SlideShare a Scribd company logo
1 of 7
Download to read offline
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-115
www.viva-technology.org/New/IJRI
INTERNET HACKING AND PREVENTION
Suraj K. Yadav 1
, Prof.Pragati Mestry2
1
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
2
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
Abstract : Understanding the term hacking as any unconventional way of interacting with some system it is
easy to conclude that there are enormous number of people who hacked or tried to hack someone or something.
The article, as result of author research, analyses hacking from different points of view, including hacker's point
of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do
people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end,
some questions about victim protection are discussed together with the weakness that hackers can use for their
own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on
the mobile phones and on possible attacks in the announced food of the internet of things (next IoT) devices.
.
Keywords - Scalability, Fault tolerance, Performance, Measurements.
I. INTRODUCTION
Hacking is an unauthorized entry into a network or a computer to steal or manipulate information, data or
files. The person involved in this process is named as a hacker. Computer hacking is done using several types of
programs such as Rootkit, Trojan, Keylogger etc. Hackers also employ techniques like browser hijacks,
spoofing, phishing etc. to capture user’s personal or financial details.
Your computer may show certain signs of being hacked such as fake antivirus warning messages, unwanted
browser toolbar, redirection to strange websites, random pop ups, ransomware message etc. If you receive any
of these warning signs, you can be sure that your computer has been targeted by a hacker.
Prevention:If you are planning to download a music file, video or a utility software do so from a trusted
website. Many websites offer a free download of certain high-value software, but those may carry the virus or a
spyware released by a hacker to obtain your PC information.
Email is one of the biggest tools through which hackers spread malware. The spyware or virus are
hidden in attachments and links clicking on which the infection begins. Hence, never click on random
attachments if those are not from any trusted source.
Figure : Internet Hacking and Prevention
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-116
www.viva-technology.org/New/IJRI
II. SYSTEM INTERACTIONS
Patch and Update Constantly
Ultimately the most hacker-resistant environment is the one that is best administered. Organizations
are short cutting system and network administration activities through budget / staff reductions and lack of
training. This practice often forces prioritization and choice about what tasks get done sooner, later or at
all. Over time this creates a large, persistent baseline of low to medium risk issues in the environment that
can contribute to a wildfire event under the right conditions. Lack of a complete asset inventory – both
hardware and software – contributes to this risk as applications and devices become unmanaged. Staying on
top of patching, system/application updates, end of support/life platform migrations, user administration and
configuration management is tedious, time consuming, and generally underappreciated; but this activity -
more than any other single task, will reduce the risk of cyber events in an organization and dramatically
reduce the risk of opportunistic attacks.
Email Security
Email is the number one entry point for malware into the enterprise. No surprise really. Given all the
data that has pointed to this as the root cause of many breach events, it should be the next place where
organizations double-down on security. It is very important that organizations take the time to be informed
consumers in this regard and understand what threats the email controls are preventing and what the
remaining exposures are so that a layered control model can be put in place.
Endpoint Detection and Response
Most of that email is destined for a user that will click on attachments and potentially infect themselves
with malware of some kind. The second most common malware infection vector is through malicious web
content; also, an end-user action. As a result, it makes sense to have a thorough suite of controls on the
endpoints and servers in the environment to identify and shutdown viruses, malware, and other potentially
unwanted programs. Making sure that all endpoints are under management and kept current will help
prevent whack-a-mole malware infections that can persist in environments with inconsistently applied
controls.
Segmentation and Egress Filtering
Just because a hacker or piece of malware makes its way into your environment, doesn’t mean they should
be able to spread adjacent network nodes or waltz back out with your mission critical, regulated
data. Limiting the ability to communicate both across and outside the network through a combination of
controls such as firewall policies and requiring the use of proxy servers is an often-overlooked opportunity
for organizations to increase their security, limit the impact of an incident and help prevent a network
incident from becoming a public data breach.
Robust Detection Control Infrastructure
History teaches us that prevention-centric strategies will fail and should be paired with detective controls to
minimize time to detection and remediation. Make certain you have a well-tuned SIEM/SOAPA/SOAR
infrastructure as part of your security architecture and that that is receiving logs that cover the internal network
and applications as well as through the perimeter. This includes tuning of endpoint, application, and network
device logs to enable an early detection and response capability in the environment.
Multi-factor / Multi-step Authentication
The majority of breaches involve the use of cracked, intercepted or otherwise disclosed authentication
credentials at some point. Use strong, multi-factor authentication methods by default wherever
possible. Combined with the ability to detect and alert on failed login attempts, this practice can provide clues
to users that may be the focus of targeted attacks.
III. MASTER OPERATION
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-117
www.viva-technology.org/New/IJRI
In order to prevent this unauthorized intrusion into your systems/networks , you must follow some basic security
guidelines:
DOWNLOAD SOFTWARE FROM AUTHORIZED WEBSITES
If you are planning to download a music file, video or a utility software do so from a trusted website. Many
websites offer a free download of certain high-value software, but those may carry the virus or a spyware
released by a hacker to obtain your PC information.
DO NOT CLICK ON RANDOM EMAIL ATTACHMENTS
Email is one of the biggest tools through which hackers spread malware. The spyware or virus are hidden in
attachments and links clicking on which the infection begins. Hence, never click on random attachments if those
are not from any trusted source.
SCAN ALL TYPES OF HARD DRIVES BEFORE RUNNING
Hard drives such as pen drives, external hard disk or mobile devices should be scanned by a USB scanner to
remove any kind of malware.
ABSTAIN FROM KEEPING EASY PASSWORDS
Do not keep easy passwords such as- your name followed by1234, your pet name or name & date of birth
etc. These information can be easily guessed or can be fetched from social media sites, so follow best password
management practices. You should keep an alpha-numeric password for your accounts including a combination
of special characters.
NEVER STORE OR SHARE YOUR LOGIN INFORMATION
Keeping your user id, password on your PC increases the risk of becoming a victim of hackers. Always try
to memorize your login information. It is also important to abstain from sharing your password via email.
Importance of an Anti-hacking Software
Anti-hacking software is also known as a computer antivirus software, which is a must have for every
PC. Anti-hacking software protects a PC from these cyber attacks by detecting and removing the virus,
spyware, and other malware intrusions. The antivirus software must be kept updated with the latest virus
signature so that any types of new threats can be detected. REVE Antivirus software is ideal for internet users
as it protects your computer's data from hackers.
IV. FAULT TOLERANCE AND DIAGNOSIS
FAULT TOLERANCE
Fault tolerance is a technique that has proven to be efficient to implement computing systems able to provide
a correct service despite accidental phenomena such as environmental perturbations (external faults), failures of
hardware components (internal physical faults), or even design faults such as software bugs. Faults are causes of
errors, errors are abnormal parts of the computing system state, and failures happen when errors propagate
through the system-to-user interface, i.e., when the service provided by the system is incorrect.
When faults are accidental and sufficiently rare, they can be tolerated. To do so, errors must be detected
before they lead to failure, and then corrected or recovered: this is the role of error handling. It is also necessary
to diagnose the underlying faults (i.e., to identify and locate the faulty components), so as to be able to isolate
them, and then replace or repair them, and finally to re-establish the system in its nominal configuration: fault
diagnosis, isolation, repair and reconfiguration together constitute fault handling.
There are various techniques for detecting errors. For simplicity, we categorize these as being either
property-checks or comparison-checks. Property-checks consist in observing the system state, in particular
certain values or events, and verifying they satisfy certain properties or rules. This usually imposes only a small
hardware or software overhead (redundancy). Among hardware property-checks, let us note that most
microprocessors detect non-existing or unauthorized instructions and commands, non-existing addresses and
unauthorized access modes, and that watchdogs can detect excessive execution durations. Software-based
property-checks include likelihood tests inserted into programs to check the values of certain variables, or the
instants or sequences of certain events (defensive programming).
Error detecting codes and run-time model checking can also be viewed as property-checks. Comparison-
checks consist in comparing several executions, carried out either sequentially on the same hardware, or on
different hardware units. This requires more redundancy than the first class of error detection techniques, but it
also assumes that a single fault would not produce the same effect (i.e., identical errors) on the different
executions. If only internal physical faults are considered, the same computation can be run on identical
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-118
www.viva-technology.org/New/IJRI
hardware units, since it is very unlikely that each hardware unit would suffer an identical internal fault at the
same execution instant to produce the same error. On the contrary, design faults would produce the same errors
if the same process is run on identical hardware units, and thus the comparison of the executions would not
detect discrepancies. In that case, it is necessary to diversify the underlying execution support, so that a single
design fault would affect only one execution, or at least would affect differently the different executions.
To be able to do that, it is necessary to have created and saved copies of the system state, known as recovery
points or checkpoints. Another error correction technique is called forward recovery, which consists of replacing
the erroneous system state by a new, healthy state, and then continuing execution. This is possible, for example,
in certain real-time control systems in which the system can be re-initialized and input data reread from sensors
before continuing execution.
Finally, a third technique consists in “masking” errors; This is possible when there is enough redundant state
information for a correct state to be built from the erroneous state, e.g., by a majority vote on three (or more)
executions. In most cases, the efficacy of fault tolerance techniques relies on the fact that faults are rare
phenomena that occur at random points in time. It is thus possible, for example in a triple modular redundant
architecture, to suppose that is unlikely for a second unit to fail while a failed unit is being repaired. An attacker
that succeeds in penetrating one system can pursue his attack on that system, and also simultaneously attack
other similar systems.
Diagnostic Tools
It should be noted that most currently available intrusion detection systems do not include any intrusion
diagnosis mechanisms. The explicit recognition of the fact that misuses and anomalies are indeed errors that can
be caused by any sort of fault. Indeed, a good intrusion detection system requires such a fault diagnosis
mechanism to minimize the rate of false alarms caused by errors due to other classes of faults.
V. MEASUREMENTS
1. Use a firewall.
Windows and macOS have built-in firewalls – software designed to create a barrier between your information
and the outside world. Firewalls prevent unauthorized access to your business network and alert you to any
intrusion attempts.Make sure the firewall is enabled before you go online. You can also purchase a hardware
firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has
a built-in firewall that protects your network. If you have a larger business, you can purchase an additional
business networking firewall.
2. Install antivirus software.
Computer viruses and malware are everywhere. Antivirus programs such as Bitdefender, Panda Free
Antivirus, Malwarebytes and Avast protect your computer against unauthorized code or software that may
threaten your operating system. Viruses may have easy-to-spot effects – for example, they might slow your
computer or delete key files – or they may be less conspicuous.Antivirus software plays a major role in
protecting your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus
programs provide automatic updates, further protecting your machine from the new viruses that emerge every
day. After you install an antivirus program, don't forget to use it. Run or schedule regular virus scans to keep
your computer virus-free.
3. Install an anti-spyware package.
Spyware is a special kind of software that secretly monitors and collects personal or organizational information.
It is designed to be hard to detect and difficult to remove and tends to deliver unwanted ads or search results that
are intended to direct you to certain (often malicious) websites.Some spyware records every keystroke to gain
access to passwords and other financial information. Anti-spyware concentrates exclusively on this threat, but it
is often included in major antivirus packages, like those from Webroot, McAfee and Norton. Anti-spyware
packages provide real-time protection by scanning all incoming information and blocking threats.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-119
www.viva-technology.org/New/IJRI
4. Use complex passwords.
Using secure passwords is the most important way to prevent network intrusions. The more secure your
passwords are, the harder it is for a hacker to invade your system.
More secure often means longer and more complex. Use a password that has at least eight characters and a
combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of
tools to break short, easy passwords in minutes.
Don't use recognizable words or combinations that represent birthdays or other information that can be
connected to you. Don't reuse passwords, either. If you have too many passwords to remember, consider using a
password manager, such as Dashlane, Sticky Password, LastPass or Password Boss.
5. Keep your OS, apps and browser up-to-date.
Always install new updates to your operating systems. Most updates include security fixes that prevent hackers
from accessing and exploiting your data. The same goes for apps. Today's web browsers are increasingly
sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to
installing all new updates. For example, you can use your browser to prevent websites from tracking your
movements, which increases your online privacy. Or, use one of these private web browsers.
6. Ignore spam.
Beware of email messages from unknown parties, and never click on links or open attachments that accompany
them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated
phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become
common, so keep your eyes open for anything that looks or sounds suspicious.
7. Back up your computer.
If your business is not already backing up your hard drive, you should begin doing so immediately. Backing up
your information is critical in case hackers do succeed in getting through and trashing your system.Always be
sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into
macOS (Time Machine) and Windows (File History) are good places to start. An external backup hard drive can
also provide enough space for these utilities to operate properly.
8. Shut it down.
Many businesses, especially those operating a web server, are "all systems go" all the time. If you're not
operating a complex internet-based company, however, switch off your machine overnight or during long
stretches when you're not working. Always being on makes your computer a more visible and available target
for hackers; shutting down breaks the connection a hacker may have established with your network and disrupts
any possible mischief.
9. Use virtualization.
Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded with spyware
and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites,
virtualization allows you to run your browser in a virtual environment, like Parallels or VMware Fusion, that
sidesteps your operating system to keep it safer.
10. Secure your network.
Routers don't usually come with the highest security settings enabled. When setting up your network, log in to
the router, and set a password using a secure, encrypted setup. This prevents intruders from infiltrating your
network and messing with your settings.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-120
www.viva-technology.org/New/IJRI
11. Use two-factor authentication.
Passwords are the first line of defense against computer hackers, but a second layer boosts protection. Many
sites let you enable two-factor authentication, which boosts security because it requires you to type in a
numerical code – sent to your phone or email address – in addition to your password when logging in.
12. Use encryption.
Even if cybercriminals gain access to your network and files, encryption can prevent them from accessing any
of that information. You can encrypt your Windows or macOS hard drive with BitLocker (Windows)
or FileVault (Mac), encrypt any USB flash drive that contains sensitive information and use a VPN to encrypt
web traffic. Only shop at encrypted websites; you can spot them immediately by the "https" in the address bar,
accompanied by a closed-padlock icon.
VI. CONCLUSIONS
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of
ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification
program that tests individual’s skills. Those who pass the examination are awarded with certificates. The
certificates are supposed to be renewed after some time.
Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing a crime with the aid of computers and information technology infrastructure.
Ethical Hacking is about improving the security of computer systems and/or computer networks.
Ethical Hacking is legal. Today hackers are spread across the world in large quantities. Many government and
private agencies are working to detect these hackers, but we also have some duty to protect ourselves and our
private data from online frauds. Apart from this, people who are illiterate should be given information about
debit cards, credit cards, the internet, and computer. We know it is a bit difficult to catch these hackers because
they sit in one country and hack the computer from another country, so the best way to avoid these things is that
we have to be careful and alert and all IDs and Passwords on the Internet should always be unique and strong.
Finally, I would like to say that if you use the internet properly and use the secure websites, then it will be
difficult for hackers to hack your data.
VII. ACKNOWLEDGEMENTS
I thank my college for giving us the opportunity to make this project a success. I offer my special thanks and
sincerity.
I thank Professor Krutika vartak for encouraging me to complete this research paper, for guidance and assistance
for all the problems I encountered while doing research.
Without his guidance, I would not have completed my research paper.
VIII. REFERENCES
[1] Sanctum Inc, “Ethical Hacking techniques to audit and secure web enabled applications”, 2002.
[2] B. Reto, “Ethical Hacking”, in GSEC Practical Assignment, Version 1.4b, Option 1, Nov 24, 2002.
[3] Smith B., Yurcik W., Doss D., “Ethical Hacking: the security justification redux”, IEEE Transactions, pp.
375- 379, 2002.
[4] J. Danish and A. N. Muhammad, “Is Ethical Hacking Ethical? “ , International journal of Engineering
Science and Technology, Vol 3 No. 5, pp. 3758-3763, May 2011.
[5] Ajinkya A. Farsole, Amurta G. Kashikar and Apurva Zunzunwala , “Ethical Hacking, International journal
of Computer Applications (0975-8887), Vol. 1 No. 10, pp. 14-20, 2010.
[6] H.M David, “Three Different Shades of Ethical Hacking: Black, White and Gray,” in GSEC Practical
Assignment, Version 1.4b, Option 1, Feb 23, 2004.
[7] Ajinkya A., Farsole Amruta G., Kashikar Apurva Zunzunwala"Ethical Hacking", in 2010 International
Journal of Computer Applications (0975 – 8887) Volume 1 – No. 10
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
F-121
www.viva-technology.org/New/IJRI
[8] Marilyn Leathers “A Closer Look at Ethical Hacking and Hackers" in East Carolina University ICTN
6865.
[9] Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo Lopes Filho, Jayme Tadeu Machado, A Security
Framework to Protect Against Social Networks Services Threats, 2010 Fifth International Conference on
Systems and Networks Communications.

More Related Content

What's hot

Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...Quinnipiac University
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Hacking
HackingHacking
HackingVirus
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Esteban
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typeshamza javed
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 

What's hot (19)

Hacking
HackingHacking
Hacking
 
Ethical Hacking A high-level information security study on protecting a comp...
Ethical Hacking  A high-level information security study on protecting a comp...Ethical Hacking  A high-level information security study on protecting a comp...
Ethical Hacking A high-level information security study on protecting a comp...
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 

Similar to 185

Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Jennifer Letterman
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureMohit Rampal
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Educationijtsrd
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 

Similar to 185 (20)

Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
Cyber Security for Critical Infrastructure
Cyber Security for Critical InfrastructureCyber Security for Critical Infrastructure
Cyber Security for Critical Infrastructure
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
APT - Project
APT - Project APT - Project
APT - Project
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 

More from vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problemvivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethicsvivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbotsvivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technologyvivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devicesvivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Fluttervivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
 

More from vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

185

  • 1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-115 www.viva-technology.org/New/IJRI INTERNET HACKING AND PREVENTION Suraj K. Yadav 1 , Prof.Pragati Mestry2 1 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) 2 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) Abstract : Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced food of the internet of things (next IoT) devices. . Keywords - Scalability, Fault tolerance, Performance, Measurements. I. INTRODUCTION Hacking is an unauthorized entry into a network or a computer to steal or manipulate information, data or files. The person involved in this process is named as a hacker. Computer hacking is done using several types of programs such as Rootkit, Trojan, Keylogger etc. Hackers also employ techniques like browser hijacks, spoofing, phishing etc. to capture user’s personal or financial details. Your computer may show certain signs of being hacked such as fake antivirus warning messages, unwanted browser toolbar, redirection to strange websites, random pop ups, ransomware message etc. If you receive any of these warning signs, you can be sure that your computer has been targeted by a hacker. Prevention:If you are planning to download a music file, video or a utility software do so from a trusted website. Many websites offer a free download of certain high-value software, but those may carry the virus or a spyware released by a hacker to obtain your PC information. Email is one of the biggest tools through which hackers spread malware. The spyware or virus are hidden in attachments and links clicking on which the infection begins. Hence, never click on random attachments if those are not from any trusted source. Figure : Internet Hacking and Prevention
  • 2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-116 www.viva-technology.org/New/IJRI II. SYSTEM INTERACTIONS Patch and Update Constantly Ultimately the most hacker-resistant environment is the one that is best administered. Organizations are short cutting system and network administration activities through budget / staff reductions and lack of training. This practice often forces prioritization and choice about what tasks get done sooner, later or at all. Over time this creates a large, persistent baseline of low to medium risk issues in the environment that can contribute to a wildfire event under the right conditions. Lack of a complete asset inventory – both hardware and software – contributes to this risk as applications and devices become unmanaged. Staying on top of patching, system/application updates, end of support/life platform migrations, user administration and configuration management is tedious, time consuming, and generally underappreciated; but this activity - more than any other single task, will reduce the risk of cyber events in an organization and dramatically reduce the risk of opportunistic attacks. Email Security Email is the number one entry point for malware into the enterprise. No surprise really. Given all the data that has pointed to this as the root cause of many breach events, it should be the next place where organizations double-down on security. It is very important that organizations take the time to be informed consumers in this regard and understand what threats the email controls are preventing and what the remaining exposures are so that a layered control model can be put in place. Endpoint Detection and Response Most of that email is destined for a user that will click on attachments and potentially infect themselves with malware of some kind. The second most common malware infection vector is through malicious web content; also, an end-user action. As a result, it makes sense to have a thorough suite of controls on the endpoints and servers in the environment to identify and shutdown viruses, malware, and other potentially unwanted programs. Making sure that all endpoints are under management and kept current will help prevent whack-a-mole malware infections that can persist in environments with inconsistently applied controls. Segmentation and Egress Filtering Just because a hacker or piece of malware makes its way into your environment, doesn’t mean they should be able to spread adjacent network nodes or waltz back out with your mission critical, regulated data. Limiting the ability to communicate both across and outside the network through a combination of controls such as firewall policies and requiring the use of proxy servers is an often-overlooked opportunity for organizations to increase their security, limit the impact of an incident and help prevent a network incident from becoming a public data breach. Robust Detection Control Infrastructure History teaches us that prevention-centric strategies will fail and should be paired with detective controls to minimize time to detection and remediation. Make certain you have a well-tuned SIEM/SOAPA/SOAR infrastructure as part of your security architecture and that that is receiving logs that cover the internal network and applications as well as through the perimeter. This includes tuning of endpoint, application, and network device logs to enable an early detection and response capability in the environment. Multi-factor / Multi-step Authentication The majority of breaches involve the use of cracked, intercepted or otherwise disclosed authentication credentials at some point. Use strong, multi-factor authentication methods by default wherever possible. Combined with the ability to detect and alert on failed login attempts, this practice can provide clues to users that may be the focus of targeted attacks. III. MASTER OPERATION
  • 3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-117 www.viva-technology.org/New/IJRI In order to prevent this unauthorized intrusion into your systems/networks , you must follow some basic security guidelines: DOWNLOAD SOFTWARE FROM AUTHORIZED WEBSITES If you are planning to download a music file, video or a utility software do so from a trusted website. Many websites offer a free download of certain high-value software, but those may carry the virus or a spyware released by a hacker to obtain your PC information. DO NOT CLICK ON RANDOM EMAIL ATTACHMENTS Email is one of the biggest tools through which hackers spread malware. The spyware or virus are hidden in attachments and links clicking on which the infection begins. Hence, never click on random attachments if those are not from any trusted source. SCAN ALL TYPES OF HARD DRIVES BEFORE RUNNING Hard drives such as pen drives, external hard disk or mobile devices should be scanned by a USB scanner to remove any kind of malware. ABSTAIN FROM KEEPING EASY PASSWORDS Do not keep easy passwords such as- your name followed by1234, your pet name or name & date of birth etc. These information can be easily guessed or can be fetched from social media sites, so follow best password management practices. You should keep an alpha-numeric password for your accounts including a combination of special characters. NEVER STORE OR SHARE YOUR LOGIN INFORMATION Keeping your user id, password on your PC increases the risk of becoming a victim of hackers. Always try to memorize your login information. It is also important to abstain from sharing your password via email. Importance of an Anti-hacking Software Anti-hacking software is also known as a computer antivirus software, which is a must have for every PC. Anti-hacking software protects a PC from these cyber attacks by detecting and removing the virus, spyware, and other malware intrusions. The antivirus software must be kept updated with the latest virus signature so that any types of new threats can be detected. REVE Antivirus software is ideal for internet users as it protects your computer's data from hackers. IV. FAULT TOLERANCE AND DIAGNOSIS FAULT TOLERANCE Fault tolerance is a technique that has proven to be efficient to implement computing systems able to provide a correct service despite accidental phenomena such as environmental perturbations (external faults), failures of hardware components (internal physical faults), or even design faults such as software bugs. Faults are causes of errors, errors are abnormal parts of the computing system state, and failures happen when errors propagate through the system-to-user interface, i.e., when the service provided by the system is incorrect. When faults are accidental and sufficiently rare, they can be tolerated. To do so, errors must be detected before they lead to failure, and then corrected or recovered: this is the role of error handling. It is also necessary to diagnose the underlying faults (i.e., to identify and locate the faulty components), so as to be able to isolate them, and then replace or repair them, and finally to re-establish the system in its nominal configuration: fault diagnosis, isolation, repair and reconfiguration together constitute fault handling. There are various techniques for detecting errors. For simplicity, we categorize these as being either property-checks or comparison-checks. Property-checks consist in observing the system state, in particular certain values or events, and verifying they satisfy certain properties or rules. This usually imposes only a small hardware or software overhead (redundancy). Among hardware property-checks, let us note that most microprocessors detect non-existing or unauthorized instructions and commands, non-existing addresses and unauthorized access modes, and that watchdogs can detect excessive execution durations. Software-based property-checks include likelihood tests inserted into programs to check the values of certain variables, or the instants or sequences of certain events (defensive programming). Error detecting codes and run-time model checking can also be viewed as property-checks. Comparison- checks consist in comparing several executions, carried out either sequentially on the same hardware, or on different hardware units. This requires more redundancy than the first class of error detection techniques, but it also assumes that a single fault would not produce the same effect (i.e., identical errors) on the different executions. If only internal physical faults are considered, the same computation can be run on identical
  • 4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-118 www.viva-technology.org/New/IJRI hardware units, since it is very unlikely that each hardware unit would suffer an identical internal fault at the same execution instant to produce the same error. On the contrary, design faults would produce the same errors if the same process is run on identical hardware units, and thus the comparison of the executions would not detect discrepancies. In that case, it is necessary to diversify the underlying execution support, so that a single design fault would affect only one execution, or at least would affect differently the different executions. To be able to do that, it is necessary to have created and saved copies of the system state, known as recovery points or checkpoints. Another error correction technique is called forward recovery, which consists of replacing the erroneous system state by a new, healthy state, and then continuing execution. This is possible, for example, in certain real-time control systems in which the system can be re-initialized and input data reread from sensors before continuing execution. Finally, a third technique consists in “masking” errors; This is possible when there is enough redundant state information for a correct state to be built from the erroneous state, e.g., by a majority vote on three (or more) executions. In most cases, the efficacy of fault tolerance techniques relies on the fact that faults are rare phenomena that occur at random points in time. It is thus possible, for example in a triple modular redundant architecture, to suppose that is unlikely for a second unit to fail while a failed unit is being repaired. An attacker that succeeds in penetrating one system can pursue his attack on that system, and also simultaneously attack other similar systems. Diagnostic Tools It should be noted that most currently available intrusion detection systems do not include any intrusion diagnosis mechanisms. The explicit recognition of the fact that misuses and anomalies are indeed errors that can be caused by any sort of fault. Indeed, a good intrusion detection system requires such a fault diagnosis mechanism to minimize the rate of false alarms caused by errors due to other classes of faults. V. MEASUREMENTS 1. Use a firewall. Windows and macOS have built-in firewalls – software designed to create a barrier between your information and the outside world. Firewalls prevent unauthorized access to your business network and alert you to any intrusion attempts.Make sure the firewall is enabled before you go online. You can also purchase a hardware firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has a built-in firewall that protects your network. If you have a larger business, you can purchase an additional business networking firewall. 2. Install antivirus software. Computer viruses and malware are everywhere. Antivirus programs such as Bitdefender, Panda Free Antivirus, Malwarebytes and Avast protect your computer against unauthorized code or software that may threaten your operating system. Viruses may have easy-to-spot effects – for example, they might slow your computer or delete key files – or they may be less conspicuous.Antivirus software plays a major role in protecting your system by detecting real-time threats to ensure your data is safe. Some advanced antivirus programs provide automatic updates, further protecting your machine from the new viruses that emerge every day. After you install an antivirus program, don't forget to use it. Run or schedule regular virus scans to keep your computer virus-free. 3. Install an anti-spyware package. Spyware is a special kind of software that secretly monitors and collects personal or organizational information. It is designed to be hard to detect and difficult to remove and tends to deliver unwanted ads or search results that are intended to direct you to certain (often malicious) websites.Some spyware records every keystroke to gain access to passwords and other financial information. Anti-spyware concentrates exclusively on this threat, but it is often included in major antivirus packages, like those from Webroot, McAfee and Norton. Anti-spyware packages provide real-time protection by scanning all incoming information and blocking threats.
  • 5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-119 www.viva-technology.org/New/IJRI 4. Use complex passwords. Using secure passwords is the most important way to prevent network intrusions. The more secure your passwords are, the harder it is for a hacker to invade your system. More secure often means longer and more complex. Use a password that has at least eight characters and a combination of numbers, uppercase and lowercase letters, and computer symbols. Hackers have an arsenal of tools to break short, easy passwords in minutes. Don't use recognizable words or combinations that represent birthdays or other information that can be connected to you. Don't reuse passwords, either. If you have too many passwords to remember, consider using a password manager, such as Dashlane, Sticky Password, LastPass or Password Boss. 5. Keep your OS, apps and browser up-to-date. Always install new updates to your operating systems. Most updates include security fixes that prevent hackers from accessing and exploiting your data. The same goes for apps. Today's web browsers are increasingly sophisticated, especially in privacy and security. Be sure to review your browser security settings in addition to installing all new updates. For example, you can use your browser to prevent websites from tracking your movements, which increases your online privacy. Or, use one of these private web browsers. 6. Ignore spam. Beware of email messages from unknown parties, and never click on links or open attachments that accompany them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become common, so keep your eyes open for anything that looks or sounds suspicious. 7. Back up your computer. If your business is not already backing up your hard drive, you should begin doing so immediately. Backing up your information is critical in case hackers do succeed in getting through and trashing your system.Always be sure you can rebuild as quickly as possible after suffering any data breach or loss. Backup utilities built into macOS (Time Machine) and Windows (File History) are good places to start. An external backup hard drive can also provide enough space for these utilities to operate properly. 8. Shut it down. Many businesses, especially those operating a web server, are "all systems go" all the time. If you're not operating a complex internet-based company, however, switch off your machine overnight or during long stretches when you're not working. Always being on makes your computer a more visible and available target for hackers; shutting down breaks the connection a hacker may have established with your network and disrupts any possible mischief. 9. Use virtualization. Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded with spyware and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites, virtualization allows you to run your browser in a virtual environment, like Parallels or VMware Fusion, that sidesteps your operating system to keep it safer. 10. Secure your network. Routers don't usually come with the highest security settings enabled. When setting up your network, log in to the router, and set a password using a secure, encrypted setup. This prevents intruders from infiltrating your network and messing with your settings.
  • 6. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-120 www.viva-technology.org/New/IJRI 11. Use two-factor authentication. Passwords are the first line of defense against computer hackers, but a second layer boosts protection. Many sites let you enable two-factor authentication, which boosts security because it requires you to type in a numerical code – sent to your phone or email address – in addition to your password when logging in. 12. Use encryption. Even if cybercriminals gain access to your network and files, encryption can prevent them from accessing any of that information. You can encrypt your Windows or macOS hard drive with BitLocker (Windows) or FileVault (Mac), encrypt any USB flash drive that contains sensitive information and use a VPN to encrypt web traffic. Only shop at encrypted websites; you can spot them immediately by the "https" in the address bar, accompanied by a closed-padlock icon. VI. CONCLUSIONS Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time. Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Cybercrime is committing a crime with the aid of computers and information technology infrastructure. Ethical Hacking is about improving the security of computer systems and/or computer networks. Ethical Hacking is legal. Today hackers are spread across the world in large quantities. Many government and private agencies are working to detect these hackers, but we also have some duty to protect ourselves and our private data from online frauds. Apart from this, people who are illiterate should be given information about debit cards, credit cards, the internet, and computer. We know it is a bit difficult to catch these hackers because they sit in one country and hack the computer from another country, so the best way to avoid these things is that we have to be careful and alert and all IDs and Passwords on the Internet should always be unique and strong. Finally, I would like to say that if you use the internet properly and use the secure websites, then it will be difficult for hackers to hack your data. VII. ACKNOWLEDGEMENTS I thank my college for giving us the opportunity to make this project a success. I offer my special thanks and sincerity. I thank Professor Krutika vartak for encouraging me to complete this research paper, for guidance and assistance for all the problems I encountered while doing research. Without his guidance, I would not have completed my research paper. VIII. REFERENCES [1] Sanctum Inc, “Ethical Hacking techniques to audit and secure web enabled applications”, 2002. [2] B. Reto, “Ethical Hacking”, in GSEC Practical Assignment, Version 1.4b, Option 1, Nov 24, 2002. [3] Smith B., Yurcik W., Doss D., “Ethical Hacking: the security justification redux”, IEEE Transactions, pp. 375- 379, 2002. [4] J. Danish and A. N. Muhammad, “Is Ethical Hacking Ethical? “ , International journal of Engineering Science and Technology, Vol 3 No. 5, pp. 3758-3763, May 2011. [5] Ajinkya A. Farsole, Amurta G. Kashikar and Apurva Zunzunwala , “Ethical Hacking, International journal of Computer Applications (0975-8887), Vol. 1 No. 10, pp. 14-20, 2010. [6] H.M David, “Three Different Shades of Ethical Hacking: Black, White and Gray,” in GSEC Practical Assignment, Version 1.4b, Option 1, Feb 23, 2004. [7] Ajinkya A., Farsole Amruta G., Kashikar Apurva Zunzunwala"Ethical Hacking", in 2010 International Journal of Computer Applications (0975 – 8887) Volume 1 – No. 10
  • 7. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) F-121 www.viva-technology.org/New/IJRI [8] Marilyn Leathers “A Closer Look at Ethical Hacking and Hackers" in East Carolina University ICTN 6865. [9] Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo Lopes Filho, Jayme Tadeu Machado, A Security Framework to Protect Against Social Networks Services Threats, 2010 Fifth International Conference on Systems and Networks Communications.