Successfully reported this slideshow.
Your SlideShare is downloading. ×

Introduction to Cyber Security

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
Ethics
Ethics
Loading in …3
×

Check these out next

1 of 25 Ad

Introduction to Cyber Security

Download to read offline

Discussed about the following topics: A Web Security Forensic Lesson
Web Languages
Introduction to different web attacks
overview of n-tier web applications
Web servers
Apache
IIS
Database Servers

Discussed about the following topics: A Web Security Forensic Lesson
Web Languages
Introduction to different web attacks
overview of n-tier web applications
Web servers
Apache
IIS
Database Servers

Advertisement
Advertisement

More Related Content

More from Vikram Nandini (20)

Recently uploaded (20)

Advertisement

Introduction to Cyber Security

  1. 1. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE UNIT-1 INTRODUCTION Dr. Vikram Neerugatti Professor Department of CSE 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 1
  2. 2. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE • A Web Security Forensic Lesson • Web Languages • Introduction to different web attacks • overview of n-tier web applications • Web servers • Apache • IIS • Database Servers Content 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 2
  3. 3. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Cyber is relating to or characteristic of the culture of computers, information technology, and virtual reality ✓ Security is the state of being free from danger or threat. ✓ Web is a complex system of interconnected elements. A Web Security Forensic Lesson 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 3
  4. 4. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ The branch of science and technology concerned with the design, building, and use of engines, machines, and structures. (oxford) ✓ The action of working artfully to bring something about. (oxford) ✓ Engineering is the use of scientific principles to design and build machines, structures, and other items, including bridges, tunnels, roads, vehicles, and buildings. (Wikipedia) A Web Security Forensic Lesson 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 4
  5. 5. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ HTML ✓ CSS ✓ Java ✓ Java Script ✓ PHP ✓ Angular JS ✓ Node JS Web Languages 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 5
  6. 6. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Malware-“Malware” refers to malicious software viruses including worms, spyware, ransomware, adware, and trojans. ✓ Phishing- It is a type of social engineering attack wherein an attacker impersonates to be a trusted contact and sends the victim fake mails. ✓ Password- It is a form of attack wherein a hacker cracks your password with various programs and password cracking tools like Aircrack, Cain, Abel, John the Ripper, Hashcat, etc. ✓ Man-in-Middle attack-Man-in-the-Middle Attack (MITM) is also known as an eavesdropping attack. In this attack, an attacker comes in between a two-party communication. ✓ SQL Injection- Hacker manipulates a standard SQL query ✓ Denial of service attack- exhaust resources and bandwidth in network/if any - traffic. ✓ Insider Threat- who know about organization. Introduction to different Web attacks 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 6
  7. 7. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ N-tier data applications are data applications that are separated into multiple tiers. ✓ Also called "distributed applications" and "multitier applications", n-tier applications separate processing into discrete tiers that are distributed between the client and the server. ➢ Presentation tier ➢ Middle tier ➢ Data tier Overview of n-tier web applications 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 7
  8. 8. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE Web Servers 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 8
  9. 9. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ On the hardware side, a web server is a computer that stores web server software and a website's component files (for example, HTML documents, images, CSS stylesheets, and JavaScript files). ✓ A web server connects to the Internet and supports physical data interchange with other devices connected to the web. ✓ The primary role of a web server is to store, process, and deliver requested information or webpages to end users. It uses: Physical Storage: All website data is stored on a physical web server to ensure its safety. Web Servers 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 9
  10. 10. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Apache Tomcat is a web application server in which Java code can run. ✓ Tomcat brings together a subset of the Java EE technologies—including the Servlet, JavaServer Pages (JSPs), and WebSocket APIs—to run applications built on the Java programming language. ✓ These capabilities enable Tomcat to operate as a web application server while performing its primary function as a Servlet container. Apache Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 10
  11. 11. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Widely used by web developers, Tomcat provides the means to make otherwise static HTML web pages interactive. ✓ Apache Tomcat is a lightweight app, offering only the core functionality necessary to run a server, resulting in quick load and redeploy times. ✓ Apache Tomcat® - Welcome! Apache Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 11
  12. 12. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE Apache Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 12
  13. 13. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files. ✓ An IIS web server accepts requests from remote client computers and returns the appropriate response. ✓ Administrators can use the Web Server (IIS) role to set up and manage multiple websites, web applications, and FTP sites. IIS Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 13
  14. 14. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Some of the specific features include the following: Use IIS Manager to configure IIS features and administer you websites. ✓ With IIS, you can remove all unused server features, achieving the minimum surface area possible while preserving the functionality of your application. ✓ Improve performance and reduce memory footprint. IIS Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 14
  15. 15. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ IIS maintains information about the location of content files, what security identities have access to those files, how content files are separated into applications, and what URLs are mapped to those applications. ✓ Internet Information Services (IIS) 7 and later use an XML-based configuration system for storing IIS settings which replaces the metabase that was used in IIS 6.0 and earlier. ✓ This new configuration system was introduced with ASP.NET and is based on a hierarchical system of management system that uses *. config files. IIS Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 15
  16. 16. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE IIS Server 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 16
  17. 17. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). ✓ Databases are structured to facilitate the storage, retrieval, modification, and deletion of data in conjunction with various data-processing operations. ✓ Databases often store information about people, such as customers or users. Database Servers 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 17
  18. 18. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ Database servers are used to store and manage databases that are stored on the server and to provide data access for authorized users. ✓ This type of server keeps the data in a central location that can be regularly backed up. ✓ It also allows users and applications to centrally access the data across the network. ✓ A database server is a type of hardware that runs database software. ✓ Database software helps users or companies store, manage, retrieve, update or change files, information logs and other forms of digital data. Database Servers 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 18
  19. 19. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE ✓ A database server consists of hardware and software that run a database. ✓ The software side of a database server, or the database instance, is the back-end database application. ✓ The application represents a set of memory structures and background processes accessing a set of database files. ✓ Individuals and organizations everywhere need the ability to store and manage data. Database Servers 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 19
  20. 20. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE CSE Department- Infrastructure 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 20
  21. 21. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE CSE Department- Infrastructure 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 21
  22. 22. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE CSE Department- Activities 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 22
  23. 23. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE Blooms Taxonomy 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 23
  24. 24. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE Any Questions/Clarifications/Doubts 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 24
  25. 25. Chadalawada Ramanamma Engineering College (A), Tirupati. Department of CSE Thank you all 10/20/2022 Cyber Security by Dr. Vikram Neerugatti 25

×