Internet security

42
RECENT TRENDS IN TECHNOLOGY & INTERNET SECURITY

Transcript of Internet security

RECENT TRENDS IN TECHNOLOGY & INTERNET

SECURITY

Introduction

• Operating System • Websites • Passwords • Hackers • Mobile Platform • Virus & Worms • Recent Trends • Bio metrics

Unix / Mac OS /OS X

• Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others

• Permission technology and also the user groups sandboxing.

• Root / superuser sandboxing• Virus adaptability better than its competitors.

Windows

• It is the most commonly used OS world wide.

• It was developed by Microsoft

• It uses DLL and registry model.

• It uses a user access control system.

Linux

• Linux is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel,an operating system kernel first released on 5 October 1991 by Linus Torvalds.

• Almost all the security measures of that of Unix.

• Ubuntu• Mint • Fedora • Red hat

WEBSITES

HTTP VS HTTPS

PASSWORD

Password

• Its a simple mechanism to know whether the user is genuine

• It may include letters numbers and may be in some cases the special characters

• Password of the future may include the physical verification

• extended security through 2 step verification.

• Password mangers to help you for password management

Precautions for password

• Different password for each and every website

• Avoid managers but too many passwords mean managers

• Use long passwords and avoid 123456, Password , Incorrect etc

• Avoid using meaningful words.

• use multilingual password

• Enable 2 step verification for the Gmail iCloud and available services

• Enable notification for Facebook and authenticators for generating a 2nd layer security.

• using passwords like these would ensure your computers are safe but as said earlier MEMORY?

• Change the password in every 72-90 days

• Make sure you log out of the online services after use. enable auto sign in the computers you have complete control on.

• enable guest users for the computers and for mobiles .

• use incognito mode when ever you want your searches traceless

• Clear the cookies and the history every 2 months.

• Avoid auto login saves time but your safety?

MOBILE PLATFORM

iOS

• iphone os - iOS

• Developed based on unix

• used by apple closed coded

• Benefits of sandboxing

• limitation slow roll out of features

• Fast updates

Android

• Freedom

• users mode

• customise the appearance

• easier access to the google services including the mail the contacts the calendar system

• drawbacks too much resource allocation.

• Hacking prone

Windows Phone

• Better than windows mobile

• Fast growing

• Benefits of the existing users

• easier to learn for the majority of the users

• hugely inspired the windows 8/8.1 and the windows 10

• There are other Mobile OS available like ubuntu, sailfish, Tizen and many more.

• But then why is it that they are not popular?

• Not well developed App stores - the hardware companies want to go with the tried and tested

• the os will require a specific hardware and

• best is already used.

HACKERS

– Fred Durst

“If you wanna know how not secure you are, just take a look around. Nothing's secure.

Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes

with it, without those hackers we wouldn't solve the problems we need to solve, especially

security.”

Black Hat Hacker

• Dont follow rules • Doesn't do hacking for approved reasons • Malicious codes / virus • Violates computer security

White Hat Hackers

• Computer Security

• Improves Security and Services

• Hacks with the permission of the user.

Hactivists

• The story of Anonymous

• The NSA

• The Digital Terrorism.

• Does Good / Bad

VIRUS & WORMS

Virus

• A program that can replicate by itself and can spread from one computer to another with out the input from the creator

• Needs a host program

• The purpose for the virus can be different or it can be used for any purpose eg kali linux payload management

Computer Worms

• It is similiar to virus and can replicate through network

• It is a self sustaining program doesn't need to be attached with any of the programs

• Common symptoms include overall sluggishness in the os and the slowness in the network due to increase bandwith consumption.

Trojan Horse

• One of the most irritating programs in the computer world.

• Inspiration from the TROY story

• Does something entirely different from what it is suppose to do tricks the user. Started as a greeting card virus.

• Commonly used to hack and steal information from the users commonly used in keyloggers. Hence it is called social engineering toolkit.

Types of hacking

• Password cracking : it can be done in 2 ways through brute force or through dictionary guessing.

• Packet sniffing : all information through the internet always passes through as packets and thus softwares like wireshark can sniff the packet data and hence get the information

• Phishing : My most favourite method of hacking because requires very less work and then fool the customers into giving their information. CLONING the website.

Types of Hacking

• Rootkit: Software that can hid the unwanted process from seeing in the windows task manger.

• Key loggers : if you have access to the computer installing a key loggers can provide all that is typed in that computer. taps in to the typing in the computer.

• Scareware/ransomware: Commonly disguise as an antivirus making you pay for the security or for providing information. Credit card informations !!!

• IP spoofing / MAC address cloning : use the id of some other person and avoid being detected in the hacked network to avoid the forensic detection.

Free advice

• Always protect your system with an antivirus !!!!!!! and keep it updated.

• use cloud antivirus

• never use a cracked system or a cracked antivirus.

• it affects your motherboard and also your security.

RECENT TRENDS IN THE TECHNOLOGICAL FIRMS

Who wants 1 device ?

• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit and apple watch.

• Google with chrome books chrome cast android and other services like the google glass and even internet itself- project loom android wear

• Windows with laptops, phones,xbox surface tabs and surface TV and Zune players, Office.

• All want not one device but your complete home and the complete ecosystem

• the maximum effects come with the maximum devices

Continuum - Windows 10

Continuity- Apple

Self driving cars of the future. - Benz

• Wireless charging

• Hands free control

• 3D projectors

• 3D Printers - Guess what chicken of the future will be printed.

• Robotic skeletons for army.

• Control the home from Anywhere in the world through Home kit.

• Free and wireless payments through NFC.

BIO METRICS

Finger Print Scanner

• It is simple

• uses a unique design

• Much safer than the face recognition

• Partial and complete recognition of the finger print

• Safe place to store the data

• Can carry along where ever you go

• But not hack free

• Sensors inaccurate to detect a finger or differentiate from an animal

• Good for making authentication for the payments.

USB Tokenisation

• A single usb key

• No passwords

• Connect the USB

• Incorruptible Data ROM storage.

• Best used in offices, for authentication.

iris recognition system.

• the most secure in the world

• error rate is high

• requires very good sensors

• Used for very high security measures in the military

• mass usage still in testing

• Checking for the possibilities for the daily usage.

• inconvenient for almost daily usage.

THANK YOU!