Your SlideShare is downloading. ×
CYBER SECURITY - Syamprasad K R
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

CYBER SECURITY - Syamprasad K R

82
views

Published on

Describes the basic cyber threats and general security measures.

Describes the basic cyber threats and general security measures.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
82
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. SYAMPRASAD K RS6E236254
  • 2. IntroductionCyber security is the body oftechnologies, processes and practicesdesigned to protectnetworks, computers, programs and datafrom attack, damage or unauthorizedaccess.
  • 3. RelevanceInformation AgeReliance on networksHigh speed 24*7 Internet access
  • 4. AttackersMalicious PrankstersSerious Attackers-Credit card and banking information-R & D information-Disrupting stock exchanges, power grids,transportation facilities etc
  • 5. Tools And TechniquesVIRUSRATSpammingPhishing
  • 6. Tools And TechniquesDoS/DDoSSocial EngineeringOthers: Adware, BOTS, Keyloggers etc
  • 7. VIRUSVital Information Resources Under SiegeReplicates itselfInfection StrategySelf modification
  • 8. Famous Bad GuysMelissaILOVEYOU„HELLO! Welcometo http://www.worm.com! Hacked ByChinese!‟Sobig F
  • 9. RATRemote Administration ToolTrojan HorseCan be used to perform other attacks.Eg: Back Orifice, Dark Comet, Bandooketc
  • 10. SpammingUsing electronic messaging systems tosend unsolicited bulk messages.Motives-Advertising-Search RanksWe are the TOPPERS!!!
  • 11. PhishingIdentity TheftSpoofingEncourages the victim to enter informationto a pop-up window or fraudulent webpage.
  • 12. Phishing
  • 13. DoS/DDoSDoS: Denial of ServiceDDoS: Distributed Denial of ServiceSmurf AttackPing Attack
  • 14. DoS/DDoS
  • 15. Social Engineering “Getting people to do things that theywouldn‟t ordinarily do for a stranger.”-Kevin Mitnick Techniques:-Pretexting-IVRS-Quid pro quo-Tailgating
  • 16. Security Measures“The most potent tool in any securityarsenal isn‟t a powerful firewall or asophisticated intrusion detection system.When it comes to security, knowledge isthe most effective tool…..”-Douglas Schweizer
  • 17. Security MeasuresAntivirus SoftwareEmail AttachmentsRight OSBack up
  • 18. Security MeasuresObserve the networkFirewallChoose not to be a victim
  • 19. ?
  • 20. ThanQ!!