SlideShare a Scribd company logo
Information Security 
By: 
• Dhirendra Kumar
Contents: 
• Information Security 
• Need of Protection 
• Hackers 
• Type of Hackers 
• Hack Attacks 
• Live Hacking 
• How to get rid of it
What Is Information Security 
• Process by which digital information assets 
are protected 
• Area which is very sensitive: 
Policies and procedures, authentication, 
attacks, remote access, E-mail, Web, 
wireless, devices, media/medium, secure 
architectures, IDSes/IPSes, operating 
systems, secure code, Cryptography, 
physical security, digital media analysis…
Why protection is important? 
•Increased Networked 
Environment and Network 
base application 
•Evolution of Technology has 
focus primarily on each of 
use 
•Everything and also 
everyone interested to work 
online.
How is Information Lost? 
•Only 23% malicious (65% of this, an inside job!) 
•Only 8% of total loss due to Hacking, Phishing etc 
•77% an ‘accident’ or ‘only doing my job?’ 
McAfee Survey Results 2007
Hackers 
•A Hacker is a person intensely 
interested in the arcane and recondite 
workings of any computer operating 
system. 
•Hackers have Good Knowledge of 
almost every operating System.
Type Of Hackers. 
There are Three Type of Hackers: 
1.White Hat Hacker 
2.Gray Hat Hacker 
3.Black Hat Hacker
1.White Hat Hackers: 
:They are also known as Ethical Hackers 
2.Gray Hat Hackers: 
It’s depends on his/her Situations 
3.Black Hat Hackers:- 
A Black hat hackers is a person who 
breaks into or otherwise violates the 
system integrity of remote machines, 
with malicious intent.
How much damages 
can a security breach cause 
• 44% of UK businesses suffered at least one 
malicious security breach in 2002(now 50%) 
• The average cost was £30,000 
• Several cost more than £500,000 
• and these are just the reported incidents …! 
Source: The DTI Information Security Breaches survey
Type of Lost Information?
Online Hacking 
• Main target of 
Hackers is to down 
the Website. And 
steal confidential 
information . 
• Steal Money online 
by using fraud 
Banking 
site.(phishing) 
Etc……..
Difference between them 
• Cracker: a malicious system security 
breaker. 
• Hacker: a person enjoying exploring the 
systems and stretching their capabilities; 
programmer enthusiast; good fast 
programmer; expert in a specific field
Thinking of Hackers 
• KISS Principle: “Keep It Simple, Stupid” 
• Trojan Horse: a malicious security 
breaking program that makes backdoor for 
the Hackers. 
• Wetware: humans and our nervous 
system compared to software and/or 
hardware
The Three Laws of Secure 
Computing(according to us) 
1. Don't buy a computer. 
2. If you do buy a computer, don't plug it in. 
3. If you do plug it in, sell it and return to 
step 1
Before Hacking site looks like
After Hacking Site looks like..
Live Hacking with Win7 
• Change Any computer password without 
knowing the old password
Try to get rid of it 
• Do not allow unknown to use your 
Personal computer if there is any 
confidential Information. 
• If you have any site then secure your 
Administrator area with security 
application or methods. 
• Online hacking is very common so Do not 
Share your password to any one. Even 
your girlfriend.
Try to get rid of it (continue…) 
• Do not Download any unknown files from 
your e-mail attachment .. 
• If you are clicking on the link for login in to 
any page from your e-mail then check the 
address bar. 
• Install best Firewall in your 
server/computer system..
Try to get rid of it (continue…) 
• Do not send your any kind of information 
to unknown person on Internet 
(Facebook,gmail,yahoo…….etc) 
• Beware to the Social engineering 
• Do not send any kind of information on 
any unknown e-mail.example:-British 
Lottery, Coca cola prize…..etc
Bibliography 
• www.wikipedia.com 
• www.undergroundhackers.com 
• www.ibm.com 
• www.bitcollege.in (Weak security site) 
• www.evilhackers.in
Acknowledgment 
We are sincerely thankful to Mrs. Medha 
Mukhergee and Mr. Sudipto Dutta as 
without their support it was not possible for 
us to make this presentation.
Thanks for your attention 
..…………..Any Question? 
https://www.facebook.com/DeaMonhaxoR

More Related Content

What's hot

CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
Dr. Sushma H.B
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Gaurav Yadav
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
karanramani4
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
Matlab Simulation
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
Online
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
PrateekChaudhary44
 
Cyber security
Cyber security Cyber security
Cyber security
Samidha Gandhi
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 

What's hot (20)

CYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOURCYBER SECURITY : NEED OF THE HOUR
CYBER SECURITY : NEED OF THE HOUR
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber security
Cyber security Cyber security
Cyber security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
cyber security
cyber securitycyber security
cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 

Similar to Information security Presentation

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Hacking
HackingHacking
Hacking
Ranjan Som
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxLearn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Sakthivel803383
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
tushki92
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Cybercrime
CybercrimeCybercrime
Cybercrime
TouqeerAhmed30
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
PrajktaGN
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Computer Security
Computer SecurityComputer Security

Similar to Information security Presentation (20)

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Hacking
HackingHacking
Hacking
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptxLearn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Recently uploaded

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 

Recently uploaded (20)

可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 

Information security Presentation

  • 1. Information Security By: • Dhirendra Kumar
  • 2. Contents: • Information Security • Need of Protection • Hackers • Type of Hackers • Hack Attacks • Live Hacking • How to get rid of it
  • 3. What Is Information Security • Process by which digital information assets are protected • Area which is very sensitive: Policies and procedures, authentication, attacks, remote access, E-mail, Web, wireless, devices, media/medium, secure architectures, IDSes/IPSes, operating systems, secure code, Cryptography, physical security, digital media analysis…
  • 4. Why protection is important? •Increased Networked Environment and Network base application •Evolution of Technology has focus primarily on each of use •Everything and also everyone interested to work online.
  • 5. How is Information Lost? •Only 23% malicious (65% of this, an inside job!) •Only 8% of total loss due to Hacking, Phishing etc •77% an ‘accident’ or ‘only doing my job?’ McAfee Survey Results 2007
  • 6. Hackers •A Hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. •Hackers have Good Knowledge of almost every operating System.
  • 7. Type Of Hackers. There are Three Type of Hackers: 1.White Hat Hacker 2.Gray Hat Hacker 3.Black Hat Hacker
  • 8. 1.White Hat Hackers: :They are also known as Ethical Hackers 2.Gray Hat Hackers: It’s depends on his/her Situations 3.Black Hat Hackers:- A Black hat hackers is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent.
  • 9. How much damages can a security breach cause • 44% of UK businesses suffered at least one malicious security breach in 2002(now 50%) • The average cost was £30,000 • Several cost more than £500,000 • and these are just the reported incidents …! Source: The DTI Information Security Breaches survey
  • 10. Type of Lost Information?
  • 11. Online Hacking • Main target of Hackers is to down the Website. And steal confidential information . • Steal Money online by using fraud Banking site.(phishing) Etc……..
  • 12. Difference between them • Cracker: a malicious system security breaker. • Hacker: a person enjoying exploring the systems and stretching their capabilities; programmer enthusiast; good fast programmer; expert in a specific field
  • 13. Thinking of Hackers • KISS Principle: “Keep It Simple, Stupid” • Trojan Horse: a malicious security breaking program that makes backdoor for the Hackers. • Wetware: humans and our nervous system compared to software and/or hardware
  • 14. The Three Laws of Secure Computing(according to us) 1. Don't buy a computer. 2. If you do buy a computer, don't plug it in. 3. If you do plug it in, sell it and return to step 1
  • 15. Before Hacking site looks like
  • 16. After Hacking Site looks like..
  • 17. Live Hacking with Win7 • Change Any computer password without knowing the old password
  • 18. Try to get rid of it • Do not allow unknown to use your Personal computer if there is any confidential Information. • If you have any site then secure your Administrator area with security application or methods. • Online hacking is very common so Do not Share your password to any one. Even your girlfriend.
  • 19. Try to get rid of it (continue…) • Do not Download any unknown files from your e-mail attachment .. • If you are clicking on the link for login in to any page from your e-mail then check the address bar. • Install best Firewall in your server/computer system..
  • 20. Try to get rid of it (continue…) • Do not send your any kind of information to unknown person on Internet (Facebook,gmail,yahoo…….etc) • Beware to the Social engineering • Do not send any kind of information on any unknown e-mail.example:-British Lottery, Coca cola prize…..etc
  • 21. Bibliography • www.wikipedia.com • www.undergroundhackers.com • www.ibm.com • www.bitcollege.in (Weak security site) • www.evilhackers.in
  • 22. Acknowledgment We are sincerely thankful to Mrs. Medha Mukhergee and Mr. Sudipto Dutta as without their support it was not possible for us to make this presentation.
  • 23. Thanks for your attention ..…………..Any Question? https://www.facebook.com/DeaMonhaxoR