Cyber ppt


Published on

Published in: Education
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber ppt

  1. 1. Cyber Security In Modern World . Second Year Of Computer Engineering. Imperial College Of Engineering And Research,, Wagholi, Nagar Road. ,Pune-421207. Submitted by... Mr.Mandar pathrikar.
  2. 2. Growing problem in cyber world Computer worms and viruses. Password cracking. Unauthorized network access. Interception and fabrication of emails. Theft of passwords. Unauthorized access
  3. 3. Software Available In Market Who Affect The Cyber Crime1. Brute force attack. Brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. It is exhaustively working through all possible keys in order to decrypt a message.
  4. 4. Actual window of brute force  
  5. 5. USA cyber security. Great features provided in the USA security.1. Strong Authentication.2. Snort center & their working for government.
  6. 6. 1 . Strong Authentication Government agencies must be able to authenticate and authorize internal and external users and reliably secure online data exchanges, transactions, and communications. Provide the PIK ,to the user. Encryption is able to transform data into a form that makes it almost impossible to read it without the right key
  7. 7. Snort Center & their working.
  8. 8. Snort Center & their working. Snort Centers in their company so that they can easily detect this crime happening in the small part. The Snort Centers are find out those pc whose directly changes their path of working, and note down address of that ,working pc & on that basis investigation occurred.
  9. 9. How to Monitor Cyber Crime.1. The Radar Page.2. Nessus vulnerability scanner
  10. 10. The Radar Page.
  11. 11. The Radar Page. The latest Information Security Threats , in whole world only USA and Europe is using that is radar page developed by Security Wizardry Portal. In simple word if we explain the radar page in that we can say that, it work like a simple radar but, it have full control on the data transformation system. In every 20sec. This page is updated. If any where in the network free downloading is going on then within an 20sec. It will tract their address.
  12. 12. 2. Nessus vulnerability scanner. f
  13. 13. Nessus vulnerability scanner Nessus vulnerability scanner is the system which play very important roll in US cyber world. Now what exactly this scanner doing ,when any company send the data from or product from their server to the client ,this all data is send in terms of packets, if any hacker are link with this network and stolen the data, the information regarding hacker is send to the main console computer of the Nessus vulnerability scanner.
  14. 14. Crimes Happen in Cyber world. Today I am going to tell you about the famous crime in the history of cyber world. The name of that engineer is “zxeer”. he divides the sub module in all his group members, but testing part, he keep it for himself. He made a small software in that database. In that database information about every client is saved .the money which is available after decimal point is collected from everyone account and it will saved in the who is the last client available in that database. His name is started from “z” so that all that money is saved in his account .
  15. 15. Crimes Happen in Cyber world But after some year the person whose name is “zzeer” is open account in that bank, he found that his account money is automatically increasing then he reported to bank. After checking the software they understand that the some software is added into it who collect the money which is available after the decimal digit from all account ,in that period he earn $2billion.  
  16. 16. Preventions USING INTRUSION ALERT PROGRAMS-: They need to be operating constantly so that all unusual behavior on network is caught immediately. USING ENCRYPTION-: Encryption is able to transform data into a form that makes it almost impossible to read it without the right key. This key is used to allow controlled access to the information to selected people. PASSWORD-: Password should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge. USING NETWORK SCANNING PROGRAMS-: we all should install all this software in our computer so that we can get the information about warms and Trojan in the network, so it is very beneficial for our network system.
  17. 17. Conclusion . At thee last I want to conclude that if our government include private sectors for securing the cyber world then ,It is great development in the cyber world. If we really want to improve our technology then we have to take this steps. Employment is also available at larger amount. Education of consumer and industry players about anti-crime measures.