SlideShare a Scribd company logo
Internet Security
Introduction… 
• The Internet represents an insecure channel for 
exchanging information leading to a high risk 
of intrusion or fraud, such as phishing. 
• Internet security is a branch of computer 
security specifically involving browser security but 
also network security on a more general level. 
• Its objective is to establish rules and measures to 
use against attacks over the Internet.
Need for Internet Security… 
• Today, internet is stuffed with different types of 
sensitive data 
• The internet is packed with threats from hackers. They 
can 
• crash your system, 
• Acquire access to your personal information and can 
result in monetary losses. 
So, 
• You need internet security to keep information and 
systems safe from malicious software and individuals.
What are the main security-related 
threats on the Internet 
Today? 
• Hijacked web servers 
• Denial-of-Service Attacks 
• Cross Site Scripting 
• Trap Doors 
• Email Spoofing
Hijacked web servers
Web Server Hijacking… 
• Attacker gains access and changes contents of web 
server. 
• Can be very bad: 
• Attacker can plant hostile applets. 
• Attacker can plant data sniffers 
• Attacker can use compromised machine to take over 
internal system. 
• Usually outsiders. 
• Nearly impossible to trace.
How do they do it? 
• Administrative passwords captured by a password 
sniffer. 
• Utilize known vulnerability: 
• Buffer overflow. 
• Use web server CGI script to steal /etc/passwd file, 
then crack passwords. 
• Mount the web server’s filesystem.
Defensive Measures… 
• Patch known bugs. 
• Don’t run unnecessary services on the web server. 
• Monitor system for signs of penetration 
• Intrusion detection systems 
• Make frequent backups. 
• Have a hot spare ready.
Denial-of-Service Attacks
What is Denial-of-Service 
attack? 
• A denial-of-service (DoS) attack is an attempt to 
make a machine or network resource unavailable 
to its intended users. 
• Although the means to carry out and targets of a 
DoS attack may vary, it generally consists of efforts 
to temporarily or indefinitely interrupt or suspend 
services of a host connected to the Internet. 
• Costs money and reputation 
• Lost Sales 
• Damage to reputation
How it is done? 
• Send a lot of requests 
(HTTP, or SMTP requests) 
• Easy to trace. 
• Relatively easy to defend against with TCP/IP blocking at 
router. 
• Attack routers 
• Attack DNS
Cross Site Scripting
Cross-Site Scripting… 
• Cross-site scripting (XSS) is a type of computer 
security vulnerability which enables attackers 
to inject client-side script into Web pages viewed 
by other users. 
• Cross-site scripting carried out on websites 
accounted for roughly 84% of all security threats 
documented by Symantec as of 2007. 
• Their effect may vary depending on the sensitivity 
of the data handled by the vulnerable site.
XSS Attacks - Stealing Cookie 
• What is cookie? 
• Used by the web applications for authenticating, 
tracking, and maintaining specific information 
about users 
• Once a cookie is saved on your computer, only the 
website that created the cookie can read it 
• How it is done? 
• Attacker injects script that reads the site’s cookie 
• Scripts sends the cookie to attacker 
• Attacker can now log into the site as the victim
Some other XSS Attacks… 
• Defacement 
• Attacker injects script that automatically redirects 
victims to attacker’s site 
<script> 
document.location = “http://evil.com”; 
</script> 
• Phishing 
• Fake page asks for user’s credentials or other sensitive 
information( e.g. fake paypal page) 
• The data is sent to the attacker’s site
Email Spoofing
Email Spoofing… 
• Email spoofing is the creation of email messages 
with a forged sender address - something which is 
simple to do because the core protocols do no 
authentication. 
• Spam and phishing emails typically use such 
spoofing to mislead the recipient about the origin 
of the message.
Prevention measures… 
• A number of measures to address spoofing are 
available, but it is likely that almost half of all 
domains still do not have such measures in place. 
• However, as of 2013, 60% of consumer mailboxes 
worldwide used measures to protect themselves 
against this. 
• Although email spoofing is often effective in forging 
the sender's real email address, the IP 
address source computer sending the mail can 
generally be identified from the "Received:" lines in 
the email header.
Trap Doors
Trap doors… 
• Method of bypassing normal authentication 
methods 
• Remains hidden to casual inspection 
• Can be a new program to be installed 
• Can modify an existing program 
• Also known as Back Doors
Trap Door Examples… 
• 2003, an attempt was made to create a backdoor in 
the Linux Kernel 
• Early versions of the Sobig Virus in 2003 installed 
backdoors to send its spam. 
• MyDoom virus in early 2004 created a backdoor on 
port 3127 to send spam
Conclusions
Conclusions… 
• Keep server and third-party applications and library 
up-to-date 
• Do not trust user input 
• Review code & design and identify possible 
weaknesses 
• Monitor run-time activity to detect ongoing 
attacks/probes
THANK YOU

More Related Content

What's hot

Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
SAIKAT BISWAS
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Network security ppt
Network security pptNetwork security ppt
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 
Computer Security
Computer SecurityComputer Security
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
Sai Sakoji
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Nitin Bisht
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 

What's hot (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is malware
What is malwareWhat is malware
What is malware
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Security
momac
 
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Susantha Herath
 
Internet security
Internet securityInternet security
Internet security
Suneel Dogra
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
rjain51
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
Project financed @ sbi project report mba finance
Project financed @ sbi project report mba financeProject financed @ sbi project report mba finance
Project financed @ sbi project report mba finance
Babasab Patil
 
Credit risk management @ state bank of india project report mba finance
Credit risk management @ state bank of india project report mba financeCredit risk management @ state bank of india project report mba finance
Credit risk management @ state bank of india project report mba finance
Babasab Patil
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
ChromeInfo Technologies
 
Financial analysis final project
Financial analysis  final projectFinancial analysis  final project
Financial analysis final project
Deepanti Arora
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
Puneet Arora
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
Mohit
 
Library management system
Library management systemLibrary management system
Library management system
ashu6
 
Data Flow Diagrams
Data Flow DiagramsData Flow Diagrams
Data Flow Diagrams
Sinhaa Yash
 
Social Media for Business
Social Media for BusinessSocial Media for Business
Social Media for Business
Presentation Advisors
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
Aleyda Solís
 

Viewers also liked (20)

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Security
 
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
Evolution of Internet and Online Marketing (M1L2P1: Professional eMarketer)
 
Internet security
Internet securityInternet security
Internet security
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Project financed @ sbi project report mba finance
Project financed @ sbi project report mba financeProject financed @ sbi project report mba finance
Project financed @ sbi project report mba finance
 
Credit risk management @ state bank of india project report mba finance
Credit risk management @ state bank of india project report mba financeCredit risk management @ state bank of india project report mba finance
Credit risk management @ state bank of india project report mba finance
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Financial analysis final project
Financial analysis  final projectFinancial analysis  final project
Financial analysis final project
 
Data Flow Diagram
Data Flow DiagramData Flow Diagram
Data Flow Diagram
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
 
Library management system
Library management systemLibrary management system
Library management system
 
Data Flow Diagrams
Data Flow DiagramsData Flow Diagrams
Data Flow Diagrams
 
Social Media for Business
Social Media for BusinessSocial Media for Business
Social Media for Business
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigitalMobile-First SEO - The Marketers Edition #3XEDigital
Mobile-First SEO - The Marketers Edition #3XEDigital
 

Similar to Internet Security

WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
yashwanthlavu
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
ShivamBajaj36
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
Kabul Education University
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
yashwanthlavu
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
TYPES OF CYBER ATTACKS.pptx
TYPES OF CYBER ATTACKS.pptxTYPES OF CYBER ATTACKS.pptx
TYPES OF CYBER ATTACKS.pptx
RohanMistry15
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 
Web application security
Web application securityWeb application security
Web application security
Akhil Raj
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
AadityaRauniyar1
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
AmolKumarPandey2
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
Wiliam Ferraciolli
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 

Similar to Internet Security (20)

WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 
Cyber security
Cyber security Cyber security
Cyber security
 
Computer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptx
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
TYPES OF CYBER ATTACKS.pptx
TYPES OF CYBER ATTACKS.pptxTYPES OF CYBER ATTACKS.pptx
TYPES OF CYBER ATTACKS.pptx
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Web application security
Web application securityWeb application security
Web application security
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 

Recently uploaded

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 

Recently uploaded (20)

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 

Internet Security

  • 2. Introduction… • The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. • Internet security is a branch of computer security specifically involving browser security but also network security on a more general level. • Its objective is to establish rules and measures to use against attacks over the Internet.
  • 3. Need for Internet Security… • Today, internet is stuffed with different types of sensitive data • The internet is packed with threats from hackers. They can • crash your system, • Acquire access to your personal information and can result in monetary losses. So, • You need internet security to keep information and systems safe from malicious software and individuals.
  • 4. What are the main security-related threats on the Internet Today? • Hijacked web servers • Denial-of-Service Attacks • Cross Site Scripting • Trap Doors • Email Spoofing
  • 6. Web Server Hijacking… • Attacker gains access and changes contents of web server. • Can be very bad: • Attacker can plant hostile applets. • Attacker can plant data sniffers • Attacker can use compromised machine to take over internal system. • Usually outsiders. • Nearly impossible to trace.
  • 7. How do they do it? • Administrative passwords captured by a password sniffer. • Utilize known vulnerability: • Buffer overflow. • Use web server CGI script to steal /etc/passwd file, then crack passwords. • Mount the web server’s filesystem.
  • 8. Defensive Measures… • Patch known bugs. • Don’t run unnecessary services on the web server. • Monitor system for signs of penetration • Intrusion detection systems • Make frequent backups. • Have a hot spare ready.
  • 10. What is Denial-of-Service attack? • A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users. • Although the means to carry out and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. • Costs money and reputation • Lost Sales • Damage to reputation
  • 11. How it is done? • Send a lot of requests (HTTP, or SMTP requests) • Easy to trace. • Relatively easy to defend against with TCP/IP blocking at router. • Attack routers • Attack DNS
  • 13. Cross-Site Scripting… • Cross-site scripting (XSS) is a type of computer security vulnerability which enables attackers to inject client-side script into Web pages viewed by other users. • Cross-site scripting carried out on websites accounted for roughly 84% of all security threats documented by Symantec as of 2007. • Their effect may vary depending on the sensitivity of the data handled by the vulnerable site.
  • 14. XSS Attacks - Stealing Cookie • What is cookie? • Used by the web applications for authenticating, tracking, and maintaining specific information about users • Once a cookie is saved on your computer, only the website that created the cookie can read it • How it is done? • Attacker injects script that reads the site’s cookie • Scripts sends the cookie to attacker • Attacker can now log into the site as the victim
  • 15. Some other XSS Attacks… • Defacement • Attacker injects script that automatically redirects victims to attacker’s site <script> document.location = “http://evil.com”; </script> • Phishing • Fake page asks for user’s credentials or other sensitive information( e.g. fake paypal page) • The data is sent to the attacker’s site
  • 17. Email Spoofing… • Email spoofing is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentication. • Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.
  • 18. Prevention measures… • A number of measures to address spoofing are available, but it is likely that almost half of all domains still do not have such measures in place. • However, as of 2013, 60% of consumer mailboxes worldwide used measures to protect themselves against this. • Although email spoofing is often effective in forging the sender's real email address, the IP address source computer sending the mail can generally be identified from the "Received:" lines in the email header.
  • 20. Trap doors… • Method of bypassing normal authentication methods • Remains hidden to casual inspection • Can be a new program to be installed • Can modify an existing program • Also known as Back Doors
  • 21. Trap Door Examples… • 2003, an attempt was made to create a backdoor in the Linux Kernel • Early versions of the Sobig Virus in 2003 installed backdoors to send its spam. • MyDoom virus in early 2004 created a backdoor on port 3127 to send spam
  • 23. Conclusions… • Keep server and third-party applications and library up-to-date • Do not trust user input • Review code & design and identify possible weaknesses • Monitor run-time activity to detect ongoing attacks/probes