SlideShare a Scribd company logo
1 of 28
CONTENTS
•Introduction
•Topics that matter
•Hacker vs Cracker
•Firewall
• Shell
• Case Study
• Inferences
 The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
 There’re two sides to a coin. Internet also has it’s own
disadvantages that is Cyber crime- Illegal activity
committed on the internet .
INTRODUCTION
Topics that matter…
Cyber
Security
Internet Security
focusing
Firewall
Secure SHell Case Studies
Hacker vs Cracker
The general view is that, while hackers build things,
crackers break things.
 Cracker is the name given to hackers who break into
computers for criminal gain; whereas, hackers can also be
internet security experts hired to find
vulnerabilities in systems .
Types Of Hackers
A Black hat hacker is an individual with extensive
computer knowledge whose purpose is to breach
or bypass internet security.
Gray hat hackers refers to a computer hacker or
computer security expert whose ethical
standards fall somewhere between purely
altruistic and purely malicious.
White hat hacker refers to ethical
computer hacker who specializes in penetration testing
and in other testing methodologies to ensure the
security of an organization's information systems.
ANONYMOUS GROUP
Anonymous is a international network of activist and hacktivist entities. The
group became known for a series of well-publicized publicity stunts and
distributed denial-of-service (DDoS) attacks on government, religious, and
corporate website .
 Firewall is a network security system that monitors
and controls the incoming and outgoing network traffic
based on predetermined security rules.
 A firewall typically establishes a barrier between a
trusted, secure internal network and another outside
network, such as the Internet, that is assumed not to
be secure or trusted.
 Hardware Firewalls
 Protect an entire network
 Implemented on the router level
 Usually more expensive, harder to configure
 Software Firewalls
 Protect a single computer
 Usually less expensive, easier to configure
FIREWALL ARCHITECTURES
The configuration that works best for a particular organization
depends on three factors:
 The objectives of the network
 the organization‘s ability to develop and implement the
architectures
 the budget available for the function
Packet filtering
routers
Screened
subnet firewalls.Dual-homed
firewalls
Screened host
firewalls
Bastion Host
A bastion host is a special purpose computer on a
network specifically designed and configured to
withstand attacks.
Generally , placed outside the firewall
For example a proxy server, and all other services
are removed or limited to reduce the threat to the
computer.
 Architecture with high complexity
 In this architectural approach , the bastion host contains two NICs
(Network Interface Cards)
 One NIC is connected to the external network, and one is connected to
the internal network, providing an additional layer of protection.
 Implementation of this architecture often makes use of NATs.
WHAT IS NAT ?
 Function as network-level proxy
 Convert IP addresses of internal hosts to IP address
assigned by firewall
 Taking advantage of this , NAT prevents external
attacks from reaching internal machines with
addresses in specified ranges.
 Hide TCP/IP information of hosts in the network being
protected, preventing hackers from getting address of
actual host
ADVANTAGES OF DUAL – HOMED ARCHITECTURE
High protection as compared to Packet Filtering and
Screened host architecture.
Overall Strong protection at low expense
LIMITATIONS OF DUAL – HOMED ARCHITECTURE
It can disable the connection to the external network, and as
traffic volume increases, it can become over- loaded.
Secure
SHell
Ecrypted command-line
communication
• The standard TCP port 22 has been assigned for contacting
SSH servers.
• An SSH tunnel can provide a secure path over the Internet,
through a firewall to a virtual machine.
«Secure Shell (SSH) is a cryptographic network
protocol for secure data communication, remote
shell services or command execution and other
secure network services between two networked
computers that connects, via a secure
channel over an insecure network, a server and
a client
Definition
Client-> Computer programs that can make requests to servers and fetch
responses are called clients
Server->A web server can listen to requests and respond back with data on
the same connection
Structure
SSH-Usage
• SecureSHell handles the set up and generation of an
encrypted TCP connection
• SSH can handle secure remote logins (ssh)
• SSH can handle secure file copy (scp)
. SSH can even drive secure FTP (sftp)
Architecture
SSH Authentication Methods
$ Password
$ Host-based authentication
I Password Authentication
Password Authentication
• The user specifies the username
and corresponding password.
Prompts for Password
you
server
ssh
sshd
you> ssh
mac-1
password: ****
other>
• Doesn’t require user credentials
(password or key)
• Provides trust based on hostname and
user id
• User id on both system has to be the
same
• Disabled by default -- not that useful
II Host-based Authentication
CYBER AWARENESS
Premise one: Cyber security should be viewed and managed as a strategic
activity that impacts the enterprise’s most valued assets.
Premise two: Designs and plans for cyber security should be data driven to
move from reactive to predictive responses. Shared intelligence among
countries and organizations is critical.
Findings from a recent survey conducted by IBM indicated that organizations
most able to handle or avoid security breaches had some unique
characteristics:
1. Security leaders had a strategic voice in the enterprise;
2. Cyber security was not viewed as an IT issue but as an enterprise wide
responsibility
3. Security budgets were managed at a senior level;
4. Security was considered early in the design of new products and
services; o Measurement and accountability were part of the security
design;
5. A culture of proactively protecting the enterprise existed.
Putty
Putty is a SSH client ,open source software used to connect client to
a sever.
.Control over the SSH encryption key
and protocol version.
. Unicode support.
. Support for local serial port
connections.
features
QUESTION - TIME
THANK – YOU
CREDITS
AMAN JAIN
GAURAV SACHDEVA

More Related Content

What's hot

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Twobackdoor
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1abdifatah said
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 

What's hot (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
06. security concept
06. security concept06. security concept
06. security concept
 
Basic security concepts_chapter_1
Basic security concepts_chapter_1Basic security concepts_chapter_1
Basic security concepts_chapter_1
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Network Security
Network SecurityNetwork Security
Network Security
 

Viewers also liked

Eamon Healy Presentation
Eamon Healy PresentationEamon Healy Presentation
Eamon Healy PresentationEamon Healy
 
Utilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeUtilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeFernando Diaz
 
Harbor nitrogen losses
Harbor nitrogen lossesHarbor nitrogen losses
Harbor nitrogen lossesFernando Diaz
 
Holsteins mobilize more energy
Holsteins mobilize more energyHolsteins mobilize more energy
Holsteins mobilize more energyFernando Diaz
 
Estrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorEstrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorFernando Diaz
 
Are jerseys really more efficient
Are jerseys really more efficientAre jerseys really more efficient
Are jerseys really more efficientFernando Diaz
 
Feeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFeeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFernando Diaz
 
Zero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesZero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesSooraj Garg
 

Viewers also liked (12)

Eamon Healy Presentation
Eamon Healy PresentationEamon Healy Presentation
Eamon Healy Presentation
 
Christ came as man. Lesson 1
Christ came as man. Lesson 1Christ came as man. Lesson 1
Christ came as man. Lesson 1
 
Utilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forrajeUtilización de maíz dañado por sequía como forraje
Utilización de maíz dañado por sequía como forraje
 
Resume_shaheen
Resume_shaheenResume_shaheen
Resume_shaheen
 
Harbor nitrogen losses
Harbor nitrogen lossesHarbor nitrogen losses
Harbor nitrogen losses
 
BTU Cloud
BTU CloudBTU Cloud
BTU Cloud
 
Holsteins mobilize more energy
Holsteins mobilize more energyHolsteins mobilize more energy
Holsteins mobilize more energy
 
Estrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calorEstrategias para mejorar la ingestión durante periodos de estrés por calor
Estrategias para mejorar la ingestión durante periodos de estrés por calor
 
Are jerseys really more efficient
Are jerseys really more efficientAre jerseys really more efficient
Are jerseys really more efficient
 
1EM #32 Conjuntivo: ossos
1EM #32 Conjuntivo: ossos1EM #32 Conjuntivo: ossos
1EM #32 Conjuntivo: ossos
 
Feeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herdsFeeding for low weigh backs in high-producing herds
Feeding for low weigh backs in high-producing herds
 
Zero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industriesZero Liquid Discharge For Pulp and paper industries
Zero Liquid Discharge For Pulp and paper industries
 

Similar to Cyber secure

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking reportAkhilesh Patel
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopMichele Chubirka
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Michele Chubirka
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 

Similar to Cyber secure (20)

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Network security
Network securityNetwork security
Network security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
ethical hacking report
 ethical hacking report ethical hacking report
ethical hacking report
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
Network security
Network securityNetwork security
Network security
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Cyber secure

  • 1.
  • 2. CONTENTS •Introduction •Topics that matter •Hacker vs Cracker •Firewall • Shell • Case Study • Inferences
  • 3.  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education.  There’re two sides to a coin. Internet also has it’s own disadvantages that is Cyber crime- Illegal activity committed on the internet . INTRODUCTION
  • 4. Topics that matter… Cyber Security Internet Security focusing Firewall Secure SHell Case Studies
  • 5. Hacker vs Cracker The general view is that, while hackers build things, crackers break things.  Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems .
  • 6. Types Of Hackers A Black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Gray hat hackers refers to a computer hacker or computer security expert whose ethical standards fall somewhere between purely altruistic and purely malicious.
  • 7. White hat hacker refers to ethical computer hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. ANONYMOUS GROUP Anonymous is a international network of activist and hacktivist entities. The group became known for a series of well-publicized publicity stunts and distributed denial-of-service (DDoS) attacks on government, religious, and corporate website .
  • 8.  Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.  A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.
  • 9.  Hardware Firewalls  Protect an entire network  Implemented on the router level  Usually more expensive, harder to configure  Software Firewalls  Protect a single computer  Usually less expensive, easier to configure
  • 10. FIREWALL ARCHITECTURES The configuration that works best for a particular organization depends on three factors:  The objectives of the network  the organization‘s ability to develop and implement the architectures  the budget available for the function Packet filtering routers Screened subnet firewalls.Dual-homed firewalls Screened host firewalls
  • 11. Bastion Host A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. Generally , placed outside the firewall For example a proxy server, and all other services are removed or limited to reduce the threat to the computer.
  • 12.  Architecture with high complexity  In this architectural approach , the bastion host contains two NICs (Network Interface Cards)  One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection.  Implementation of this architecture often makes use of NATs.
  • 13. WHAT IS NAT ?  Function as network-level proxy  Convert IP addresses of internal hosts to IP address assigned by firewall
  • 14.  Taking advantage of this , NAT prevents external attacks from reaching internal machines with addresses in specified ranges.  Hide TCP/IP information of hosts in the network being protected, preventing hackers from getting address of actual host
  • 15.
  • 16. ADVANTAGES OF DUAL – HOMED ARCHITECTURE High protection as compared to Packet Filtering and Screened host architecture. Overall Strong protection at low expense LIMITATIONS OF DUAL – HOMED ARCHITECTURE It can disable the connection to the external network, and as traffic volume increases, it can become over- loaded.
  • 18. • The standard TCP port 22 has been assigned for contacting SSH servers. • An SSH tunnel can provide a secure path over the Internet, through a firewall to a virtual machine. «Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client Definition
  • 19. Client-> Computer programs that can make requests to servers and fetch responses are called clients Server->A web server can listen to requests and respond back with data on the same connection Structure
  • 20. SSH-Usage • SecureSHell handles the set up and generation of an encrypted TCP connection • SSH can handle secure remote logins (ssh) • SSH can handle secure file copy (scp) . SSH can even drive secure FTP (sftp)
  • 22. SSH Authentication Methods $ Password $ Host-based authentication
  • 23. I Password Authentication Password Authentication • The user specifies the username and corresponding password. Prompts for Password you server ssh sshd you> ssh mac-1 password: **** other>
  • 24. • Doesn’t require user credentials (password or key) • Provides trust based on hostname and user id • User id on both system has to be the same • Disabled by default -- not that useful II Host-based Authentication
  • 25. CYBER AWARENESS Premise one: Cyber security should be viewed and managed as a strategic activity that impacts the enterprise’s most valued assets. Premise two: Designs and plans for cyber security should be data driven to move from reactive to predictive responses. Shared intelligence among countries and organizations is critical. Findings from a recent survey conducted by IBM indicated that organizations most able to handle or avoid security breaches had some unique characteristics: 1. Security leaders had a strategic voice in the enterprise; 2. Cyber security was not viewed as an IT issue but as an enterprise wide responsibility 3. Security budgets were managed at a senior level; 4. Security was considered early in the design of new products and services; o Measurement and accountability were part of the security design; 5. A culture of proactively protecting the enterprise existed.
  • 26. Putty Putty is a SSH client ,open source software used to connect client to a sever. .Control over the SSH encryption key and protocol version. . Unicode support. . Support for local serial port connections. features
  • 28. THANK – YOU CREDITS AMAN JAIN GAURAV SACHDEVA

Editor's Notes

  1. -According to «IT-dictionary», Secure Shell is an alternative protocol to TelNET and Rlogin which connects to UNIX servers. -SSH was created in 1995 by Finland University Researcher and it was initially open source, as far as it went closed source in 1999
  2. -Normally a data is transmitted between client and server but not in a secure line, like internet. -To transmit data in a secure line, we use SecureSHell
  3. -This protocol handles TCP-servise one more time, to terminate a secure session utilizing secure encryption.
  4. -There are three available authentication methods -These for Automatic and secure authentication of both ends connection. Both the server and the client are authenticated to prevent identiy spoofing. For example: Trojan horses.
  5. -This is the difference between authentication without without key and with key -a ready-command «ssh» requests a connection to server
  6. After going through the research paper by Georgia Tech Research Institute, the following premises could be highlighted: