SlideShare a Scribd company logo
1 of 22
Dr. Mostafa Elgamala
RHCE-MCSA-CCNA-CCAI-CSCU-PMP-ITIL-IBDL
Security importance
 Algerian ministry of defense subjected to 3500 attempt daily.
 Hacking on UAV in south Korea.
 Hacking on Boshahr Nuclear reactor in Iran.
 Electric failure in USA due to cyber attack.
 Thieving of subscriber data of ashley madison, AT&T, T
mobile US.
 Thieving of 55000 username/password from Twitter.
 Nasa hacking.
Hacking scope
1- Planted medical devices hacking
2- Automobiles hacking
3- Computer &Mobile hacking
4- Network devices hacking
5- UAV hacking
6- Industrial devices hacking
…….Any software based device is vulnerable.
Cyber attack (online attack)- Why
 On line criminals for money ( i.e bank accounts)
 On line criminals for opinions and protest
(anonymous)
 Governments against its citizens
 For fun
Levels f security
 User security
 Application security
 System security
 Network security
 Physical security
System security
 Virus
 Worms(network)
 Backdoor
 Trojans (79% of malware)
 Key logger
 Logic bomb
 Spy ware
 Password cracking (brute force, dictionary attack,
shoulder surfing, social engineering)
 Zombie (bot)
Statistics (Sophos & F5)
 250000 virus every day (315000 Kaspersky)
 30,000 hacked site every day
 99 % from people fail to implement the basic security
procedures
 25% of malware is caught by antivirus
 82% of security problems from internal
Famous viruses
 1986 – Brain – Baset & Amgad Farouk
 1988 – morris worm – 10% of internet PC 6000-100M$
 1998 – Chernobyl – erase MBR
 2000 – I love you worm –file editing-10% of internet
PC-(5-10 B$)
 2008 – Conficker worm –slowing and steal data-15
million windows servers
 2010 – Stuxnet – scada systems – Boshaar - Iran
Guidelines for windows
 Strong password
 Lock the system when not in use
 Apply software patches
 Use windows firewall
 Hide files/folders
 Use NTFS
 Implement malware protection
Identity theft
 Personal information
 Names
 Addresses
 Birth date
 Telephone number
 Passport number
 Social security number
 Credit card number
How attacker steal identity?
 Physical methods:
 Stealing (computer, mobile, wallets)
 Social engineering (people trust)
 Pretexting: info from telephone companies of
financial institutions.
 Internet methods
Phishing : pretend to be financial institution site
or email.
Key loggers: may be by Trojans
Hacking: compromise user O.S , user sniffers, etc.
Social Engineering
 Art of convincing people to reveal confidential
information from people
 Human based method:
 Laying
 Eavesdropping
 Shoulder surfing
 Dumpster diving
 Computer based method
 Chain letter: free money or gift
 Hoax letter: warning from viruses
 Fake website: to know your info.
Measures
 Complex password
 Disable auto login
 Not post sensitive/personal information
 Be careful clicking links in messages (fake sites)
Mobile devices security
 Mobile malware: conversations listener, wipe-out
info. ,monitor your actions.
 Application vulnerabilities
 Lost or stolen devices
Measure procedures
 Patching mobile platforms and applications
 Use power-on authentication
 Backup
 Use mobile phone anti-virus
 Encrypt your data
 Secure Bluetooth
Avoid mobile device theft
 Avoid lending mobile phone
 Do not talk while walking/driving
 Turn off ringer
 Record IMEI (*#06#)
 Use anti-theft S/W to remotely wipe the data &
make the device unusable.
 Cancel SIM
Network security types
 Network sniffers
 Denial of service (DoS)
 DNS poisoning (DNS spoofing)
 Wireless security
 Man-in-the-middle attack
 Sql injection
Encryption
 Plain text
 Cipher text
 Encryption key
 Encryption types (symmetric / asymmetric / hash
function)
 Encryption standard (DES / AES)
Security awareness is the first
step for your security
Thanks

More Related Content

What's hot

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
BENCANA ALAM RIBUT TAUFAN
BENCANA ALAM RIBUT TAUFANBENCANA ALAM RIBUT TAUFAN
BENCANA ALAM RIBUT TAUFANaretool
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionNorrazman Zaiha Zainol
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Work Place Assignment
Work Place AssignmentWork Place Assignment
Work Place AssignmentZabidi Ismail
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilitiesManish Chaurasia
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...Fina Finaie
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 

What's hot (20)

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Information security
Information securityInformation security
Information security
 
BENCANA ALAM RIBUT TAUFAN
BENCANA ALAM RIBUT TAUFANBENCANA ALAM RIBUT TAUFAN
BENCANA ALAM RIBUT TAUFAN
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay versionHazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Work Place Assignment
Work Place AssignmentWork Place Assignment
Work Place Assignment
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...
LAPORAN BERKUMPULAN: SERANGAN LAHAD DATU MENAMPAKKAN KEDAULATAN TIDAK BOLEH D...
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 

Similar to Introduction to security

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Cybersecurity
CybersecurityCybersecurity
CybersecuritySabiha M
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 

Similar to Introduction to security (20)

Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 

More from Mostafa Elgamala

More from Mostafa Elgamala (20)

Faculty of Engineering - Tanta University- Programmong world
Faculty of Engineering - Tanta University- Programmong worldFaculty of Engineering - Tanta University- Programmong world
Faculty of Engineering - Tanta University- Programmong world
 
Faculty of Engineering - Tanta University - Mobile technology
Faculty of Engineering - Tanta University - Mobile technologyFaculty of Engineering - Tanta University - Mobile technology
Faculty of Engineering - Tanta University - Mobile technology
 
Faculty of Engineering - Tanta University - IT market
Faculty of Engineering - Tanta University - IT marketFaculty of Engineering - Tanta University - IT market
Faculty of Engineering - Tanta University - IT market
 
تربية الاطفال
تربية الاطفالتربية الاطفال
تربية الاطفال
 
ادارة الوقت
ادارة الوقتادارة الوقت
ادارة الوقت
 
Computer Maintanance
Computer MaintananceComputer Maintanance
Computer Maintanance
 
GSM
GSMGSM
GSM
 
Risk management mod
Risk management modRisk management mod
Risk management mod
 
Quality management mod
Quality management modQuality management mod
Quality management mod
 
Procurement management
Procurement managementProcurement management
Procurement management
 
Communication management
Communication managementCommunication management
Communication management
 
Human resources
Human resourcesHuman resources
Human resources
 
Cost management
Cost managementCost management
Cost management
 
Time management
Time managementTime management
Time management
 
Scope management
Scope managementScope management
Scope management
 
Introduction project managemen
Introduction project managemenIntroduction project managemen
Introduction project managemen
 
كيف تصل الى النجاح
كيف تصل الى النجاحكيف تصل الى النجاح
كيف تصل الى النجاح
 
CCNA - Dr. Mostafa Elgamala
CCNA - Dr. Mostafa ElgamalaCCNA - Dr. Mostafa Elgamala
CCNA - Dr. Mostafa Elgamala
 
It market
It marketIt market
It market
 
Communication
CommunicationCommunication
Communication
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Introduction to security

  • 2. Security importance  Algerian ministry of defense subjected to 3500 attempt daily.  Hacking on UAV in south Korea.  Hacking on Boshahr Nuclear reactor in Iran.  Electric failure in USA due to cyber attack.  Thieving of subscriber data of ashley madison, AT&T, T mobile US.  Thieving of 55000 username/password from Twitter.  Nasa hacking.
  • 3. Hacking scope 1- Planted medical devices hacking 2- Automobiles hacking 3- Computer &Mobile hacking 4- Network devices hacking 5- UAV hacking 6- Industrial devices hacking …….Any software based device is vulnerable.
  • 4. Cyber attack (online attack)- Why  On line criminals for money ( i.e bank accounts)  On line criminals for opinions and protest (anonymous)  Governments against its citizens  For fun
  • 5. Levels f security  User security  Application security  System security  Network security  Physical security
  • 6. System security  Virus  Worms(network)  Backdoor  Trojans (79% of malware)  Key logger  Logic bomb  Spy ware  Password cracking (brute force, dictionary attack, shoulder surfing, social engineering)  Zombie (bot)
  • 7. Statistics (Sophos & F5)  250000 virus every day (315000 Kaspersky)  30,000 hacked site every day  99 % from people fail to implement the basic security procedures  25% of malware is caught by antivirus  82% of security problems from internal
  • 8. Famous viruses  1986 – Brain – Baset & Amgad Farouk  1988 – morris worm – 10% of internet PC 6000-100M$  1998 – Chernobyl – erase MBR  2000 – I love you worm –file editing-10% of internet PC-(5-10 B$)  2008 – Conficker worm –slowing and steal data-15 million windows servers  2010 – Stuxnet – scada systems – Boshaar - Iran
  • 9. Guidelines for windows  Strong password  Lock the system when not in use  Apply software patches  Use windows firewall  Hide files/folders  Use NTFS  Implement malware protection
  • 10. Identity theft  Personal information  Names  Addresses  Birth date  Telephone number  Passport number  Social security number  Credit card number
  • 11. How attacker steal identity?  Physical methods:  Stealing (computer, mobile, wallets)  Social engineering (people trust)  Pretexting: info from telephone companies of financial institutions.
  • 12.  Internet methods Phishing : pretend to be financial institution site or email. Key loggers: may be by Trojans Hacking: compromise user O.S , user sniffers, etc.
  • 13. Social Engineering  Art of convincing people to reveal confidential information from people  Human based method:  Laying  Eavesdropping  Shoulder surfing  Dumpster diving
  • 14.  Computer based method  Chain letter: free money or gift  Hoax letter: warning from viruses  Fake website: to know your info.
  • 15. Measures  Complex password  Disable auto login  Not post sensitive/personal information  Be careful clicking links in messages (fake sites)
  • 16. Mobile devices security  Mobile malware: conversations listener, wipe-out info. ,monitor your actions.  Application vulnerabilities  Lost or stolen devices
  • 17. Measure procedures  Patching mobile platforms and applications  Use power-on authentication  Backup  Use mobile phone anti-virus  Encrypt your data  Secure Bluetooth
  • 18. Avoid mobile device theft  Avoid lending mobile phone  Do not talk while walking/driving  Turn off ringer  Record IMEI (*#06#)  Use anti-theft S/W to remotely wipe the data & make the device unusable.  Cancel SIM
  • 19. Network security types  Network sniffers  Denial of service (DoS)  DNS poisoning (DNS spoofing)  Wireless security  Man-in-the-middle attack  Sql injection
  • 20. Encryption  Plain text  Cipher text  Encryption key  Encryption types (symmetric / asymmetric / hash function)  Encryption standard (DES / AES)
  • 21. Security awareness is the first step for your security