Cyber Security & Network AttackANALOG GROUP
Cyber SecurityThe electronic medium in which online communication takes place. Cyber space is virtual space in computer media.Security is the degree of protection against danger, damage, loss, and criminal activity.ANALOG GROUP
Element Of SecurityConfidentiality: Disclosure of information only to authorized entities Integrity: Prevention of unauthorized changes to data Authenticity: Confidence that a message was sent by a certain party and not an imposter Availability: Guarantee of access to resourcesANALOG GROUP
The Security , Functionality & Ease of Use TriangleFunctionalityMoving BallSecurityEase of UseANALOG GROUP
What Does A malicious Hacker Do?1Foot printing Scanning25Clearing Trackgaining access3maintaining access4ANALOG GROUP
NetworkANALOG GROUP
Network AttackEavesdroppingSnoopingInterceptionModification AttacksRepudiation Attacks SniffingPort ScanningTCP Syn. or TCP ACK AttackTCP Sequence number attackTCP HijackingICMP AttacksSmurf AttacksICMP Tunelling          Denial-of-service (DoS) AttacksDistributed denial-of-service (DDoS) AttacksBack door AttacksSpoofing AttacksMan-in-the-Middle AttacksReplay AttacksPassword Guessing AttacksANALOG GROUP
Eavesdropping--get MAC Address-- get IP Address-- get Base Station Address-- sniff clear text passwords and keys-- crack wep keys-- crack password  -- get SSIDsANALOG GROUP
SnoopingSame as EavesdroppingBut it will work  all time not limited during  transmission  .Ex. KeylogerANALOG GROUP
Port ScanningOn computer and telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually with a socket and plug of some kind.In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network. ANALOG GROUP
Dos & Ddos Attack   Denial of Service is an attack through which a person can make a system unusable, or slow it down for legitimate users,by overloading its resources.ANALOG GROUP
MITM attack : man in the middle attackAs the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparentlyANALOG GROUP
Back door Attacks This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.ANALOG GROUP
SQL Injection SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and executionThe vulnerability is present when user input is either incorrectly filtered for string literalescape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executedANALOG GROUP
How To Protect?Install a Hardware Firewall/RouterSecure Your WiFiInstall a Web Filter/Proxy Install a Spam Filter Install and Maintain Antivirus SoftwareInstall Desktop Firewall SoftwareInstall Antispyware SoftwareInstall Encryption/Secure Deletion SoftwareInstall and Use a Backup SystemANALOG GROUP
First protect your computer.1: Protect computer by password.2: use administrator & guest account to login.3: Apply group policy.4: Use a up to date antivirus ANALOG GROUP
Now Network Security.      1. Install a Hardware Firewall/RouterThe hardware firewall/router is at the core of your system security. It is on the “front lines” when it comes to protecting your systems. It’s main security purpose is to let you get out to the Internet while keeping the Internet out of your computers.A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped. ANALOG GROUP
Secure Your WiFi1: Use preferred encryption methods in this order: WPA2, WPA (been cracked), WEP (been cracked). Only use WPA and WEP if you have no other choice2: Change your SSID to something obscure3: Don’t broadcast your SSID4: Use MAC address authentication5: Turn off your WiFi when not in use6: Disable DHCP on entire networkANALOG GROUP
Web Filter/Proxy In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.ANALOG GROUP
AntivirusBit  Defender Antivirus 2011Norton Antivirus 2011F-Secure Antivirus 2011ESET NOD32 Antivirus 4Kasper sky Antivirus 2011Trend Micro Titanium SecurityPanda Antivirus 2011AVG Antivirus 2011G Data Antivirus 2011Zone Alarm Antivirus 2011Vipre Antivirus 2011McAfee Antivirus Plus 2011CA Antivirus 2011AvanquestSystemSuite 11 ProfessionalAviraAntivir Premium 2011Sophos Endpoint Security 2011Comodo Antivirus 2011PC Tools Spyware Doctor with Antivirus 2011Quick Heal Antivirus 2011Microsoft Security Essentials 2011ANALOG GROUP
INDIA in cyber securityCyber law of India is weak and so is cyber security of India. In fact, cyber security of India is in poor state. We have no cyber security strategy of India and this is resulting in a weak and vulnerable cyber security of India. India is facing serious cyber threats and its cyberspace is not at all secure. Cyber terrorism against India is now a well known fact and cyber espionage against India is even admitted by Indian government. Even defence forces of India need to upgrade their cyber security capabilities. We also have negligible cyber forensics capabilities in India and cyber skills development in India is the need of the hour. ANALOG GROUP
Cyber terrorism in India, cyber crimes and cyber attacks against India are increasing because we have no national security policy of India. Further, we also have no national security an ICT policy of India. Obviously national cyber security in India is not upto the mark in the absence of networks security in India. National Security Policy of India is urgently required and Cyber Security Policy of India must be an essential part of the same, says Praveen Dalal, managing partner of New Delhi based Law Firm Perry4Law and leading techno legal expert of India. Increasing Cyber Security Readiness with Adaptive Threat Management is need of the hour, suggests Dalal. Further, Measurement of ICT Resilience and Robustness on regular basis is also required, suggests Dalal. ANALOG GROUP
Where are you?ANALOG GROUP
Any Problem?ANALOG GROUP
PRESENTED BYSHASHI SHNAKER SINGHCOMPUTER SCIENCE  & ENGINEERING ANAND ENGINEERING COLLEGE,AGRAANALOG GROUP

Cyber security & network attack6

  • 1.
    Cyber Security &Network AttackANALOG GROUP
  • 2.
    Cyber SecurityThe electronicmedium in which online communication takes place. Cyber space is virtual space in computer media.Security is the degree of protection against danger, damage, loss, and criminal activity.ANALOG GROUP
  • 3.
    Element Of SecurityConfidentiality:Disclosure of information only to authorized entities Integrity: Prevention of unauthorized changes to data Authenticity: Confidence that a message was sent by a certain party and not an imposter Availability: Guarantee of access to resourcesANALOG GROUP
  • 4.
    The Security ,Functionality & Ease of Use TriangleFunctionalityMoving BallSecurityEase of UseANALOG GROUP
  • 5.
    What Does Amalicious Hacker Do?1Foot printing Scanning25Clearing Trackgaining access3maintaining access4ANALOG GROUP
  • 6.
  • 7.
    Network AttackEavesdroppingSnoopingInterceptionModification AttacksRepudiationAttacks SniffingPort ScanningTCP Syn. or TCP ACK AttackTCP Sequence number attackTCP HijackingICMP AttacksSmurf AttacksICMP Tunelling Denial-of-service (DoS) AttacksDistributed denial-of-service (DDoS) AttacksBack door AttacksSpoofing AttacksMan-in-the-Middle AttacksReplay AttacksPassword Guessing AttacksANALOG GROUP
  • 8.
    Eavesdropping--get MAC Address--get IP Address-- get Base Station Address-- sniff clear text passwords and keys-- crack wep keys-- crack password -- get SSIDsANALOG GROUP
  • 9.
    SnoopingSame as EavesdroppingButit will work all time not limited during transmission .Ex. KeylogerANALOG GROUP
  • 10.
    Port ScanningOn computerand telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually with a socket and plug of some kind.In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network. ANALOG GROUP
  • 11.
    Dos & DdosAttack Denial of Service is an attack through which a person can make a system unusable, or slow it down for legitimate users,by overloading its resources.ANALOG GROUP
  • 12.
    MITM attack :man in the middle attackAs the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparentlyANALOG GROUP
  • 13.
    Back door AttacksThis can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.ANALOG GROUP
  • 14.
    SQL Injection SQLinjection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and executionThe vulnerability is present when user input is either incorrectly filtered for string literalescape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executedANALOG GROUP
  • 15.
    How To Protect?Installa Hardware Firewall/RouterSecure Your WiFiInstall a Web Filter/Proxy Install a Spam Filter Install and Maintain Antivirus SoftwareInstall Desktop Firewall SoftwareInstall Antispyware SoftwareInstall Encryption/Secure Deletion SoftwareInstall and Use a Backup SystemANALOG GROUP
  • 16.
    First protect yourcomputer.1: Protect computer by password.2: use administrator & guest account to login.3: Apply group policy.4: Use a up to date antivirus ANALOG GROUP
  • 17.
    Now Network Security. 1. Install a Hardware Firewall/RouterThe hardware firewall/router is at the core of your system security. It is on the “front lines” when it comes to protecting your systems. It’s main security purpose is to let you get out to the Internet while keeping the Internet out of your computers.A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped. ANALOG GROUP
  • 18.
    Secure Your WiFi1:Use preferred encryption methods in this order: WPA2, WPA (been cracked), WEP (been cracked). Only use WPA and WEP if you have no other choice2: Change your SSID to something obscure3: Don’t broadcast your SSID4: Use MAC address authentication5: Turn off your WiFi when not in use6: Disable DHCP on entire networkANALOG GROUP
  • 19.
    Web Filter/Proxy Incomputer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.ANALOG GROUP
  • 20.
    AntivirusBit DefenderAntivirus 2011Norton Antivirus 2011F-Secure Antivirus 2011ESET NOD32 Antivirus 4Kasper sky Antivirus 2011Trend Micro Titanium SecurityPanda Antivirus 2011AVG Antivirus 2011G Data Antivirus 2011Zone Alarm Antivirus 2011Vipre Antivirus 2011McAfee Antivirus Plus 2011CA Antivirus 2011AvanquestSystemSuite 11 ProfessionalAviraAntivir Premium 2011Sophos Endpoint Security 2011Comodo Antivirus 2011PC Tools Spyware Doctor with Antivirus 2011Quick Heal Antivirus 2011Microsoft Security Essentials 2011ANALOG GROUP
  • 21.
    INDIA in cybersecurityCyber law of India is weak and so is cyber security of India. In fact, cyber security of India is in poor state. We have no cyber security strategy of India and this is resulting in a weak and vulnerable cyber security of India. India is facing serious cyber threats and its cyberspace is not at all secure. Cyber terrorism against India is now a well known fact and cyber espionage against India is even admitted by Indian government. Even defence forces of India need to upgrade their cyber security capabilities. We also have negligible cyber forensics capabilities in India and cyber skills development in India is the need of the hour. ANALOG GROUP
  • 22.
    Cyber terrorism inIndia, cyber crimes and cyber attacks against India are increasing because we have no national security policy of India. Further, we also have no national security an ICT policy of India. Obviously national cyber security in India is not upto the mark in the absence of networks security in India. National Security Policy of India is urgently required and Cyber Security Policy of India must be an essential part of the same, says Praveen Dalal, managing partner of New Delhi based Law Firm Perry4Law and leading techno legal expert of India. Increasing Cyber Security Readiness with Adaptive Threat Management is need of the hour, suggests Dalal. Further, Measurement of ICT Resilience and Robustness on regular basis is also required, suggests Dalal. ANALOG GROUP
  • 23.
  • 24.
  • 25.
    PRESENTED BYSHASHI SHNAKERSINGHCOMPUTER SCIENCE & ENGINEERING ANAND ENGINEERING COLLEGE,AGRAANALOG GROUP