SlideShare a Scribd company logo
1 of 28
CONTENTS
•Introduction
•Topics that matter
•Hacker vs Cracker
•Firewall
• Shell
• Case Study
• Inferences
 The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
 There’re two sides to a coin. Internet also has it’s own
disadvantages that is Cyber crime- Illegal activity
committed on the internet .
INTRODUCTION
Topics that matter…
Cyber
Security
Internet Security
focusing
Firewall
Secure SHell Case Studies
Hacker vs Cracker
The general view is that, while hackers build things,
crackers break things.
 Cracker is the name given to hackers who break into
computers for criminal gain; whereas, hackers can also be
internet security experts hired to find
vulnerabilities in systems .
Types Of Hackers
A Black hat hacker is an individual with extensive
computer knowledge whose purpose is to breach
or bypass internet security.
Gray hat hackers refers to a computer hacker or
computer security expert whose ethical
standards fall somewhere between purely
altruistic and purely malicious.
White hat hacker refers to ethical
computer hacker who specializes in penetration testing
and in other testing methodologies to ensure the
security of an organization's information systems.
ANONYMOUS GROUP
Anonymous is a international network of activist and hacktivist entities. The
group became known for a series of well-publicized publicity stunts and
distributed denial-of-service (DDoS) attacks on government, religious, and
corporate website .
 Firewall is a network security system that monitors
and controls the incoming and outgoing network traffic
based on predetermined security rules.
 A firewall typically establishes a barrier between a
trusted, secure internal network and another outside
network, such as the Internet, that is assumed not to
be secure or trusted.
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
FIREWALL ARCHITECTURES
The configuration that works best for a particular organization
depends on three factors:
 The objectives of the network
 the organization‘s ability to develop and implement the
architectures
 the budget available for the function
Packet filtering
routers
Screened
subnet firewalls.Dual-homed
firewalls
Screened host
firewalls
Bastion Host
A bastion host is a special purpose computer on a
network specifically designed and configured to
withstand attacks.
Generally , placed outside the firewall
For example a proxy server, and all other services
are removed or limited to reduce the threat to the
computer.
 Architecture with high complexity
 In this architectural approach , the bastion host contains two NICs
(Network Interface Cards)
 One NIC is connected to the external network, and one is connected to
the internal network, providing an additional layer of protection.
 Implementation of this architecture often makes use of NATs.
WHAT IS NAT ?
 Function as network-level proxy
 Convert IP addresses of internal hosts to IP address
assigned by firewall
 Taking advantage of this , NAT prevents external
attacks from reaching internal machines with
addresses in specified ranges.
 Hide TCP/IP information of hosts in the network being
protected, preventing hackers from getting address of
actual host
ADVANTAGES OF DUAL – HOMED ARCHITECTURE
High protection as compared to Packet Filtering and
Screened host architecture.
Overall Strong protection at low expense
LIMITATIONS OF DUAL – HOMED ARCHITECTURE
It can disable the connection to the external network, and as
traffic volume increases, it can become over- loaded.
Secure
SHell
Ecrypted command-line
communication
• The standard TCP port 22 has been assigned for contacting
SSH servers.
• An SSH tunnel can provide a secure path over the Internet,
through a firewall to a virtual machine.
«Secure Shell (SSH) is a cryptographic network
protocol for secure data communication, remote
shell services or command execution and other
secure network services between two networked
computers that connects, via a secure
channel over an insecure network, a server and
a client
Definition
Client-> Computer programs that can make requests to servers and fetch
responses are called clients
Server->A web server can listen to requests and respond back with data on
the same connection
Structure
SSH-Usage
• SecureSHell handles the set up and generation of an
encrypted TCP connection
• SSH can handle secure remote logins (ssh)
• SSH can handle secure file copy (scp)
. SSH can even drive secure FTP (sftp)
Architecture
SSH Authentication Methods
$ Password
$ Host-based authentication
I Password Authentication
Password Authentication
• The user specifies the username
and corresponding password.
Prompts for Password
you
server
ssh
sshd
you> ssh
mac-1
password: ****
other>
• Doesn’t require user credentials
(password or key)
• Provides trust based on hostname and
user id
• User id on both system has to be the
same
• Disabled by default -- not that useful
II Host-based Authentication
CYBER AWARENESS
Premise one: Cyber security should be viewed and managed as a strategic
activity that impacts the enterprise’s most valued assets.
Premise two: Designs and plans for cyber security should be data driven to
move from reactive to predictive responses. Shared intelligence among
countries and organizations is critical.
Findings from a recent survey conducted by IBM indicated that organizations
most able to handle or avoid security breaches had some unique
characteristics:
1. Security leaders had a strategic voice in the enterprise;
2. Cyber security was not viewed as an IT issue but as an enterprise wide
responsibility
3. Security budgets were managed at a senior level;
4. Security was considered early in the design of new products and
services; o Measurement and accountability were part of the security
design;
5. A culture of proactively protecting the enterprise existed.
Putty
Putty is a SSH client ,open source software used to connect client to
a sever.
.Control over the SSH encryption key
and protocol version.
. Unicode support.
. Support for local serial port
connections.
features
QUESTION - TIME
THANK – YOU
CREDITS
AMAN JAIN
GAURAV SACHDEVA

More Related Content

What's hot

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 

What's hot (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
06. security concept
06. security concept06. security concept
06. security concept
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

Eamon Healy Presentation
Eamon Healy PresentationEamon Healy Presentation
Eamon Healy PresentationEamon Healy
 
Utilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeUtilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeFernando Diaz
 
Harbor nitrogen losses
Harbor nitrogen lossesHarbor nitrogen losses
Harbor nitrogen lossesFernando Diaz
 
Holsteins mobilize more energy
Holsteins mobilize more energyHolsteins mobilize more energy
Holsteins mobilize more energyFernando Diaz
 
Estrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorEstrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorFernando Diaz
 
Are jerseys really more efficient
Are jerseys really more efficientAre jerseys really more efficient
Are jerseys really more efficientFernando Diaz
 
Feeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFeeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFernando Diaz
 
Zero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesZero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesSooraj Garg
 

Viewers also liked (12)

Eamon Healy Presentation
Eamon Healy PresentationEamon Healy Presentation
Eamon Healy Presentation
 
Christ came as man. Lesson 1
Christ came as man. Lesson 1Christ came as man. Lesson 1
Christ came as man. Lesson 1
 
Utilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeUtilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forraje
 
Resume_shaheen
Resume_shaheenResume_shaheen
Resume_shaheen
 
Harbor nitrogen losses
Harbor nitrogen lossesHarbor nitrogen losses
Harbor nitrogen losses
 
BTU Cloud
BTU CloudBTU Cloud
BTU Cloud
 
Holsteins mobilize more energy
Holsteins mobilize more energyHolsteins mobilize more energy
Holsteins mobilize more energy
 
Estrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorEstrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calor
 
Are jerseys really more efficient
Are jerseys really more efficientAre jerseys really more efficient
Are jerseys really more efficient
 
1EM #32 Conjuntivo: ossos
1EM #32 Conjuntivo: ossos1EM #32 Conjuntivo: ossos
1EM #32 Conjuntivo: ossos
 
Feeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFeeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herds
 
Zero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesZero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industries
 

Similar to Cyber secure

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopMichele Chubirka
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Michele Chubirka
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 

Similar to Cyber secure (20)

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Network security
Network securityNetwork security
Network security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Cyber secure

  • 1.
  • 2. CONTENTS •Introduction •Topics that matter •Hacker vs Cracker •Firewall • Shell • Case Study • Inferences
  • 3.  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There’re two sides to a coin. Internet also has it’s own disadvantages that is Cyber crime- Illegal activity committed on the internet . INTRODUCTION
  • 4. Topics that matter… Cyber Security Internet Security focusing Firewall Secure SHell Case Studies
  • 5. Hacker vs Cracker The general view is that, while hackers build things, crackers break things.  Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems .
  • 6. Types Of Hackers A Black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Gray hat hackers refers to a computer hacker or computer security expert whose ethical standards fall somewhere between purely altruistic and purely malicious.
  • 7. White hat hacker refers to ethical computer hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. ANONYMOUS GROUP Anonymous is a international network of activist and hacktivist entities. The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate website .
  • 8.  Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.  A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.
  • 9.  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 10. FIREWALL ARCHITECTURES The configuration that works best for a particular organization depends on three factors:  The objectives of the network  the organization‘s ability to develop and implement the architectures  the budget available for the function Packet filtering routers Screened subnet firewalls.Dual-homed firewalls Screened host firewalls
  • 11. Bastion Host A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. Generally , placed outside the firewall For example a proxy server, and all other services are removed or limited to reduce the threat to the computer.
  • 12.  Architecture with high complexity  In this architectural approach , the bastion host contains two NICs (Network Interface Cards)  One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection.  Implementation of this architecture often makes use of NATs.
  • 13. WHAT IS NAT ?  Function as network-level proxy  Convert IP addresses of internal hosts to IP address assigned by firewall
  • 14.  Taking advantage of this , NAT prevents external attacks from reaching internal machines with addresses in specified ranges.  Hide TCP/IP information of hosts in the network being protected, preventing hackers from getting address of actual host
  • 15.
  • 16. ADVANTAGES OF DUAL – HOMED ARCHITECTURE High protection as compared to Packet Filtering and Screened host architecture. Overall Strong protection at low expense LIMITATIONS OF DUAL – HOMED ARCHITECTURE It can disable the connection to the external network, and as traffic volume increases, it can become over- loaded.
  • 18. • The standard TCP port 22 has been assigned for contacting SSH servers. • An SSH tunnel can provide a secure path over the Internet, through a firewall to a virtual machine. «Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client Definition
  • 19. Client-> Computer programs that can make requests to servers and fetch responses are called clients Server->A web server can listen to requests and respond back with data on the same connection Structure
  • 20. SSH-Usage • SecureSHell handles the set up and generation of an encrypted TCP connection • SSH can handle secure remote logins (ssh) • SSH can handle secure file copy (scp) . SSH can even drive secure FTP (sftp)
  • 22. SSH Authentication Methods $ Password $ Host-based authentication
  • 23. I Password Authentication Password Authentication • The user specifies the username and corresponding password. Prompts for Password you server ssh sshd you> ssh mac-1 password: **** other>
  • 24. • Doesn’t require user credentials (password or key) • Provides trust based on hostname and user id • User id on both system has to be the same • Disabled by default -- not that useful II Host-based Authentication
  • 25. CYBER AWARENESS Premise one: Cyber security should be viewed and managed as a strategic activity that impacts the enterprise’s most valued assets. Premise two: Designs and plans for cyber security should be data driven to move from reactive to predictive responses. Shared intelligence among countries and organizations is critical. Findings from a recent survey conducted by IBM indicated that organizations most able to handle or avoid security breaches had some unique characteristics: 1. Security leaders had a strategic voice in the enterprise; 2. Cyber security was not viewed as an IT issue but as an enterprise wide responsibility 3. Security budgets were managed at a senior level; 4. Security was considered early in the design of new products and services; o Measurement and accountability were part of the security design; 5. A culture of proactively protecting the enterprise existed.
  • 26. Putty Putty is a SSH client ,open source software used to connect client to a sever. .Control over the SSH encryption key and protocol version. . Unicode support. . Support for local serial port connections. features
  • 28. THANK – YOU CREDITS AMAN JAIN GAURAV SACHDEVA

Editor's Notes

  1. -According to «IT-dictionary», Secure Shell is an alternative protocol to TelNET and Rlogin which connects to UNIX servers. -SSH was created in 1995 by Finland University Researcher and it was initially open source, as far as it went closed source in 1999
  2. -Normally a data is transmitted between client and server but not in a secure line, like internet. -To transmit data in a secure line, we use SecureSHell
  3. -This protocol handles TCP-servise one more time, to terminate a secure session utilizing secure encryption.
  4. -There are three available authentication methods -These for Automatic and secure authentication of both ends connection. Both the server and the client are authenticated to prevent identiy spoofing. For example: Trojan horses.
  5. -This is the difference between authentication without without key and with key -a ready-command «ssh» requests a connection to server
  6. After going through the research paper by Georgia Tech Research Institute, the following premises could be highlighted: