SlideShare a Scribd company logo
1 of 7
NETWORK SECURITY 101
HOW DO HACKERS GET ACCESS?
• KEYLOGGERS is one of the basic tools used for getting passwords and other
information. Keylogger resides in your system memory and runs at every
startup. These keyloggers log all the keystrokes you type. A log is
created and then it is sent to the Hacker. It can be customized so that
it cannot be shown in “processes” (Windows Task Manager).
• RAT (Remote Administration Tool) where a hacker can connect to your PC
without your knowledge. He can see what is going on the screen, what you
are currently doing, which sites you surf. It also has a built-in
functionality of keylogger. Hacker can copy files from your hard disk to
his computer, and all of this without your knowledge.
• TROJAN HORSE most common types of malwares. Trojans spread through warez
sites mostly. We all want FREE software right? When you download from a
warez site, all the keygens and patches and even the original trial
programs are trojaned.
• RANSOMWARE is when a malicious code locks up computer files and
cybercriminals demand a ransom to free them.
AS EASY AS 1…2…3
BEING AFFECTED IS EASY AS 1…2…3 How so?
 Opening email (at times, even from a name that
you recognize)
 Downloading an application
 Downloading computer updates
 Your internet and email are the two most
dangerous sources for security breaches
WHY SMALL BUSINESS?
• In 2014, 60% of all
online attacks
targeted small and mid
size businesses*
• Once affected, small
and mid size
businesses spent an
average of $8,700
repairing the damages*
• Small businesses are
particularly
vulnerable to attacks
because many owners
believe they don’t
have the time and
resources to invest in
setting up proactive
barriers
THE REALITY OF MANY BUSINESSES
SYMPTOMS TO WATCH OUT FOR
• Highlighted links on web
pages
• Internet speed latency
• Unwanted pop-ups
• Unscheduled reboot
• Operating system
warnings that don’t come
from operating system
• Increase in junk mail
• Unrecognized files
OUR RANGE OF SERVICES
HANDS-ON SERVICES:
• IT Support/ Helpdesk
• Remote monitoring
• Custom-fit Firewall
solutions
• Custom-fit Anti-virus
solutions
• Network maintenance
including computers, data
backup and server
• Phone system solutions &
support
CONSULTING SERVICES:
• IT Cost Analysis
• IT Policy/ Network
Security Analysis
• Proactive Disaster
Preparation
• Web & Application
Development
• IT Contract & Direct-Hire
placement solutions
• Website Development

More Related Content

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
9 - Security
9 - Security9 - Security
9 - Security
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
TIC
TICTIC
TIC
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

State Street Global Research Retreats
State Street Global Research RetreatsState Street Global Research Retreats
State Street Global Research RetreatsState Street
 
Word by word_-_picture_dictionary
Word by word_-_picture_dictionaryWord by word_-_picture_dictionary
Word by word_-_picture_dictionaryPatricia Ribas
 
Fase 2: A
Fase 2: AFase 2: A
Fase 2: AERR3
 
Kurrikuluma Alba Fatuarte
Kurrikuluma Alba FatuarteKurrikuluma Alba Fatuarte
Kurrikuluma Alba FatuarteAlba Fatuarte
 
MBA Leaflet
MBA LeafletMBA Leaflet
MBA LeafletSKIT MBA
 
Phan Mem Ke Toan Tien Ich, De Su Dung
Phan Mem Ke Toan Tien Ich, De Su DungPhan Mem Ke Toan Tien Ich, De Su Dung
Phan Mem Ke Toan Tien Ich, De Su DungDuy Lê
 
6. Unsigned Music Artists
6. Unsigned Music Artists6. Unsigned Music Artists
6. Unsigned Music ArtistsTom Ibbott
 
Cognitive computing insurance
Cognitive computing insuranceCognitive computing insurance
Cognitive computing insuranceEric Roselier
 
Antonio C V_Current-11
Antonio C V_Current-11Antonio C V_Current-11
Antonio C V_Current-11antonio dabare
 
Bisonwood Financial Management - Q4 2015 Market Review
Bisonwood Financial Management - Q4 2015 Market ReviewBisonwood Financial Management - Q4 2015 Market Review
Bisonwood Financial Management - Q4 2015 Market ReviewJason Traff
 
Speaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitSpeaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitLarisa Mueller
 
Sales Executive Training Program for Ford Ecosport
Sales Executive Training Program for Ford EcosportSales Executive Training Program for Ford Ecosport
Sales Executive Training Program for Ford EcosportDevesh Dandotiya
 
Sarath_Experience Resume (1)
Sarath_Experience Resume (1)Sarath_Experience Resume (1)
Sarath_Experience Resume (1)sarath nadendla
 

Viewers also liked (18)

State Street Global Research Retreats
State Street Global Research RetreatsState Street Global Research Retreats
State Street Global Research Retreats
 
Word by word_-_picture_dictionary
Word by word_-_picture_dictionaryWord by word_-_picture_dictionary
Word by word_-_picture_dictionary
 
Fase 2: A
Fase 2: AFase 2: A
Fase 2: A
 
Lmp2011
Lmp2011Lmp2011
Lmp2011
 
cert 4
cert 4cert 4
cert 4
 
Chn3 Review
Chn3 ReviewChn3 Review
Chn3 Review
 
Kurrikuluma Alba Fatuarte
Kurrikuluma Alba FatuarteKurrikuluma Alba Fatuarte
Kurrikuluma Alba Fatuarte
 
WELCOME TO REALITY 1
WELCOME TO REALITY 1WELCOME TO REALITY 1
WELCOME TO REALITY 1
 
MBA Leaflet
MBA LeafletMBA Leaflet
MBA Leaflet
 
Phan Mem Ke Toan Tien Ich, De Su Dung
Phan Mem Ke Toan Tien Ich, De Su DungPhan Mem Ke Toan Tien Ich, De Su Dung
Phan Mem Ke Toan Tien Ich, De Su Dung
 
The River Vasind
The River VasindThe River Vasind
The River Vasind
 
6. Unsigned Music Artists
6. Unsigned Music Artists6. Unsigned Music Artists
6. Unsigned Music Artists
 
Cognitive computing insurance
Cognitive computing insuranceCognitive computing insurance
Cognitive computing insurance
 
Antonio C V_Current-11
Antonio C V_Current-11Antonio C V_Current-11
Antonio C V_Current-11
 
Bisonwood Financial Management - Q4 2015 Market Review
Bisonwood Financial Management - Q4 2015 Market ReviewBisonwood Financial Management - Q4 2015 Market Review
Bisonwood Financial Management - Q4 2015 Market Review
 
Speaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_SummitSpeaker - 2016 Smart_Beta_Strategies_Summit
Speaker - 2016 Smart_Beta_Strategies_Summit
 
Sales Executive Training Program for Ford Ecosport
Sales Executive Training Program for Ford EcosportSales Executive Training Program for Ford Ecosport
Sales Executive Training Program for Ford Ecosport
 
Sarath_Experience Resume (1)
Sarath_Experience Resume (1)Sarath_Experience Resume (1)
Sarath_Experience Resume (1)
 

Similar to Network Security

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacksSugirtha Jasmine M
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 

Similar to Network Security (20)

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 

Network Security

  • 2. HOW DO HACKERS GET ACCESS? • KEYLOGGERS is one of the basic tools used for getting passwords and other information. Keylogger resides in your system memory and runs at every startup. These keyloggers log all the keystrokes you type. A log is created and then it is sent to the Hacker. It can be customized so that it cannot be shown in “processes” (Windows Task Manager). • RAT (Remote Administration Tool) where a hacker can connect to your PC without your knowledge. He can see what is going on the screen, what you are currently doing, which sites you surf. It also has a built-in functionality of keylogger. Hacker can copy files from your hard disk to his computer, and all of this without your knowledge. • TROJAN HORSE most common types of malwares. Trojans spread through warez sites mostly. We all want FREE software right? When you download from a warez site, all the keygens and patches and even the original trial programs are trojaned. • RANSOMWARE is when a malicious code locks up computer files and cybercriminals demand a ransom to free them.
  • 3. AS EASY AS 1…2…3 BEING AFFECTED IS EASY AS 1…2…3 How so?  Opening email (at times, even from a name that you recognize)  Downloading an application  Downloading computer updates  Your internet and email are the two most dangerous sources for security breaches
  • 4. WHY SMALL BUSINESS? • In 2014, 60% of all online attacks targeted small and mid size businesses* • Once affected, small and mid size businesses spent an average of $8,700 repairing the damages* • Small businesses are particularly vulnerable to attacks because many owners believe they don’t have the time and resources to invest in setting up proactive barriers
  • 5. THE REALITY OF MANY BUSINESSES
  • 6. SYMPTOMS TO WATCH OUT FOR • Highlighted links on web pages • Internet speed latency • Unwanted pop-ups • Unscheduled reboot • Operating system warnings that don’t come from operating system • Increase in junk mail • Unrecognized files
  • 7. OUR RANGE OF SERVICES HANDS-ON SERVICES: • IT Support/ Helpdesk • Remote monitoring • Custom-fit Firewall solutions • Custom-fit Anti-virus solutions • Network maintenance including computers, data backup and server • Phone system solutions & support CONSULTING SERVICES: • IT Cost Analysis • IT Policy/ Network Security Analysis • Proactive Disaster Preparation • Web & Application Development • IT Contract & Direct-Hire placement solutions • Website Development