SlideShare a Scribd company logo
Cyber Security and
Privacy
Contents
 Introduction
 Hacking
 Information Gathering Techniques
 Website Information Gathering Techniques
 Personal Information Gathering and Email Hacking
 Social Engineering
 Internet Banking Hacking
 Virus
 Prevention – Email Hacking
 Prevention – Social Engineering
 Prevention – Internet Banking Threats
 Conclusion
Internet = "network of networks"
 Consists of millions of private and public, academic, business, and
government Networks of local to global scope that are linked by
various technologies
 Carries all kind of information resources and services, such as
electronic mail, online chat, file transfer and file sharing, online
gaming and the inter-linked hypertext documents and other resources
of the World Wide Web.
Hacking
 Black Hat Hackers
A "black hat" hacker is a hacker who "violates computer security for little reason
beyond maliciousness or for personal gain"
 White Hat Hackers
The term "white hat" in Internet slang refers to an Ethical Hacker.
 Grey Hat Hackers
A grey hat hacker is a combination of a black hat and a white hat hacker
Information Gathering Techniques
 Website Information Gathering Techniques
 Email Hacking
 Social Engineering
 Internet Banking Threats
Website Information Gathering Techniques
 Footprinting
 Whois
 Web Archive – The Wayback Machine
 Search Engine
Virus
 Computer Virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes.
These programs can be created manual coding or using various Tools
 Worm is a program or algorithm that replicates itself over a computer
network and usually perform malicious action such as using
computer’s/network’s resources.
 Trojan Horse is a program that seems to be doing one thing but is actually
doing another. It can be used to set up a back door in a computer system,
enabling the intruder to gain access later. (The name refers to the horse from
the Trojan War).
 Web Scripts is a program executed from client/server side while accessing a
multimedia website.
Personal Information Gathering and
Email Hacking
 Spamming is the use of electronic messaging systems to send unsolicited
messages (spam), especially advertising, as well as sending messages
repeatedly on the same site
 Keylogger also known as a keystroke logger or system monitor. it can be a
program or a hardware installed in the system, which log each key strokes
and map it to a text file and send it to the creator or share it to a location.
 Phishing is the attempt to acquire sensitive information such as usernames,
passwords, and credit card details (and sometimes, indirectly, money) by
pretending as a trustworthy entity in an electronic communication.
It is one of the biggest Cyber Crime.
 Secret Questions is a security measure used to verify whether the user is the
authored owner.
Social Engineering- The Art of Human
Hacking
 Social Engineering is a non-technical method of intrusion hackers use that
relies heavily on human interaction and often involves tricking people into
breaking normal security procedures.
 It is one of the greatest threats that organizations today encounter.
 Phishing
 Baiting
 Pretexting
 Quid Pro Quo
Prevention –Email Hacking
 Use osk instead of our physical keyboard.
 Create a dedicated free mail address to use in the Risky sites.
 Never use your Personal Email password while registering in known/unknown
web portals.
 Never Reply to spams.
 Use Bcc: and remove addresses when forwarding mails.
 Use “[at]” instead of @. eg: myemail[at]gmail.com.
 Don’t make mailto: links when building websites.
 Don’t create an Easy to guess email address and password.
Prevention – Social Engineering
 Be Suspicious of unsolicited phone calls, visits, or email messages from
individuals asking about internal/personal information.
 Do not Provide personal information, information about the company(such as
internal network) unless Authority of person is verified
 Before transmitting personal information over the internet, check the
connection is Secure and check the url is correct
 If Unsure if an email message is legitimate, contact the person or company by
another means to verify
 3rd Party test - Ethical Hacker
Prevention - Internet Banking Threats
 Use osk instead of our physical keyboard to login to banking sites.
 Go for the OTP instead of security password.
 Before transmitting personal information over the internet, check the
connection is Secure and check the url is correct.
 Never Response to anonymous call asking for your Account No, Credit Card No,
Transaction OTP etc.
 Change your online banking passwords several times throughout the year—and
throw password1234 out the window. Make sure your login is a long mix of
numbers and letters, capitals and lower case.
 Keep up with patches and maintain the latest updates for your Antivirus
software.
References
 Hacking Crux 2 - Rahul Tyagi
 https://www.google.co.in
 http://www.howstuffworks.com
Questions?
Thanks!

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Phishing
PhishingPhishing
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Cyber security
Cyber securityCyber security
Cyber security
TaimoorArshad5
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Cyber crime
Cyber crimeCyber crime
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 

Viewers also liked

Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
guest5f7bf4
 
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Paola Furlanetto
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
Hamid Zainudin
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
SMITA V MORE
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
PECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Viewers also liked (18)

Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Cyber security and privacy

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 
HACKING
HACKINGHACKING
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Security Primer
Security PrimerSecurity Primer
Security Primer
Alison Gianotto
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
Cyber crime
Cyber crimeCyber crime
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Sanjeev Kumar Jaiswal
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
Arjun Tomar
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 

Similar to Cyber security and privacy (20)

Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Computer crime
Computer crimeComputer crime
Computer crime
 
HACKING
HACKINGHACKING
HACKING
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Information security
Information securityInformation security
Information security
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

Recently uploaded

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 

Recently uploaded (20)

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 

Cyber security and privacy

  • 2. Contents  Introduction  Hacking  Information Gathering Techniques  Website Information Gathering Techniques  Personal Information Gathering and Email Hacking  Social Engineering  Internet Banking Hacking  Virus  Prevention – Email Hacking  Prevention – Social Engineering  Prevention – Internet Banking Threats  Conclusion
  • 3. Internet = "network of networks"  Consists of millions of private and public, academic, business, and government Networks of local to global scope that are linked by various technologies  Carries all kind of information resources and services, such as electronic mail, online chat, file transfer and file sharing, online gaming and the inter-linked hypertext documents and other resources of the World Wide Web.
  • 4. Hacking  Black Hat Hackers A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain"  White Hat Hackers The term "white hat" in Internet slang refers to an Ethical Hacker.  Grey Hat Hackers A grey hat hacker is a combination of a black hat and a white hat hacker
  • 5. Information Gathering Techniques  Website Information Gathering Techniques  Email Hacking  Social Engineering  Internet Banking Threats
  • 6. Website Information Gathering Techniques  Footprinting  Whois  Web Archive – The Wayback Machine  Search Engine
  • 7. Virus  Computer Virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. These programs can be created manual coding or using various Tools  Worm is a program or algorithm that replicates itself over a computer network and usually perform malicious action such as using computer’s/network’s resources.  Trojan Horse is a program that seems to be doing one thing but is actually doing another. It can be used to set up a back door in a computer system, enabling the intruder to gain access later. (The name refers to the horse from the Trojan War).  Web Scripts is a program executed from client/server side while accessing a multimedia website.
  • 8. Personal Information Gathering and Email Hacking  Spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site  Keylogger also known as a keystroke logger or system monitor. it can be a program or a hardware installed in the system, which log each key strokes and map it to a text file and send it to the creator or share it to a location.  Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by pretending as a trustworthy entity in an electronic communication. It is one of the biggest Cyber Crime.  Secret Questions is a security measure used to verify whether the user is the authored owner.
  • 9. Social Engineering- The Art of Human Hacking  Social Engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.  It is one of the greatest threats that organizations today encounter.  Phishing  Baiting  Pretexting  Quid Pro Quo
  • 10. Prevention –Email Hacking  Use osk instead of our physical keyboard.  Create a dedicated free mail address to use in the Risky sites.  Never use your Personal Email password while registering in known/unknown web portals.  Never Reply to spams.  Use Bcc: and remove addresses when forwarding mails.  Use “[at]” instead of @. eg: myemail[at]gmail.com.  Don’t make mailto: links when building websites.  Don’t create an Easy to guess email address and password.
  • 11. Prevention – Social Engineering  Be Suspicious of unsolicited phone calls, visits, or email messages from individuals asking about internal/personal information.  Do not Provide personal information, information about the company(such as internal network) unless Authority of person is verified  Before transmitting personal information over the internet, check the connection is Secure and check the url is correct  If Unsure if an email message is legitimate, contact the person or company by another means to verify  3rd Party test - Ethical Hacker
  • 12. Prevention - Internet Banking Threats  Use osk instead of our physical keyboard to login to banking sites.  Go for the OTP instead of security password.  Before transmitting personal information over the internet, check the connection is Secure and check the url is correct.  Never Response to anonymous call asking for your Account No, Credit Card No, Transaction OTP etc.  Change your online banking passwords several times throughout the year—and throw password1234 out the window. Make sure your login is a long mix of numbers and letters, capitals and lower case.  Keep up with patches and maintain the latest updates for your Antivirus software.
  • 13. References  Hacking Crux 2 - Rahul Tyagi  https://www.google.co.in  http://www.howstuffworks.com