SlideShare a Scribd company logo
1 of 18
Cyber
Security
&
BY
D.V.MANOJ P.TARUN
15A31A05A7 & 15A31A05B4
II nd CSE-B II nd CSE-B
CONTENTS
 INTRODUCTION ABOUT CYBER SECURITY
 DESCRIPTION
 TYPES OF ATTACKS
 SECURITY/PREVENTIVE MEASURES
 ADVANTAGES
 DISADVANTAGES
 FACTS OF CYBER SECURITY & CYBER CRIMES
 CONCLUSION
INTRODUCTION
Cyber Security:
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from
attack, damage or unauthorized access.
Cyber Crimes:
Cyber-crimes are the criminal activities carried out by means of the
computers or networks.
DESCRIPTION
As we all know that cyber-crimes has been one of the
common practices made by the computer experts.
Cybercrimes are the activities made by the attackers for
destroying organization network, stealing others valuable
data, documents, hacking bank account and transferring
money to their own and so on.
MAN IN THE MIDDLE ATTACK
 IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND
CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE
ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.
 BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK
AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND
GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
D-DOS ATTACK
 IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)
 IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO
MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.
 ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING
TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A
WEBSITE OR AN ORGANIZATION OF COMPUTERS.
 ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A
HUGE
LOSS AND REPUTATION FOR THE COMPANY.
DOS ATTACK
 IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)
 IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL
TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
SQL INJECTON
 IT IS ABBREVATED AS THE SEQUEL INJECTION
 IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH
ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.
 IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING
THE SQL COMMANDS.
 ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN
MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING
UNEXPECTED SQL COMMANDS
XSS ATTACK
 IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK
 THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS
 THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED
 SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT
BOXES USING JAVA SCRIPT ON THE WEB APPS.
SOCIAL ENGINEERING
 SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR
GAINING THEIR TRUST TO EXPLOIT THEM.
 IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION.
SCARE WARE
 IN THIS THE HACKER TRICKS THE VICTIM THAT HIS
COMPUTER WAS AT RISK AND GIVES HIM A
SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE
INTO THE USER PC WITHOUT KNOWING TO HIM
PHISHING
 IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE
AND GAINS THE INFORMATION ABOUT HIM
PREVENTIVE/SECURE MEASURES
o Use antivirus software.
o Turn on the firewalls.
o Uninstall unnecessary software.
o Using the SSL certificates installed on the server.
o Using servers –SSH (secure method).
o Updating software updates.
o Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
 PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.
 PROTECTS AGAINST THE DATA FROM THEFT
 INCREASE IN CYBER DEFENSE
 INCREASES THE SECURITY
 WE CAN BROWSE THE SAFE WEBSITE
 INCREASE IN CYBER SPEED
 PROTECTS NETWORKS AND RESOURCES
DIS ADVANTAGES OF CYBER CRIMES
 MAKES THE SYSTEM SLOWER THAN BEFORE.
 FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.
 HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC
 HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
 ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
FACTS ABOUT CYBER SECURITY & CYBER CRIMES
 FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF
CYBER CRIMES
 INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %
 IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN
CRIMES.
 1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR
 80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER
AFTER THE DEMONATIZATION IN INDIA
CONCLUSION
CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF
THE COIN
CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY
ERADICATED BUT CAN BE PREVENTED USING THE CYBER
SECURITY
THANK YOU
Cyber Security & Cyber Crimes Guide by D.V.Manoj P.Tarun

More Related Content

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber security cyber security
cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security & Cyber Crimes Guide by D.V.Manoj P.Tarun

Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxMOHAMMEDASHIK71
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware OfAditya Prakhar Singh
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tipstcellsn
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 

Similar to Cyber Security & Cyber Crimes Guide by D.V.Manoj P.Tarun (20)

Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptx
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Malware | spyware removal
Malware | spyware removalMalware | spyware removal
Malware | spyware removal
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Cyber Security & Cyber Crimes Guide by D.V.Manoj P.Tarun

  • 1. Cyber Security & BY D.V.MANOJ P.TARUN 15A31A05A7 & 15A31A05B4 II nd CSE-B II nd CSE-B
  • 2. CONTENTS  INTRODUCTION ABOUT CYBER SECURITY  DESCRIPTION  TYPES OF ATTACKS  SECURITY/PREVENTIVE MEASURES  ADVANTAGES  DISADVANTAGES  FACTS OF CYBER SECURITY & CYBER CRIMES  CONCLUSION
  • 3. INTRODUCTION Cyber Security: Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber Crimes: Cyber-crimes are the criminal activities carried out by means of the computers or networks.
  • 4. DESCRIPTION As we all know that cyber-crimes has been one of the common practices made by the computer experts. Cybercrimes are the activities made by the attackers for destroying organization network, stealing others valuable data, documents, hacking bank account and transferring money to their own and so on.
  • 5. MAN IN THE MIDDLE ATTACK  IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.  BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
  • 6. D-DOS ATTACK  IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)  IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.  ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A WEBSITE OR AN ORGANIZATION OF COMPUTERS.  ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A HUGE LOSS AND REPUTATION FOR THE COMPANY.
  • 7. DOS ATTACK  IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)  IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
  • 8. SQL INJECTON  IT IS ABBREVATED AS THE SEQUEL INJECTION  IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.  IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING THE SQL COMMANDS.  ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING UNEXPECTED SQL COMMANDS
  • 9. XSS ATTACK  IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK  THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS  THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED  SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT BOXES USING JAVA SCRIPT ON THE WEB APPS.
  • 10. SOCIAL ENGINEERING  SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR GAINING THEIR TRUST TO EXPLOIT THEM.  IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION. SCARE WARE  IN THIS THE HACKER TRICKS THE VICTIM THAT HIS COMPUTER WAS AT RISK AND GIVES HIM A SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE INTO THE USER PC WITHOUT KNOWING TO HIM
  • 11. PHISHING  IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE AND GAINS THE INFORMATION ABOUT HIM
  • 12. PREVENTIVE/SECURE MEASURES o Use antivirus software. o Turn on the firewalls. o Uninstall unnecessary software. o Using the SSL certificates installed on the server. o Using servers –SSH (secure method). o Updating software updates. o Avoid spyware/malware.
  • 13. ADVANTAGES OF CYBER SECURITY  PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.  PROTECTS AGAINST THE DATA FROM THEFT  INCREASE IN CYBER DEFENSE  INCREASES THE SECURITY  WE CAN BROWSE THE SAFE WEBSITE  INCREASE IN CYBER SPEED  PROTECTS NETWORKS AND RESOURCES
  • 14. DIS ADVANTAGES OF CYBER CRIMES  MAKES THE SYSTEM SLOWER THAN BEFORE.  FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.  HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC  HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE  ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
  • 15. FACTS ABOUT CYBER SECURITY & CYBER CRIMES  FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF CYBER CRIMES  INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %  IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN CRIMES.  1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR  80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER AFTER THE DEMONATIZATION IN INDIA
  • 16. CONCLUSION CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF THE COIN CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY ERADICATED BUT CAN BE PREVENTED USING THE CYBER SECURITY