CYBER SECURITY - Syamprasad K R

251 views

Published on

Describes the basic cyber threats and general security measures.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
251
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

CYBER SECURITY - Syamprasad K R

  1. 1. SYAMPRASAD K RS6E236254
  2. 2. IntroductionCyber security is the body oftechnologies, processes and practicesdesigned to protectnetworks, computers, programs and datafrom attack, damage or unauthorizedaccess.
  3. 3. RelevanceInformation AgeReliance on networksHigh speed 24*7 Internet access
  4. 4. AttackersMalicious PrankstersSerious Attackers-Credit card and banking information-R & D information-Disrupting stock exchanges, power grids,transportation facilities etc
  5. 5. Tools And TechniquesVIRUSRATSpammingPhishing
  6. 6. Tools And TechniquesDoS/DDoSSocial EngineeringOthers: Adware, BOTS, Keyloggers etc
  7. 7. VIRUSVital Information Resources Under SiegeReplicates itselfInfection StrategySelf modification
  8. 8. Famous Bad GuysMelissaILOVEYOU„HELLO! Welcometo http://www.worm.com! Hacked ByChinese!‟Sobig F
  9. 9. RATRemote Administration ToolTrojan HorseCan be used to perform other attacks.Eg: Back Orifice, Dark Comet, Bandooketc
  10. 10. SpammingUsing electronic messaging systems tosend unsolicited bulk messages.Motives-Advertising-Search RanksWe are the TOPPERS!!!
  11. 11. PhishingIdentity TheftSpoofingEncourages the victim to enter informationto a pop-up window or fraudulent webpage.
  12. 12. Phishing
  13. 13. DoS/DDoSDoS: Denial of ServiceDDoS: Distributed Denial of ServiceSmurf AttackPing Attack
  14. 14. DoS/DDoS
  15. 15. Social Engineering “Getting people to do things that theywouldn‟t ordinarily do for a stranger.”-Kevin Mitnick Techniques:-Pretexting-IVRS-Quid pro quo-Tailgating
  16. 16. Security Measures“The most potent tool in any securityarsenal isn‟t a powerful firewall or asophisticated intrusion detection system.When it comes to security, knowledge isthe most effective tool…..”-Douglas Schweizer
  17. 17. Security MeasuresAntivirus SoftwareEmail AttachmentsRight OSBack up
  18. 18. Security MeasuresObserve the networkFirewallChoose not to be a victim
  19. 19. ?
  20. 20. ThanQ!!

×