SlideShare a Scribd company logo
1 of 20
 OUTLINE
 Introduction.
 Internet Security: What it is, and why we need it.
 Hackers: Who is he, Classes, Hacking Phases.
 Attacks examples
 What should I do to be safe online ?
 Conclusion
2
 INTRODUCTION:
 While the internet offers enormous advantages and opportunities, it also presents
various security risks.
 It’s where we access our banking records, credit card statements, tax returns and other
highly sensitive personal information.
 Banks take extensive steps to protect the information transmitted andprocessed
when banking online.
 But with all the good things the Internet offers us, it also opens the door toserious,
potentially devastating threats.
3
 Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection of data
sent via Internet Protocol.
 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that come with
Internet use  Safety
 INTERNET SECURITY: WHAT IT
IS
4
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
The criminals use in accessing :
• your private information.
• stealing your identity or your money.
• It can also be used to highjack your
computer for illegal purposes.
 INTERNET SECURITY:
 WHY YOU NEED IT.
-Identifies your computer
-Where it is located
Request
Response
carries with it unwanted hidden software
5
 HACKERS:
 WHO IS A HACKER ?
Intelligent individuals
with excellent
computer skills with
the ability to create
and explore
computer’s software
and Hardware
For some
hackers,hacking is a
hobby to see how
many computers they
can compromise
Their intention can either be to gain
knowledge or to poke around to do
illegal things
6
 Hackers
 Hacker Classes :
Black Hats Grey Hats White Hats
Individuals with
extraordinary computing
skills, Restoring to malicious
or destructive activities and
also known as Crackers
Individuals professing
hacker skills and using
them for defensive
purposes and are also
known as Security
Analysts
Individuals who work
both offensively and
defensively at various
times
7
 HACKERS
 Hacking Phases :
Reconnaissance Scanning
Gaining
Access
Maintaining
Access
Covering
Tracks
8
 ATTACKS EXAMPLES
 Phishing
“Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication.”
9
 Attacks examples
 Phishing
10
 ATTACKS EXAMPLES
 Pharming
 Is another technique used
to steal confidential
access code. It works by
redirecting users to a
rogue server
11
 ATTACKS EXAMPLES
 SQL injection
 SQL injection is a technique
used to take advantage of non
validated input vulnerabilities
to pass SQL commands
through a web application for
execution by a backend
database
12
 Attacks examples
 SQL injection
13
14
 WHAT SHOULD I DO TO BE SAFE ONLINE ?
 To protect your self
 Keep you passwords private
and create ones too strong that
are hard to “crack”
 If you have received an Email
encounters, you may have been
the target of a common scam
called ‘phishing’.
15
 WHAT SHOULD I DO TO BE SAFE ONLINE
?
 To protect your self
 Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.
 If you make purchases
or do your banking
online, make sure you
protect your financial
information
 Use ‘https://’
16
 WHAT SHOULD I DO TO BE SAFE ONLINE
?
 To protect your Computer
 Use Anti-virus
Software: Anti-virus
software can detect
and destroy computer
viruses before they
cause damage
 Use Anti-spyware
Software: Use anti-spyware
software so unknown
people cannot lurk on
your computer and
potentially
 steal your information
17
 WHAT SHOULD I DO TO BE SAFE ONLINE ?
 To protect your Computer
 Keep Your Computer
Updated.
 Install all security updates as
soon as they are available
Automatic updates provide the
best protection.
 Use a Firewall:
 It is a placed at the gateway
between the two networks
which is usually a private
Network and a public network
such as the internet
18
 CONCLUSION
 Whenever using internet or an online financial system, ensure that your
system is still under your control and not a spoofed puppet.
 Protecting your self from internet threats.
 Being aware of the dangers of the internet and taking the rightsteps to
avoid them means you can enjoy the internet safely.
19
Internet Security.pptx

More Related Content

Similar to Internet Security.pptx

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxDhruvsinhbhati
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 

Similar to Internet Security.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Mobile security
Mobile securityMobile security
Mobile security
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Internet Security.pptx

  • 1.
  • 2.  OUTLINE  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks examples  What should I do to be safe online ?  Conclusion 2
  • 3.  INTRODUCTION:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted andprocessed when banking online.  But with all the good things the Internet offers us, it also opens the door toserious, potentially devastating threats. 3
  • 4.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety  INTERNET SECURITY: WHAT IT IS 4
  • 5. - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable The criminals use in accessing : • your private information. • stealing your identity or your money. • It can also be used to highjack your computer for illegal purposes.  INTERNET SECURITY:  WHY YOU NEED IT. -Identifies your computer -Where it is located Request Response carries with it unwanted hidden software 5
  • 6.  HACKERS:  WHO IS A HACKER ? Intelligent individuals with excellent computer skills with the ability to create and explore computer’s software and Hardware For some hackers,hacking is a hobby to see how many computers they can compromise Their intention can either be to gain knowledge or to poke around to do illegal things 6
  • 7.  Hackers  Hacker Classes : Black Hats Grey Hats White Hats Individuals with extraordinary computing skills, Restoring to malicious or destructive activities and also known as Crackers Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysts Individuals who work both offensively and defensively at various times 7
  • 8.  HACKERS  Hacking Phases : Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks 8
  • 9.  ATTACKS EXAMPLES  Phishing “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” 9
  • 11.  ATTACKS EXAMPLES  Pharming  Is another technique used to steal confidential access code. It works by redirecting users to a rogue server 11
  • 12.  ATTACKS EXAMPLES  SQL injection  SQL injection is a technique used to take advantage of non validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database 12
  • 13.  Attacks examples  SQL injection 13
  • 14. 14
  • 15.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your self  Keep you passwords private and create ones too strong that are hard to “crack”  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 15
  • 16.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your self  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name.  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 16
  • 17.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your Computer  Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage  Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially  steal your information 17
  • 18.  WHAT SHOULD I DO TO BE SAFE ONLINE ?  To protect your Computer  Keep Your Computer Updated.  Install all security updates as soon as they are available Automatic updates provide the best protection.  Use a Firewall:  It is a placed at the gateway between the two networks which is usually a private Network and a public network such as the internet 18
  • 19.  CONCLUSION  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the rightsteps to avoid them means you can enjoy the internet safely. 19