SlideShare a Scribd company logo
C y b e r S e c u r
I t y
Our democracy has been Hacked
/mohmmadyahya/mohmmadyahya010101
MohammadYahya (Shameless Self Promotion)
• Youngest Security Researcher at ComExpo Cyber Security
• Bug Bounty Hunter
• Expert in Malware
• Ethical Hacker
• Android Developer
• PHP Web Developer
/mohmmadyahya/mohmmadyahya010101
Introduction
Computer security is information security as applied to computers and computer networks.
This field covers all the processes and mechanisms by which computer-based equipment,
information and services are protected from unintended or unauthorized access, change or
destruction. Computer security also includes protection from unplanned events and natural
disasters.
Always remember: Know hAckiNG, but no HaCKing.
/mohmmadyahya/mohmmadyahya010101
Who is hacker?
• In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge.
• Word hacker exist that are not related to computer security, such as referring
to someone with an advanced understanding of computers and computer
networks.
• They are rarely used in mainstream context. They are subject to the long
standing hacker definition controversy about the true meaning of the
term hacker. In this controversy, the term hacker is reclaimed by computer
programmers who argue that someone breaking into computers is better
called a cracker.
• not making a difference between computer criminals (Black Hat) and
computer security experts (White Hat).
• Some white hat hackers claim that they also deserve the title hacker, and that
only black hats should be called crackers.
Securing your applications—learn how break-ins occur
Major Attacks and their losses
56 million records stolen over all revenue loss $150 Million
85 million records stolen $45 million
56 million records stolen
5 million 145 million user
4.6 million
7.5 million user 10 million user data
BSNL - 30 million
TRAI, OLA, Control of defence, Narendra modi, Ravi Shankar Prasad
Cyber Crime Stats
• 1st rank United States
• 2nd rank United Kingdom
• 3rd India on because of online malicious activity and is on top the cyber war
between India-Pakistan
• India became the second most targeted country in the world for social media
scams in 2015.
• 107% CAGR of cyber crime in India with 5lakh cases.
• 90 % mobile apps are vul.
Lack of knowledge in cyber security
• 70 % of vulnerabilities exist at the application layer nor the network
• 30000 websites are hacked everyday to distribute malware
• 96 % of tested application have vul.
• 86 % of all website have at least 1 serious vul.
https://cybermap.kaspersky.com/
https://www.fireeye.com/cyber-map/threat-map.html
http://map.norsecorp.com/
• Banking Financial Services
and Insurance (BFSI)
• 94% of companies faced
cyber crime as a major threat
• 41 % companies have cyber
crime as a board agenda only
• 72 % companies faced cyber
attack over the past year
• 63 % respondents indicated
that cyber crime amounted to
financial loss while 55 % also
mention theft of sensitive
information
Protect Your Identity
1. Don’t talk to Unknown people on Internet .
2. Don't give your Information about yourself like:
I. Full name
II. Parents name
III. Date of birth
IV. Address
V. Phone number
VI. Don’t share photos
to anyone online that you don't trust or know.
Cyber Stalking, Cyber bullying, Cyber harassment
IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh
IT act 2008 Section 66D cheating by personation
Trusted Sources
1. Operating Systems - based on its security and vulnerability
update your operating system with security updates - use
Linux Ubuntu, remove unwanted programs .
2. Web browser- most malware will come through via your web
browser. Google Chrome is more secure and has a sandbox
feature, Don’t save password in web browser remove addons .
3. Downloading software- use a trusted source (Play Store, App
Store, softpedia, sourceforge) or your repository if you are
using Linux.
4. Read carefully-When you sign up for newsletters, install
programs, or agree to anything, read the fine print.
5. Use an anti-virus program, an anti-spyware program, and a
firewall. Surfing the internet without these things is unsafe and
invites spam, hackers, and viruses onto your computer.
6. Always check for secure transaction info.-Secure URLs begin
with https:// instead of http://. This means the transmission is
encrypted to and from the web server
Secure Communication
www.streak.com/securegmail
SIGAINT, Ruggedinbox, Mail2Tor, SAFe-mail
Signal, Surespot, Threema
Hotspot Shield
Tunnel Bear
VPN
T H A N K
Y O U

/mohmmadyahya/mohmmadyahya010101

More Related Content

What's hot

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
Om Prakash Mishra
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
ANKIT KUMAR
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
Hîmãlåy Làdhä
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
snowe123
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
ANKIT KUMAR
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
DominikaJoanna
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
denniskelly315
 
Online safety
Online safety Online safety
Online safety
MARCPELAYO1
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Hacking
HackingHacking
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
justin johnson
 
Cyber security
Cyber securityCyber security
Cyber security
Sajid Hasan
 

What's hot (20)

Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Hacking
HackingHacking
Hacking
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
 
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical HackingCyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
 
Online safety
Online safety Online safety
Online safety
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security

Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
Viral Parmar
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
Elsayed Muhammad
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
Muhammad Umar Farooq
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
Darshan Aswani
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
Daniel Agudo Garcia
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 

Similar to Cyber Security (20)

Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

Recently uploaded

CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 

Recently uploaded (20)

CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 

Cyber Security

  • 1. C y b e r S e c u r I t y Our democracy has been Hacked /mohmmadyahya/mohmmadyahya010101
  • 2. MohammadYahya (Shameless Self Promotion) • Youngest Security Researcher at ComExpo Cyber Security • Bug Bounty Hunter • Expert in Malware • Ethical Hacker • Android Developer • PHP Web Developer /mohmmadyahya/mohmmadyahya010101
  • 3. Introduction Computer security is information security as applied to computers and computer networks. This field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. Always remember: Know hAckiNG, but no HaCKing. /mohmmadyahya/mohmmadyahya010101
  • 4. Who is hacker? • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. • Word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks. • They are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker. • not making a difference between computer criminals (Black Hat) and computer security experts (White Hat). • Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
  • 6.
  • 7.
  • 8.
  • 9. Major Attacks and their losses 56 million records stolen over all revenue loss $150 Million 85 million records stolen $45 million 56 million records stolen 5 million 145 million user 4.6 million 7.5 million user 10 million user data BSNL - 30 million TRAI, OLA, Control of defence, Narendra modi, Ravi Shankar Prasad
  • 10. Cyber Crime Stats • 1st rank United States • 2nd rank United Kingdom • 3rd India on because of online malicious activity and is on top the cyber war between India-Pakistan • India became the second most targeted country in the world for social media scams in 2015. • 107% CAGR of cyber crime in India with 5lakh cases. • 90 % mobile apps are vul.
  • 11. Lack of knowledge in cyber security • 70 % of vulnerabilities exist at the application layer nor the network • 30000 websites are hacked everyday to distribute malware • 96 % of tested application have vul. • 86 % of all website have at least 1 serious vul. https://cybermap.kaspersky.com/ https://www.fireeye.com/cyber-map/threat-map.html http://map.norsecorp.com/
  • 12. • Banking Financial Services and Insurance (BFSI) • 94% of companies faced cyber crime as a major threat • 41 % companies have cyber crime as a board agenda only • 72 % companies faced cyber attack over the past year • 63 % respondents indicated that cyber crime amounted to financial loss while 55 % also mention theft of sensitive information
  • 13. Protect Your Identity 1. Don’t talk to Unknown people on Internet . 2. Don't give your Information about yourself like: I. Full name II. Parents name III. Date of birth IV. Address V. Phone number VI. Don’t share photos to anyone online that you don't trust or know. Cyber Stalking, Cyber bullying, Cyber harassment
  • 14.
  • 15.
  • 16. IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh IT act 2008 Section 66D cheating by personation
  • 17.
  • 18. Trusted Sources 1. Operating Systems - based on its security and vulnerability update your operating system with security updates - use Linux Ubuntu, remove unwanted programs . 2. Web browser- most malware will come through via your web browser. Google Chrome is more secure and has a sandbox feature, Don’t save password in web browser remove addons . 3. Downloading software- use a trusted source (Play Store, App Store, softpedia, sourceforge) or your repository if you are using Linux.
  • 19. 4. Read carefully-When you sign up for newsletters, install programs, or agree to anything, read the fine print. 5. Use an anti-virus program, an anti-spyware program, and a firewall. Surfing the internet without these things is unsafe and invites spam, hackers, and viruses onto your computer. 6. Always check for secure transaction info.-Secure URLs begin with https:// instead of http://. This means the transmission is encrypted to and from the web server
  • 20. Secure Communication www.streak.com/securegmail SIGAINT, Ruggedinbox, Mail2Tor, SAFe-mail Signal, Surespot, Threema
  • 22. T H A N K Y O U  /mohmmadyahya/mohmmadyahya010101