In this presentation we discuss about the cyber secuirty and its knowed types.after this we discuss about the hacking and methods used by hackers and at the prevention from cyber attack nad its advantages by gettinng services from cyber security experts
4. What is cyber secuirty?
Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks. It's also known as
information technology security or electronic
information security.
6. Network Security
Network security consists of the policies,
processes and practices adopted to prevent,
detect and monitor unauthorized
access.Network Security involves access
control, virus and antivirus software,
application security, network analytics, types
of network-related security (endpoint, web,
wireless), firewalls, VPN encryption and more.
7. Application Security
Application security is the process of
developing, adding, and testing security
features within applications to prevent
security vulnerabilities against threats such
as unauthorized access and
modificationAuthentication, authorization,
encryption, logging, and application security
testing are all examples of application
security features.
8. Information Security
Information security refers to the processes and
methodologies which are designed and
implemented to protect print, electronic, or any
other form of confidential, private and sensitive
information or data from unauthorized
access, use, misuse, disclosure,
destruction, modification, or
disruption.
9. Cloud Security
Cloud security is the protection of data stored online via
cloud computing platforms from theft, leakage, and
deletion. Methods of providing cloud security include
firewalls, penetration testing, obfuscation,
tokenization, virtual private networks (VPN)
, and avoiding public internet connections.
Cloud security is a form of cybersecurity
10. What is Hacking?
Hacking is the act of identifying and then
exploiting weaknesses in a computer system or
network, usually to gain unauthorized access to
personal or organizational data. Hacking is not
always a malicious activity, but the term has
mostly negative connotations due to its
association with cybercrime.
12. Black Hat Hacker:
Black Hat hackers are criminals who
break into computer networks with
malicious intent. They may also
release malware that destroys files,
holds computers hostage, or steals
passwords, credit card numbers, and
other personal information.
13. White Hat Hacker:
White hat hackers – sometimes also called
“ethical hackers” or “good hackers” – are the
antithesis of black hats. They exploit computer
systems or networks to identify their
security flaws so they
can make recommendations for i
mprovement.
14. Somewhere between white and black are gray hat
hackers.Gray hat hackers may sometimes violate
laws or usual ethical standards but they do not
have the malicious intent typical of a black hat
hacker.When a gray hat hacker successfully
gains illegal access to a system or
network, they may suggest to the
system administrator that they or one of
their friends be hired to fix the problem for a fee
Grey Hat Hacker:
16. Phishing:
Phishing is a hacking technique using which a hacker
replicates the most-accessed sites and traps the
victim by sending that spoofed link. it becomes one of
the most commonly used and deadliest attack
vectors.
Once the victim tries to login or enters some data, the
hacker gets the private information of the target
victim using the trojan running on the fake site.
17.
18. Malware Injecting:
Viruses or Trojans are malicious software
programs that get installed into the victim’s
system and keep sending the victim’s data to
the hacker. They can also lock your files, serve
fraud advertisement, divert traffic, sniff your
data, or spread on all the computers
connected to your network.
trojan spyware ,worms etc.
19. Password cracking is the process of using
an application program to identify an
unknown or forgotten password to a
computer or network resource. It can also
be used to help a threat actor obtain
unauthorized access to resources.
Cracking Passwords:
20. Using Bait and Switch hacking technique, an attacker
can buy advertising spaces on the websites. Later, when
a user clicks on the ad, he might get directed to a page
that’s infected with malware. This way, they can further
install malware or adware on your computer. The ads
and download links shown in this technique are very
attractive and users are expected to end up clicking on
the same.
Bait and Switch:
21. A hacker can use software to fake a wireless access
point. This WAP connects to the official public place
WAP. Once you get connected to the fake WAP, a
hacker can access your data..Anyone can name
their WAP as some legit name like “Heathrow Airport
WiFi” or “Starbucks WiFi” and start spying on you.
One of the best ways to protect yourself from such
attacks is by using a quality VPN
Fake Wap:
22. The cookies in our browser store personal data such
as browsing history, username, and passwords for
different sites we access. Once the hacker gets
access to your cookie, he can even authenticate
himself as you on a browser.Attack is easy to carry
out if the user is not using SSL (HTTPS) for the
complete session.
Cookie theft: