Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

It

on

  • 2,187 views

 

Statistics

Views

Total Views
2,187
Views on SlideShare
2,186
Embed Views
1

Actions

Likes
4
Downloads
118
Comments
0

1 Embed 1

http://www.faveous.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

It It Presentation Transcript

  • Information Technology
  • ADVANTAGES
  • DISADVANTAGES
  • Security Issues in I.T
    Submitted to :-
    Prof. SumanMathur
  • Group members
    ABHIJIT AMBRE P 1
    YOGITA KUMBHAR P 43
    KAUSHIK LANJEKAR P 12
    VISHESH JAYSWAL P 60
  • Security issues in I.T
  • Malware
    • Computer viruses
    • Computer worms
    • Trojan Horses
    • Rootkits
    • Spyware
    • Adware
  • VIRUS
    • A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
    • Reproductive capability
    • Spread from one computer to another
    • Introduced when On downloading files from the Internet.
    • On opening an e-mail attachment.
    • On copying programs or files from any other infected computer
  • WORMS
    • A computer worm is
    a self-replicating malware
    computer program.
    • Goal is
    • Worms use automated
    functions within a network,
    such as those in e-mails, to help spread themselves
    • Attempt to spread as fast and far as possible
  • TROJAN HORSES
    • Appear to be useful
    • Hide something that will damage the computer
    • Does not replicate
    • Often carried by a virus, worm
  • HACKING
    Definition :-
    Hacking is the act of gaining access without legal authorization to a computer or computer network.
    • The term "hack" was first used by US university computing centre staff in the mid-1960s.
    • In common usage, a hacker is a person who breaks into computers and computer networks, either for profit or motivated by the challenge.
  • Types of HACKERS
    WHITE HAT :-
    A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on
    securing and protecting IT systems.
    BLACK HAT :-
    do only malicious thing like making Trojans ,hacking email id, username and password, credit card numbers, bank information. They actually called crackers ,They don't have the legal rights to do that. they are called non ethical hackers.
  • GREY HAT :-
    It refers to a skilled hacker who sometimes acts illegally, though in good will, and limits their disclosure of vulnerabilities on a need-to-know basis. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but are prepared to commit crimes during the course of their technological exploits in order to achieve better security.
    Phreaker :-
      A phreaker is simply a hacker of telecommunications.
  • SCRIPT KIDDIE :-
    A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others.
    the term script (i.e. a prearranged plan or set of activities)
    kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).
    Neophyte :-
    A neophyte or "newbie" is a term used to describe someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.
  • WAYS OF HACKING
    • NetBIOS :-
    NetBIOS is meant to be used on local area networks, so machines on that network can share information. NetBIOS can also be used across the Internet - so a hacker can access your machine remotely.
    • ICMP ‘Ping’ (Internet Control Message Protocol) :-
    If a computer responds to a ping, then the hacker could then launch a more serious form of attack against a computer.
  • FTP (File Transfer Protocol) :-
    You may use it for file downloads from some websites. FTP can also be used by some hackers.FTP normally requires some form of authentication for access to private files, or for writing to files.
    HTTP – (Hypertext Transfer Protocol) :-
    HTTP hacks can only be harmful if you are using Microsoft web server software, such as Personal Web Server.
  • Cracker:
    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there
  • Difference between
    HACKERS AND CRACKERS:
  • Phone Phreaking:
    Phone phreaking is the act of gaining illegal access to resources of telecom networks for fun or malicious activity. Before computer hacking took over, phreaking was the dominant underground tech activity.
  • Types of phone phreaking:
    • Switch hook and tone dialer
    • 2600 hertz
    • Multi frequency
    • Blue boxes
    • Computer hacking
    • Toll fraud
    • Diverters
    • Voice mail boxes and bridges
    • Cell phones
    • End of multi-frequency
  • The prevention measures for HACKING
    • Harden your system
    • Patch all your systems
    • Install a firewall
  • Prevention measures for MALWARES/VIRUS
    • Use an anti virus
    • Don’t download anything
    from unknown sources
    • Always check external media
    (CD/DVD/Pen drives) before running them on your PC.
  • BIBLIOGRAPHY
    WWW.GOOGLE.COM
    WWW.WIKIPEDIA.COM
  • THANK YOU