SlideShare a Scribd company logo
Know your Attacker
Submitted by: Arun Velayudhan
What is cyber security ?
Cyber security practice is to provide solution to protect any
enterprise information systems to make it secure and hack
free.
To provide best practices which addresses secure
interoperability, usability and privacy continues to be need of
the hour.
www.learnfact.in
Type of Attacks
• Malware
– A malicious code that damages/disables and steals information from the computer
– Botnets, Viruses, Trojan horses, backdoor, spyware and adware are some examples
of malwares
• Phishing
– Disclosing confidential information or downloading malware by clicking on a hyperlink
in the message.
• Spear Phishing
– Same as phishing but more targeted where the attacker learns about the victim and
impersonates someone he or she knows and trusts.
• Man in the middle attack
– Attacker establishes a position between the sender and recipient of electronic
messages and interrupt them.
• Denial of service attack
• SQL injection
• Zero day exploit
– A zero-day vulnerability is a software security flaw but doesn’t have a patch in place to
fix the flaw.
• DNS tunneling
www.learnfact.in
Type of Attacks
• Non technical attacks
– Physical attacks like entering your secured building etc.
• Network attacks
– Unsecured Wireless access point
– Exploiting via ports
– Installing network analyzer and capturing the packet
• Operating System attacks
– Missing patches
– Cracking password and weak security implementation
• Application attacks
– Mobile App attacks
– Web Application
www.learnfact.in
Attack Carriers
• File Transfer Apps
• Instant messaging Apps
• Webmail
• Social Media platforms
• Micro blogging
• Collaboration Apps
www.learnfact.in
Common Attack
• SQL injection attack
– SQL Injection is a type of cyber-attack that targets databases through SQL
statements
– executed via a website interface
– Poorly coded are prone to SQL injection attacks
• Distributed Denial-of-Service (DDoS)
– Acts like a traffic jam
– Flooding the network traffic
• Cross-site scripting (XSS) attacks
– Data enters a Web application through an untrusted source, most frequently
a web request.
• Weak security practices and undisclosed vulnerabilities
www.learnfact.in
Hackers
• Black hat hackers
– External unauthorized users try to compromise your environment
• White hat hackers
– White-hat hackers are often referred to as ethical hackers
• Grey hat hackers
– Grey hats exploit networks and computer systems in the way that black hats
do, but do so without any malicious intent, disclosing all loopholes and
vulnerabilities to law enforcement agencies or intelligence agencies.
www.learnfact.in
Common Hacking Tools
• Rootkits
– Rootkit is 2 different words. Root and Kit.
– Rootkit is a set of tools that enables root- or administrator-level access on a
computer system
– Allows hackers to gain remote access via backdoor
• Key loggers
– records every key pressed on a system
– key loggers arrive as malware that allows cybercriminals to steal sensitive
data.
– Key loggers can capture credit card numbers, personal messages, mobile
numbers etc.
www.learnfact.in
Attack lifecycle
• Infection
– Luring users to click on a bad link
– Infect the target system with malware
• Persistence
– Rootkits and bootkits are installed on compromised systems
• Communication
– Communicating with other infected systems
• Command and Control
– Capture the infected systems and enable command and control over the
infected systems to extract stolen data
www.learnfact.in
Common Defense mechanism
• Firewall
• Intrusion prevention
• Antivirus
• Content Filtering
• Web Application Firewall
www.learnfact.in
Common safety tips
• Keep updated your security patches regularly
• Avoid easy and dictionary password. Use strong
passwords.
• Avoid opening attachments from unknown sender or
recipient
www.learnfact.in
Protection Strategy
• Design best security policy
• Application controls
• User controls
• Network controls
• End Point controls
• Enforce drive-by-download protection
• Track unknown and unclassified URLs
www.learnfact.in
Security Methods & Models
• OWASP ( www.owasp.org)
• SecureITree (https://www.amenaza.com)
• OpenGroup (https://www.opengroup.org)
www.learnfact.in
Mail: info@learnfact.in
Mail: arun.velayudhan@tutelage.co.in
Web: www.learnfact.in
Web: www.cybkey.com
Thank You
Contact us for:
Cyber security managed services
Cyber Security Training

More Related Content

What's hot

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Sourabh Badve
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Devendra Yadav
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aditya Vikram Singhania
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
AditiPatni3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
Kabul Education University
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Software Security
Software SecuritySoftware Security
Software Security
AkNirojan
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Attack types
Attack typesAttack types
Attack types
S.M. Towhidul Islam
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Hacking
HackingHacking
Hacking
LutfulM
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Software Security
Software SecuritySoftware Security
Software Security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Attack types
Attack typesAttack types
Attack types
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Hacking
HackingHacking
Hacking
 

Similar to Cyber security slideshare_oct_2020

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
BilalMehmood44
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
Bule Hora University
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
MsVaishaliKumar
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
PaulaRodalynMateo1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
parveen837153
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 

Similar to Cyber security slideshare_oct_2020 (20)

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Cyber security slideshare_oct_2020

  • 1. Know your Attacker Submitted by: Arun Velayudhan
  • 2. What is cyber security ? Cyber security practice is to provide solution to protect any enterprise information systems to make it secure and hack free. To provide best practices which addresses secure interoperability, usability and privacy continues to be need of the hour. www.learnfact.in
  • 3. Type of Attacks • Malware – A malicious code that damages/disables and steals information from the computer – Botnets, Viruses, Trojan horses, backdoor, spyware and adware are some examples of malwares • Phishing – Disclosing confidential information or downloading malware by clicking on a hyperlink in the message. • Spear Phishing – Same as phishing but more targeted where the attacker learns about the victim and impersonates someone he or she knows and trusts. • Man in the middle attack – Attacker establishes a position between the sender and recipient of electronic messages and interrupt them. • Denial of service attack • SQL injection • Zero day exploit – A zero-day vulnerability is a software security flaw but doesn’t have a patch in place to fix the flaw. • DNS tunneling www.learnfact.in
  • 4. Type of Attacks • Non technical attacks – Physical attacks like entering your secured building etc. • Network attacks – Unsecured Wireless access point – Exploiting via ports – Installing network analyzer and capturing the packet • Operating System attacks – Missing patches – Cracking password and weak security implementation • Application attacks – Mobile App attacks – Web Application www.learnfact.in
  • 5. Attack Carriers • File Transfer Apps • Instant messaging Apps • Webmail • Social Media platforms • Micro blogging • Collaboration Apps www.learnfact.in
  • 6. Common Attack • SQL injection attack – SQL Injection is a type of cyber-attack that targets databases through SQL statements – executed via a website interface – Poorly coded are prone to SQL injection attacks • Distributed Denial-of-Service (DDoS) – Acts like a traffic jam – Flooding the network traffic • Cross-site scripting (XSS) attacks – Data enters a Web application through an untrusted source, most frequently a web request. • Weak security practices and undisclosed vulnerabilities www.learnfact.in
  • 7. Hackers • Black hat hackers – External unauthorized users try to compromise your environment • White hat hackers – White-hat hackers are often referred to as ethical hackers • Grey hat hackers – Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. www.learnfact.in
  • 8. Common Hacking Tools • Rootkits – Rootkit is 2 different words. Root and Kit. – Rootkit is a set of tools that enables root- or administrator-level access on a computer system – Allows hackers to gain remote access via backdoor • Key loggers – records every key pressed on a system – key loggers arrive as malware that allows cybercriminals to steal sensitive data. – Key loggers can capture credit card numbers, personal messages, mobile numbers etc. www.learnfact.in
  • 9. Attack lifecycle • Infection – Luring users to click on a bad link – Infect the target system with malware • Persistence – Rootkits and bootkits are installed on compromised systems • Communication – Communicating with other infected systems • Command and Control – Capture the infected systems and enable command and control over the infected systems to extract stolen data www.learnfact.in
  • 10. Common Defense mechanism • Firewall • Intrusion prevention • Antivirus • Content Filtering • Web Application Firewall www.learnfact.in
  • 11. Common safety tips • Keep updated your security patches regularly • Avoid easy and dictionary password. Use strong passwords. • Avoid opening attachments from unknown sender or recipient www.learnfact.in
  • 12. Protection Strategy • Design best security policy • Application controls • User controls • Network controls • End Point controls • Enforce drive-by-download protection • Track unknown and unclassified URLs www.learnfact.in
  • 13. Security Methods & Models • OWASP ( www.owasp.org) • SecureITree (https://www.amenaza.com) • OpenGroup (https://www.opengroup.org) www.learnfact.in
  • 14. Mail: info@learnfact.in Mail: arun.velayudhan@tutelage.co.in Web: www.learnfact.in Web: www.cybkey.com Thank You Contact us for: Cyber security managed services Cyber Security Training