Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet Security


Published on

A brief introduction on Internet Security.
After viewing this presentation you would able to find answer for the below questions... !!!

How are credit cards getting hacked ?
How are emails getting hacked?
How are computers getting hacked ?


Published in: Technology, News & Politics

Internet Security

  1. 2. <ul><li>Hacking & Cracking. </li></ul><ul><li>Story. </li></ul><ul><li>How to prevent yourself from getting Hacked </li></ul><ul><ul><li>Key-Loggers </li></ul></ul><ul><ul><li>Trojan </li></ul></ul><ul><ul><li>Sniffer </li></ul></ul><ul><ul><li>Phishing </li></ul></ul><ul><ul><li>Office Password Recover </li></ul></ul><ul><ul><li>Credit Cards Fraud </li></ul></ul><ul><li>Ways to protect your home computers. </li></ul>
  2. 3. <ul><li>What Is Hacking…. ? </li></ul><ul><li>What Is Cracking… ? </li></ul><ul><li>Who are Hackers… ? </li></ul><ul><li>Who Are Crackers…? </li></ul>
  3. 4. <ul><li>Hacking is penetrating into someone's system with their permission and a purpose of securing it. </li></ul><ul><li>Hackers are the one who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. </li></ul>
  4. 5. <ul><li>Cracking is penetrating into someone's system without their permission just for fun or to harm that system and get some crucial data… </li></ul><ul><li>Crackers are smart as hackers but they lack in ethics. They do it for their own amusement and with wrong intentions … They are bad guys. </li></ul>
  5. 6. <ul><li>A 13 year old hacker in US with his other friend used to hack for fun. They always enjoyed breaking into other’s system. </li></ul><ul><li>After few days they crossed the line and became crackers and did all sort of hacking. </li></ul><ul><li>They got the Privileged rights of others without their permission but fortunately for them and for us they did nothing wrong </li></ul>
  6. 8. <ul><li>They are the zillionaries of world and their name’s are </li></ul><ul><li>Mr. Bill Gates & Mr. Paul Allen </li></ul>
  7. 10. <ul><li>Hackers use Key-Loggers often to hack into systems. </li></ul><ul><li>Its very easy to use key-logger, One can install this software anywhere & can hack PC. </li></ul><ul><li>Lets see a Demo for this .. !!!! </li></ul>
  8. 12. <ul><li>Avoid going to Net-Café. </li></ul><ul><li>Don’t use Un-trusted friends Laptop OR computer. </li></ul><ul><li>Incase you go to Net-café check for TASK-MANAGER and check what all processes are running. </li></ul><ul><li>SVCHOST.EXE </li></ul>
  9. 14. <ul><li>A Trojan is a program that may appear to be a normal program, but in fact does something malicious. </li></ul><ul><li>Trojans are often used to gain backdoor. Trojans do not replicate as viruses do, nor make copies of themselves as worms do. </li></ul><ul><li>They simply give access to some Hacker OR Cracker. </li></ul>
  10. 15. <ul><li>Don’t open unknown Emails (Specially Forwarded email which are zipped) </li></ul><ul><li>Don’t Accept any file from friends while you are talking to him online. </li></ul><ul><li>Checkout for SVCHOST.EXE file which is always attacked by Trojan file. </li></ul>
  11. 16. <ul><li>A program and/or device that monitors data traveling over a network. Sniffers are used for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal. </li></ul>
  12. 17. <ul><li>Sniffers are use to Sniff packets </li></ul><ul><li>Espically used in wi-fi connection. </li></ul><ul><li>You can simply run any sniffer and capture the packet within your network or outside network </li></ul><ul><li>Tools:- Etheral, Natas, Tcpdump </li></ul>
  13. 18. <ul><li>Don’t connect to unknown Wifi Network. </li></ul><ul><li>If you are using Wifi Network, make it password protected. </li></ul><ul><li>In-case if you are using unknown or un-trusted Wifi connection better don’t do any credit card transactions or any other payment mode. </li></ul><ul><li>Change your password if you have used un-trusted or unknown Wifi Connection </li></ul>
  14. 20. <ul><li>The act of sending an e-mail to a user falsely and an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers. The Web site, however, is bogus and set up only to steal the user’s information. </li></ul>
  15. 23. <ul><li>Phishing email </li></ul><ul><li>From: *****Bank [mailto:support@****] </li></ul><ul><li>Sent: 08 June 2004 03:25 </li></ul><ul><li>To: India </li></ul><ul><li>Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. </li></ul><ul><li>https://infinity.***** </li></ul><ul><li>****** Bank Limited </li></ul>
  16. 24. <ul><li>Always check url before login into any services. </li></ul><ul><ul><li>E.g </li></ul></ul><ul><ul><ul><li> might be </li></ul></ul></ul><ul><ul><ul><li> might be </li></ul></ul></ul><ul><ul><ul><li> might be </li></ul></ul></ul><ul><li>Use Anti Phishing Software. </li></ul><ul><li>Don’t open any URL blindly which you get in your email. </li></ul>
  17. 25. <ul><li>People have a bad Habit of giving password, and forgetting the password of office application as they rarely use them. </li></ul><ul><li>Here what Office password recovery helps you… (Live Demo) </li></ul><ul><li>You can find password </li></ul><ul><li>Software: - Advance office password recovery </li></ul>
  18. 26. <ul><li>Dictonary Attack </li></ul><ul><li>Brute force attack </li></ul><ul><li>Brute force with mask </li></ul>
  19. 27. <ul><li>Places where your credit cards can get hacked. </li></ul><ul><ul><li>Restaurant. </li></ul></ul><ul><ul><li>Petrol pumps. </li></ul></ul><ul><ul><li>Shopping malls. </li></ul></ul><ul><ul><li>Computers. </li></ul></ul><ul><ul><li>iBanking. </li></ul></ul><ul><ul><li>Online Fund Transfer. </li></ul></ul><ul><ul><li>Credit Card Booking </li></ul></ul><ul><ul><li>ATM Machine </li></ul></ul>
  20. 30. FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card
  21. 32.
  22. 33. <ul><li>You simply have to type credit card number into www page off the vendor for online transaction </li></ul><ul><li>If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card </li></ul>
  23. 35. <ul><li>Use anti-virus software and firewalls - keep them up to date </li></ul><ul><li>Use Nod32, Avast, Norton, Kaspersky,Macfee… </li></ul>
  24. 36. <ul><li>Use Original Windows Version, Avoid Piracy of Windows. </li></ul><ul><li>Regularly keep updating all softwares </li></ul><ul><li>Keep your operating system up to date with critical security updates and patches </li></ul><ul><li>This help to patch up the loopholes or vulnerabilities, which reduces hacking attempts </li></ul>
  25. 37. <ul><li>Don't open emails or attachments from unknown sources. </li></ul><ul><li>If u don’t know the person whom u have received mail avoid it, or delete it. </li></ul><ul><li>Don’t open attachment from mail directly. </li></ul><ul><li>Don’t open and website link if you get and unknown person mail </li></ul>
  26. 38. <ul><li>Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. </li></ul><ul><li>As we have already checked how dictonary attack works. </li></ul><ul><li>The same formula would be aplied to crack Email passwords… </li></ul>
  27. 39. <ul><li>Still people keep their password as their:- </li></ul><ul><li>Pet name </li></ul><ul><li>Combination of their name+Birthday </li></ul><ul><li>Combination of name+bike no </li></ul><ul><li>Some write their password at the back of keyboard or monitor etc… </li></ul>
  28. 40. <ul><li>Always keep password having combination of upper case + lower case + Numbers + special characters </li></ul><ul><li>A password should be atleast 8-10 character long </li></ul><ul><li>E.g. Gur122-@ </li></ul>
  29. 41. <ul><li>Don't share access to your computers with strangers </li></ul><ul><li>If a stranger tries to use your computer and hack anything its ur MAC address is recorded. And Mac address can be traced </li></ul>
  30. 42. <ul><li>Disconnect from the Internet when not in use </li></ul><ul><li>Update ur security on a regular basis </li></ul><ul><li>Make sure your employees and family members know this info too! </li></ul>
  31. 43. <ul><li>Back-up your computer data on disks or CDs often. </li></ul><ul><li>Because after all no computer is 100% secure. </li></ul><ul><li>As we say “prevention is better than cure” </li></ul><ul><li>Follow this rule. </li></ul>
  32. 44. <ul><li>Any Question… ? </li></ul>
  33. 45. Reach me @ [email_address] +919764636061