its a simple mechanism to know whether the user is genuine
• It may include letters numbers and may be in some cases the special characters
• Password of the future may include the physical verification
• extended security through 2 step verification.
• Password mangers to help you for password management
Precautions for password
• Different password for each and every website
• Avoid managers but too many passwords mean managers
• Use long passwords and avoid 123456, Password , Incorrect etc
• Avoid using meaningful words.
• use multilingual password
• Enable 2 step verification for the Gmail iCloud and available services
• Enable notification for Facebook and authenticators for generating a 2nd layer security.
• using passwords like these would ensure your computers are safe but as said earlier MEMORY?
• Change the password in every 72-90 days
• Make sure you log out of the online services after use. enable auto sign in the computers you have complete control on.
• enable guest users for the computers and for mobiles .
• use incognito mode when ever you want your searches traceless
• Clear the cookies and the history every 2 months.
• Avoid auto login saves time but your safety?
iOS
• iphone os - iOS
• Developed based on unix
• used by apple closed coded
• Benefits of sandboxing
• limitation slow roll out of features
• Fast updates
Android
• Freedom
• users mode
• customise the appearance
• easier access to the google services including the mail the contacts the calendar system
• drawbacks too much resource allocation.
• Hacking prone
Windows Phone
• Better than windows mobile
• Fast growing
• Benefits of the existing users
• easier to learn for the majority of the users
• hugely inspired the windows 8/8.1 and the windows 10
• There are other Mobile OS available like ubuntu, sailfish, Tizen and many more.
• But then why is it that they are not popular?
• Not well developed App stores - the hardware companies want to go with the tried and tested
• the os will require a specific hardware and
• best is already used.
– Fred Durst
“If you wanna know how not secure you are, just take a look around. Nothing's secure.
Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes
with it, without those hackers we wouldn't solve the problems we need to solve, especially
security.”
Black Hat Hacker
• Dont follow rules • Doesn't do hacking for approved reasons • Malicious codes / virus • Violates computer security
White Hat Hackers
• Computer Security
• Improves Security and Services
• Hacks with the permission of the user.
Virus
• A program that can replicate by itself and can spread from one computer to another with out the input from the creator
• Needs a host program
• The purpose for the virus can be different or it can be used for any purpose eg kali linux payload management
Computer Worms
• It is similiar to virus and can replicate through network
• It is a self sustaining program doesn't need to be attached with any of the programs
• Common symptoms include overall sluggishness in the os and the slowness in the network due to increase bandwith consumption.
Trojan Horse
• One of the most irritating programs in the computer world.
• Inspiration from the TROY story
• Does something entirely different from what it is suppose to do tricks the user. Started as a greeting card virus.
• Commonly used to hack and steal information from the users commonly used in keyloggers. Hence it is called social engineering toolkit.
Types of hacking
• Password cracking : it can be done in 2 ways through brute force or through dictionary guessing.
• Packet sniffing : all information through the internet always passes through as packets and thus softwares like wireshark can sniff the packet data and hence get the information
• Phishing : My most favourite method of hacking because requires very less work and then fool the customers into giving their information. CLONING the website.
Types of Hacking
• Rootkit: Software that can hid the unwanted process from seeing in the windows task manger.
• Key loggers : if you have access to the computer installing a key loggers can provide all that is typed in that computer. taps in to the typing in the computer.
• Scareware/ransomware: Commonly disguise as an antivirus making you pay for the security or for providing information. Credit card informations !!!
• IP spoofing / MAC address cloning : use the id of some other person and avoid being detected in the hacked network to avoid the forensic detection.
Free advice
• Always protect your system with an antivirus !!!!!!! and keep it updated.
• use cloud antivirus
• never use a cracked system or a cracked antivirus.
• it affects your motherboard and also your security.
Who wants 1 device ?
• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit and apple watch.
• Google with chrome books chrome cast android and other services like the google glass and even internet itself- project loom android wear
• Windows with laptops, phones,xbox surface tabs and surface TV and Zune players, Office.
• All want not one device but your complete home and the complete ecosystem
• the maximum effects come with the maximum devices
• Wireless charging
• Hands free control
• 3D projectors
• 3D Printers - Guess what chicken of the future will be printed.
• Robotic skeletons for army.
• Control the home from Anywhere in the world through Home kit.
• Free and wireless payments through NFC.
Finger Print Scanner
• It is simple
• uses a unique design
• Much safer than the face recognition
• Partial and complete recognition of the finger print
• Safe place to store the data
• Can carry along where ever you go
• But not hack free
• Sensors inaccurate to detect a finger or differentiate from an animal
• Good for making authentication for the payments.
USB Tokenisation
• A single usb key
• No passwords
• Connect the USB
• Incorruptible Data ROM storage.
• Best used in offices, for authentication.
iris recognition system.
• the most secure in the world
• error rate is high
• requires very good sensors
• Used for very high security measures in the military
• mass usage still in testing
• Checking for the possibilities for the daily usage.
• inconvenient for almost daily usage.