Cyber
Security
&
BY
D.V.MANOJ P.TARUN
15A31A05A7 & 15A31A05B4
II nd CSE-B II nd CSE-B
CONTENTS
 INTRODUCTION ABOUT CYBER SECURITY
 DESCRIPTION
 TYPES OF ATTACKS
 SECURITY/PREVENTIVE MEASURES
 ADVANTAGES
 DISADVANTAGES
 FACTS OF CYBER SECURITY & CYBER CRIMES
 CONCLUSION
INTRODUCTION
Cyber Security:
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from
attack, damage or unauthorized access.
Cyber Crimes:
Cyber-crimes are the criminal activities carried out by means of the
computers or networks.
DESCRIPTION
As we all know that cyber-crimes has been one of the
common practices made by the computer experts.
Cybercrimes are the activities made by the attackers for
destroying organization network, stealing others valuable
data, documents, hacking bank account and transferring
money to their own and so on.
MAN IN THE MIDDLE ATTACK
 IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND
CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE
ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.
 BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK
AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND
GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
D-DOS ATTACK
 IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)
 IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO
MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.
 ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING
TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A
WEBSITE OR AN ORGANIZATION OF COMPUTERS.
 ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A
HUGE
LOSS AND REPUTATION FOR THE COMPANY.
DOS ATTACK
 IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)
 IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL
TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
SQL INJECTON
 IT IS ABBREVATED AS THE SEQUEL INJECTION
 IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH
ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.
 IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING
THE SQL COMMANDS.
 ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN
MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING
UNEXPECTED SQL COMMANDS
XSS ATTACK
 IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK
 THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS
 THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED
 SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT
BOXES USING JAVA SCRIPT ON THE WEB APPS.
SOCIAL ENGINEERING
 SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR
GAINING THEIR TRUST TO EXPLOIT THEM.
 IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION.
SCARE WARE
 IN THIS THE HACKER TRICKS THE VICTIM THAT HIS
COMPUTER WAS AT RISK AND GIVES HIM A
SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE
INTO THE USER PC WITHOUT KNOWING TO HIM
PHISHING
 IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE
AND GAINS THE INFORMATION ABOUT HIM
PREVENTIVE/SECURE MEASURES
o Use antivirus software.
o Turn on the firewalls.
o Uninstall unnecessary software.
o Using the SSL certificates installed on the server.
o Using servers –SSH (secure method).
o Updating software updates.
o Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
 PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.
 PROTECTS AGAINST THE DATA FROM THEFT
 INCREASE IN CYBER DEFENSE
 INCREASES THE SECURITY
 WE CAN BROWSE THE SAFE WEBSITE
 INCREASE IN CYBER SPEED
 PROTECTS NETWORKS AND RESOURCES
DIS ADVANTAGES OF CYBER CRIMES
 MAKES THE SYSTEM SLOWER THAN BEFORE.
 FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.
 HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC
 HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
 ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
FACTS ABOUT CYBER SECURITY & CYBER CRIMES
 FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF
CYBER CRIMES
 INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %
 IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN
CRIMES.
 1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR
 80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER
AFTER THE DEMONATIZATION IN INDIA
CONCLUSION
CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF
THE COIN
CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY
ERADICATED BUT CAN BE PREVENTED USING THE CYBER
SECURITY
THANK YOU
Cyber security

Cyber security

  • 1.
    Cyber Security & BY D.V.MANOJ P.TARUN 15A31A05A7 &15A31A05B4 II nd CSE-B II nd CSE-B
  • 2.
    CONTENTS  INTRODUCTION ABOUTCYBER SECURITY  DESCRIPTION  TYPES OF ATTACKS  SECURITY/PREVENTIVE MEASURES  ADVANTAGES  DISADVANTAGES  FACTS OF CYBER SECURITY & CYBER CRIMES  CONCLUSION
  • 3.
    INTRODUCTION Cyber Security: Cyber securityis the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber Crimes: Cyber-crimes are the criminal activities carried out by means of the computers or networks.
  • 4.
    DESCRIPTION As we allknow that cyber-crimes has been one of the common practices made by the computer experts. Cybercrimes are the activities made by the attackers for destroying organization network, stealing others valuable data, documents, hacking bank account and transferring money to their own and so on.
  • 5.
    MAN IN THEMIDDLE ATTACK  IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.  BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
  • 6.
    D-DOS ATTACK  ITIS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)  IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.  ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A WEBSITE OR AN ORGANIZATION OF COMPUTERS.  ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A HUGE LOSS AND REPUTATION FOR THE COMPANY.
  • 7.
    DOS ATTACK  ITIS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)  IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
  • 8.
    SQL INJECTON  ITIS ABBREVATED AS THE SEQUEL INJECTION  IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.  IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING THE SQL COMMANDS.  ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING UNEXPECTED SQL COMMANDS
  • 9.
    XSS ATTACK  ITIS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK  THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS  THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED  SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT BOXES USING JAVA SCRIPT ON THE WEB APPS.
  • 10.
    SOCIAL ENGINEERING  SOCIALENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR GAINING THEIR TRUST TO EXPLOIT THEM.  IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION. SCARE WARE  IN THIS THE HACKER TRICKS THE VICTIM THAT HIS COMPUTER WAS AT RISK AND GIVES HIM A SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE INTO THE USER PC WITHOUT KNOWING TO HIM
  • 11.
    PHISHING  IN THISTHE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE AND GAINS THE INFORMATION ABOUT HIM
  • 12.
    PREVENTIVE/SECURE MEASURES o Useantivirus software. o Turn on the firewalls. o Uninstall unnecessary software. o Using the SSL certificates installed on the server. o Using servers –SSH (secure method). o Updating software updates. o Avoid spyware/malware.
  • 13.
    ADVANTAGES OF CYBERSECURITY  PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.  PROTECTS AGAINST THE DATA FROM THEFT  INCREASE IN CYBER DEFENSE  INCREASES THE SECURITY  WE CAN BROWSE THE SAFE WEBSITE  INCREASE IN CYBER SPEED  PROTECTS NETWORKS AND RESOURCES
  • 14.
    DIS ADVANTAGES OFCYBER CRIMES  MAKES THE SYSTEM SLOWER THAN BEFORE.  FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.  HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC  HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE  ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
  • 15.
    FACTS ABOUT CYBERSECURITY & CYBER CRIMES  FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF CYBER CRIMES  INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %  IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN CRIMES.  1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR  80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER AFTER THE DEMONATIZATION IN INDIA
  • 16.
    CONCLUSION CYBER SECURITY ANDCYBER CRIMES ARE TWO SIDES OF THE COIN CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY ERADICATED BUT CAN BE PREVENTED USING THE CYBER SECURITY
  • 17.