SlideShare a Scribd company logo
technology
Information Security High-Tech erain
protect us ?
can any
Our empirical observations ...
Antibody grows only after we suffer.
Medicine is invented always after the bacteria is discovered.
Same with the Computer viruses
They are invented first before there is any anti-virus.
3
Rock Solid Security ...
by : Eduardo Segura
HUH !!!!!!
It was broken within 2
days !!!!
QuickTime™ and a
H.264 decompressor
are needed to see this picture.
“Secure” database
server ????
“Secure” telephone
network ????
(Jan 1991) First hacker arrest: MArk
Abene (a.k.a. Phiber Optik)
“Secure” internet
backbone ????
(May 1998)... in testimony before
congress L0pht Hacker group claimed
that they can bring down the internet
“Secure”
distribution
media
(DVD,
1997) ????
(Oct 1999) DeCSS is released, a closed
source Windows-only application for
DVD ripping
Thank You ...
Threats in
day-to-day
life
life
lifeby : Eric So
Losing personal privacy over the internet
Losing information from laptop or memory drive
Media copyright issue all over the world, e.g.
Youtube, DVD copy
Disadvantage - Technology for daily life
Satellite Missions
High resolution photography (IMINT) e.g.
monitoring weather and making maps
Communications eavesdropping (SIGINT)
Covert communications
Enforcement of nuclear test bans (see National Technical
Means)
Detection of missile launches
Spy Satellite . . .
GPS Surveillance --Turn a cell phone into a
surveillance device provided by Accutracking (
http://www.accutracking.com/)
Mass surveillance – domestic telephone call, Traffic
camera and commercial records.
Surveillance
Pudding Media is offering a service
uses voice-recognition software to find
tens of thousands of key words in a
user's conversation to trigger ads that
are shown on the user's screen.
Conversation may have been
monitored
Privacy for free VOIP
Same password used over multiple sites.
Personal Profile can be brought up from any
administrator.
Contact information may be sold to other advertisement
company or partners as a online properties before 2000.
E-commerce
Using the Vision 20/20
POM Offender
Locator to identify:
Missing Person
Tracking
The vision 20/20
US Computer Emergency
Sex Offender Locator
Weather
Trace your missing pet
Thank You ...
Open Wi-Fi
by : Kiran Patil
Yahoo!!!!
Internet
VoIP
Phone access
Game
consumer electronic device
connectivity.
Wi-Fi ... the future wave
War driving ... used to
detect WiFi and collect
information to decide
which one to attack.
Wi-Fi ...hacking tools
Wi-Fi ...hacking tools
Evil Twin
Attack at two Miami Marshall's stores :
TJX Breach SEPTEMBER 25, 2007
Hijacking a Macbook in 60 Seconds or Less
Hacking using Open Wi-Fi
Enable WPA
Change the SSID from the default.
Enable Mac Address Filtering in your
Access Point
Restrict the range of available IP addresses
that your router will allow to connect
Wi-Fi ... What should be done ?
Always make sure you are connecting to right network.
Avoid Open Wi-Fi if absolutely not sure about it.
Do not assume that hackers will not target you ...
sometimes they do it just for fun.
Set up a software firewall (such as Zone Alarm) on each
computer.
Enable logs on your router
Wi-Fi ... What should be done ?
Thank You ...
Phishing
by : Pantesh Shah
From Wikipedia
In computing, phishing is an attempt to criminally and
fraudulently acquire sensitive information, such as usernames,
passwords and credit card details, by masquerading as a
trustworthy entity in an electronic communication
Phishing ... what’s that ?
Phishing ... an increasing problem
source : WikiPedia
Deceptive Phishing
Malware-Based Phishing
Keyloggers and
Screenloggers
Session Hijacking
Web Trojans
Phishing ...multiple faces
Hosts File Poisoning
Data Theft
DNS-Based Phishing
(“Pharming”).
Content-Injection Phishing
Man-in-the-Middle Phishing
Search Engine Phishing
Phishing ...one best(worst) example
Google’s anti-phising software
Anti-phising tool bar in IE
Many available anti-phising software
Phishing ... some protection
technology
Be-suspicious about the e-mail asking for
your private information.
Make sure that link you click brings you to
legitimate web-site
Look out for poor spelling / grammar in
official looking e-mail.
Do not fall for million dollars - money does
not come as free
Phishing ...a few tips to protect
ourselves
Thank You ...
Daily life Watch-
outs
by : Niketa Patel
A lot of password cracking softwares are
readily available on internet.
Modern technology enables hacker to try out
password cracking guesses ( from common
words to ancient language ) in a speed of light.
Account hacking can not only reveals private
information, but also can be a gateway to install
‘Torjan Horse’ ( or ‘back door’ ) program to
access our computer and data without us ever
knowing about it.
Password security
To protect password
Need to make our password unique
for each account
Need to change our password
frequently
Need to keep our password secret
Password security
Email has become such a commonplace part of our lives that many
of us forget just how insecure it can be. For instance:
Email generally travels across the Internet in an unencrypted form
(plain,readable text) that anyone between the source and destination can
read.
Email attachments are the most commonly used method for spreading
worms, viruses and Trojan Horses. Infection can happen by clicking on
something as innocent looking as a .jpg or .zip file.
Once an email has been sent, you have no control over what happens with
it.
E-mail security
Never send your password in an email.
Be certain of an attachment's safety before opening it.
Never reply to unsolicited email
Never allow guests to use your account.
Beware: HTML messages are a common way for viruses and other
hostile content to transmit themselves. Use caution when opening a
HTML message from an unknown source. Most email tools allow
you to read messages in plain-text format,which eliminates the risk
E-mail security- do’s & dont’s
Social Engineering
QuickTime™ and a
H.264 decompressor
are needed to see this picture.
Social engineering uses the
skills of the con artist ...
These "engineers" impersonate
computer administrators
company officials
employees of a partner company
Social Engineering
Social engineering is one of the
most effective hacker exploits
no technology can defend against it.
Some surveys have shown that over
70% of people will divulge their
password or other information under
the right circumstances
Social Engineering
Thank You ...
Can any technology
protect us ?
Information Security in High-Tech era
Our original quest . . .
what ever we have discussed so
far is revolving around
us
Security is only as strong as itsweakest link
which is again ...
Another empirical observation
us
http://www.theregister.co.uk/2007/03/19/diamond_bl
http://www.theregister.co.uk/2007/04/17/choco
late_password_survey/
Two recent news . . .
22% IT professionals revealed their password with simple question
A further 42% of IT professionals revealed their password With
social engineering technique.
39% said that they will tell IT department staff their password
32% said that they will tell their password to their boss.
More on this password
survey ...
Technology may help us to build the strongest lock . . .
It is our responsibility toprotect the key.
Our Conclusion ...
Thanks to Haroon Mahmood and Rich
Brueckner of SUN Microsystems Inc. for
sharing their creation on the ‘social engineering’
video clip.
Many of the the information and ‘clip arts’
presented here has been taken from the ‘Security
Training’ documentation from SUN
Microsystems Inc.
Acknowledgment
Discussion
Session
. . .
. . .
. . .

More Related Content

What's hot

Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Internet security
Internet securityInternet security
Internet securityat1211
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Hackers
HackersHackers
Hackers
Mahmoud Saeed
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
mfaheemakhtar
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
internet security
internet securityinternet security
internet security
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Internet security
Internet securityInternet security
Internet security
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Hackers
HackersHackers
Hackers
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Computer security
Computer securityComputer security
Computer security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 

Viewers also liked

Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
Amazon Appstore Developers
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (11)

Cyber security
Cyber securityCyber security
Cyber security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
Creating Rich Multi-Screen Experiences on Android with Amazon Fling - Mario V...
 
War against Identity Theft and Phising attack
War against Identity Theft and Phising attack War against Identity Theft and Phising attack
War against Identity Theft and Phising attack
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Information Security - A Discussion

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
Qhaiyum Shah
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
Roel Palmaers
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
Hacking
HackingHacking
Hacking
HackingHacking
Hacking
Yhannah
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Rohit Yadav
 

Similar to Information Security - A Discussion (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Hamza
HamzaHamza
Hamza
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Network Security
Network SecurityNetwork Security
Network Security
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 

Recently uploaded

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 

Recently uploaded (20)

Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 

Information Security - A Discussion

  • 1.
  • 2. technology Information Security High-Tech erain protect us ? can any
  • 3. Our empirical observations ... Antibody grows only after we suffer. Medicine is invented always after the bacteria is discovered. Same with the Computer viruses They are invented first before there is any anti-virus. 3
  • 4. Rock Solid Security ... by : Eduardo Segura HUH !!!!!!
  • 5. It was broken within 2 days !!!! QuickTime™ and a H.264 decompressor are needed to see this picture. “Secure” database server ????
  • 6. “Secure” telephone network ???? (Jan 1991) First hacker arrest: MArk Abene (a.k.a. Phiber Optik)
  • 7. “Secure” internet backbone ???? (May 1998)... in testimony before congress L0pht Hacker group claimed that they can bring down the internet
  • 8. “Secure” distribution media (DVD, 1997) ???? (Oct 1999) DeCSS is released, a closed source Windows-only application for DVD ripping
  • 11. Losing personal privacy over the internet Losing information from laptop or memory drive Media copyright issue all over the world, e.g. Youtube, DVD copy Disadvantage - Technology for daily life
  • 12. Satellite Missions High resolution photography (IMINT) e.g. monitoring weather and making maps Communications eavesdropping (SIGINT) Covert communications Enforcement of nuclear test bans (see National Technical Means) Detection of missile launches Spy Satellite . . .
  • 13. GPS Surveillance --Turn a cell phone into a surveillance device provided by Accutracking ( http://www.accutracking.com/) Mass surveillance – domestic telephone call, Traffic camera and commercial records. Surveillance
  • 14. Pudding Media is offering a service uses voice-recognition software to find tens of thousands of key words in a user's conversation to trigger ads that are shown on the user's screen. Conversation may have been monitored Privacy for free VOIP
  • 15. Same password used over multiple sites. Personal Profile can be brought up from any administrator. Contact information may be sold to other advertisement company or partners as a online properties before 2000. E-commerce
  • 16. Using the Vision 20/20 POM Offender Locator to identify: Missing Person Tracking The vision 20/20 US Computer Emergency Sex Offender Locator Weather Trace your missing pet
  • 18. Open Wi-Fi by : Kiran Patil Yahoo!!!!
  • 19. Internet VoIP Phone access Game consumer electronic device connectivity. Wi-Fi ... the future wave
  • 20. War driving ... used to detect WiFi and collect information to decide which one to attack. Wi-Fi ...hacking tools
  • 22. Evil Twin Attack at two Miami Marshall's stores : TJX Breach SEPTEMBER 25, 2007 Hijacking a Macbook in 60 Seconds or Less Hacking using Open Wi-Fi
  • 23. Enable WPA Change the SSID from the default. Enable Mac Address Filtering in your Access Point Restrict the range of available IP addresses that your router will allow to connect Wi-Fi ... What should be done ?
  • 24. Always make sure you are connecting to right network. Avoid Open Wi-Fi if absolutely not sure about it. Do not assume that hackers will not target you ... sometimes they do it just for fun. Set up a software firewall (such as Zone Alarm) on each computer. Enable logs on your router Wi-Fi ... What should be done ?
  • 27. From Wikipedia In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication Phishing ... what’s that ?
  • 28. Phishing ... an increasing problem source : WikiPedia
  • 29. Deceptive Phishing Malware-Based Phishing Keyloggers and Screenloggers Session Hijacking Web Trojans Phishing ...multiple faces Hosts File Poisoning Data Theft DNS-Based Phishing (“Pharming”). Content-Injection Phishing Man-in-the-Middle Phishing Search Engine Phishing
  • 31. Google’s anti-phising software Anti-phising tool bar in IE Many available anti-phising software Phishing ... some protection technology
  • 32. Be-suspicious about the e-mail asking for your private information. Make sure that link you click brings you to legitimate web-site Look out for poor spelling / grammar in official looking e-mail. Do not fall for million dollars - money does not come as free Phishing ...a few tips to protect ourselves
  • 34. Daily life Watch- outs by : Niketa Patel
  • 35. A lot of password cracking softwares are readily available on internet. Modern technology enables hacker to try out password cracking guesses ( from common words to ancient language ) in a speed of light. Account hacking can not only reveals private information, but also can be a gateway to install ‘Torjan Horse’ ( or ‘back door’ ) program to access our computer and data without us ever knowing about it. Password security
  • 36. To protect password Need to make our password unique for each account Need to change our password frequently Need to keep our password secret Password security
  • 37. Email has become such a commonplace part of our lives that many of us forget just how insecure it can be. For instance: Email generally travels across the Internet in an unencrypted form (plain,readable text) that anyone between the source and destination can read. Email attachments are the most commonly used method for spreading worms, viruses and Trojan Horses. Infection can happen by clicking on something as innocent looking as a .jpg or .zip file. Once an email has been sent, you have no control over what happens with it. E-mail security
  • 38. Never send your password in an email. Be certain of an attachment's safety before opening it. Never reply to unsolicited email Never allow guests to use your account. Beware: HTML messages are a common way for viruses and other hostile content to transmit themselves. Use caution when opening a HTML message from an unknown source. Most email tools allow you to read messages in plain-text format,which eliminates the risk E-mail security- do’s & dont’s
  • 39. Social Engineering QuickTime™ and a H.264 decompressor are needed to see this picture.
  • 40. Social engineering uses the skills of the con artist ... These "engineers" impersonate computer administrators company officials employees of a partner company Social Engineering
  • 41. Social engineering is one of the most effective hacker exploits no technology can defend against it. Some surveys have shown that over 70% of people will divulge their password or other information under the right circumstances Social Engineering
  • 43. Can any technology protect us ? Information Security in High-Tech era Our original quest . . .
  • 44. what ever we have discussed so far is revolving around us
  • 45. Security is only as strong as itsweakest link which is again ... Another empirical observation us
  • 47.
  • 48.
  • 49. 22% IT professionals revealed their password with simple question A further 42% of IT professionals revealed their password With social engineering technique. 39% said that they will tell IT department staff their password 32% said that they will tell their password to their boss. More on this password survey ...
  • 50. Technology may help us to build the strongest lock . . . It is our responsibility toprotect the key. Our Conclusion ...
  • 51. Thanks to Haroon Mahmood and Rich Brueckner of SUN Microsystems Inc. for sharing their creation on the ‘social engineering’ video clip. Many of the the information and ‘clip arts’ presented here has been taken from the ‘Security Training’ documentation from SUN Microsystems Inc. Acknowledgment