SlideShare a Scribd company logo
RECENT TRENDS IN
TECHNOLOGY & INTERNET
SECURITY
Introduction
• Operating System
• Websites
• Passwords
• Hackers
• Mobile Platform
• Virus & Worms
• Recent Trends
• Bio metrics
Unix / Mac OS /OS X
• Unix (all-caps UNIX for the trademark) is a
family of multitasking, multiuser computer
operating systems that derive from the
original AT&T Unix, developed in the 1970s
at the Bell Labs research centre by Ken
Thompson, Dennis Ritchie, and others
• Permission technology and also the user
groups sandboxing.
• Root / superuser sandboxing
• Virus adaptability better than its competitors.
Windows
• It is the most commonly
used OS world wide.
• It was developed by
Microsoft
• It uses DLL and registry
model.
• It uses a user access
control system.
Linux
• Linux is a Unix-like and mostly POSIX-
compliant computer operating system
assembled under the model of free and
open-source software development and
distribution. The defining component of Linux
is the Linux kernel,an operating system
kernel first released on 5 October 1991 by
Linus Torvalds.
• Almost all the security measures of that of
Unix.
• Ubuntu
• Mint
• Fedora
• Red hat
WEBSITES
HTTP VS HTTPS
PASSWORD
Password
• Its a simple mechanism to know whether the user is
genuine
• It may include letters numbers and may be in some cases
the special characters
• Password of the future may include the physical
verification
• extended security through 2 step verification.
• Password mangers to help you for password management
Precautions for password
• Different password for each and every website
• Avoid managers but too many passwords mean managers
• Use long passwords and avoid 123456, Password , Incorrect etc
• Avoid using meaningful words.
• use multilingual password
• Enable 2 step verification for the Gmail iCloud and available services
• Enable notification for Facebook and authenticators for generating a
2nd layer security.
• using passwords like these would ensure your computers are
safe but as said earlier MEMORY?
• Change the password in every 72-90 days
• Make sure you log out of the online services after use.
enable auto sign in the computers you have complete
control on.
• enable guest users for the computers and for mobiles .
• use incognito mode when ever you want your searches
traceless
• Clear the cookies and the history every 2 months.
• Avoid auto login saves time but your safety?
MOBILE PLATFORM
iOS
• iphone os - iOS
• Developed based on unix
• used by apple closed coded
• Benefits of sandboxing
• limitation slow roll out of features
• Fast updates
Android
• Freedom
• users mode
• customise the appearance
• easier access to the google services including the mail
the contacts the calendar system
• drawbacks too much resource allocation.
• Hacking prone
Windows Phone
• Better than windows mobile
• Fast growing
• Benefits of the existing users
• easier to learn for the majority of the users
• hugely inspired the windows 8/8.1 and the windows
10
• There are other Mobile OS available like ubuntu,
sailfish, Tizen and many more.
• But then why is it that they are not popular?
• Not well developed App stores - the hardware
companies want to go with the tried and tested
• the os will require a specific hardware and
• best is already used.
HACKERS
– Fred Durst
“If you wanna know how not secure you are,
just take a look around. Nothing's secure.
Nothing's safe. I don't hate technology, I don't
hate hackers, because that's just what comes
with it, without those hackers we wouldn't solve
the problems we need to solve, especially
security.”
Black Hat Hacker
• Dont follow rules
• Doesn't do hacking for approved reasons
• Malicious codes / virus
• Violates computer security
White Hat Hackers
• Computer Security
• Improves Security and Services
• Hacks with the permission of the user.
Hactivists
• The story of Anonymous
• The NSA
• The Digital Terrorism.
• Does Good / Bad
VIRUS & WORMS
Virus
• A program that can replicate by itself and can
spread from one computer to another with out the
input from the creator
• Needs a host program
• The purpose for the virus can be different or it can
be used for any purpose eg kali linux payload
management
Computer Worms
• It is similiar to virus and can replicate through
network
• It is a self sustaining program doesn't need to be
attached with any of the programs
• Common symptoms include overall sluggishness in
the os and the slowness in the network due to
increase bandwith consumption.
Trojan Horse
• One of the most irritating programs in the computer
world.
• Inspiration from the TROY story
• Does something entirely different from what it is
suppose to do tricks the user. Started as a greeting card
virus.
• Commonly used to hack and steal information from the
users commonly used in keyloggers. Hence it is called
social engineering toolkit.
Types of hacking
• Password cracking : it can be done in 2 ways through
brute force or through dictionary guessing.
• Packet sniffing : all information through the internet
always passes through as packets and thus softwares like
wireshark can sniff the packet data and hence get the
information
• Phishing : My most favourite method of hacking
because requires very less work and then fool the
customers into giving their information. CLONING the
website.
Types of Hacking
• Rootkit: Software that can hid the unwanted process from seeing
in the windows task manger.
• Key loggers : if you have access to the computer installing a key
loggers can provide all that is typed in that computer. taps in to the
typing in the computer.
• Scareware/ransomware: Commonly disguise as an antivirus
making you pay for the security or for providing information.
Credit card informations !!!
• IP spoofing / MAC address cloning : use the id of some other
person and avoid being detected in the hacked network to avoid
the forensic detection.
Free advice
• Always protect your system with an antivirus !!!!!!!
and keep it updated.
• use cloud antivirus
• never use a cracked system or a cracked antivirus.
• it affects your motherboard and also your security.
RECENT TRENDS IN THE
TECHNOLOGICAL FIRMS
Who wants 1 device ?
• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit
and apple watch.
• Google with chrome books chrome cast android and other
services like the google glass and even internet itself- project loom
android wear
• Windows with laptops, phones,xbox surface tabs and surface TV
and Zune players, Office.
• All want not one device but your complete home and the
complete ecosystem
• the maximum effects come with the maximum devices
Continuum - Windows 10
Continuity- Apple
Self driving cars of the future. - Benz
• Wireless charging
• Hands free control
• 3D projectors
• 3D Printers - Guess what chicken of the future will
be printed.
• Robotic skeletons for army.
• Control the home from Anywhere in the world
through Home kit.
• Free and wireless payments through NFC.
BIO METRICS
Finger Print Scanner
• It is simple
• uses a unique design
• Much safer than the face recognition
• Partial and complete recognition of the finger print
• Safe place to store the data
• Can carry along where ever you go
• But not hack free
• Sensors inaccurate to detect a finger or differentiate from an animal
• Good for making authentication for the payments.
USB Tokenisation
• A single usb key
• No passwords
• Connect the USB
• Incorruptible Data ROM storage.
• Best used in offices, for authentication.
iris recognition system.
• the most secure in the world
• error rate is high
• requires very good sensors
• Used for very high security measures in the military
• mass usage still in testing
• Checking for the possibilities for the daily usage.
• inconvenient for almost daily usage.
THANK YOU!

More Related Content

What's hot

Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
Deepak Khari
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
Patricia M Watson
 
Cyber security
Cyber securityCyber security
Cyber security
Arjun Chetry
 
Computer security
Computer securityComputer security
Computer security
Robin E. Beavers
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a House
Synack
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
Paulo Martins
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
Tom Eston
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
Sam Bowne
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
SecureState
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 

What's hot (18)

Personal security
Personal securityPersonal security
Personal security
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a House
 
System failure
System  failureSystem  failure
System failure
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 

Similar to Internet security

Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By NirmalNIRMAL RAJ
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
Pratik Gupta
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
Brian Pichman
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
dnomura
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Niraj Solanke
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
Ankur Kumar
 
Senior Education
Senior EducationSenior Education
Senior Education
Summerpair77
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 

Similar to Internet security (20)

Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Senior Education
Senior EducationSenior Education
Senior Education
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 

Recently uploaded (16)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 

Internet security

  • 1. RECENT TRENDS IN TECHNOLOGY & INTERNET SECURITY
  • 2. Introduction • Operating System • Websites • Passwords • Hackers • Mobile Platform • Virus & Worms • Recent Trends • Bio metrics
  • 3. Unix / Mac OS /OS X • Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others • Permission technology and also the user groups sandboxing. • Root / superuser sandboxing • Virus adaptability better than its competitors.
  • 4. Windows • It is the most commonly used OS world wide. • It was developed by Microsoft • It uses DLL and registry model. • It uses a user access control system.
  • 5. Linux • Linux is a Unix-like and mostly POSIX- compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel,an operating system kernel first released on 5 October 1991 by Linus Torvalds. • Almost all the security measures of that of Unix. • Ubuntu • Mint • Fedora • Red hat
  • 9. Password • Its a simple mechanism to know whether the user is genuine • It may include letters numbers and may be in some cases the special characters • Password of the future may include the physical verification • extended security through 2 step verification. • Password mangers to help you for password management
  • 10. Precautions for password • Different password for each and every website • Avoid managers but too many passwords mean managers • Use long passwords and avoid 123456, Password , Incorrect etc • Avoid using meaningful words. • use multilingual password • Enable 2 step verification for the Gmail iCloud and available services • Enable notification for Facebook and authenticators for generating a 2nd layer security.
  • 11. • using passwords like these would ensure your computers are safe but as said earlier MEMORY? • Change the password in every 72-90 days • Make sure you log out of the online services after use. enable auto sign in the computers you have complete control on. • enable guest users for the computers and for mobiles . • use incognito mode when ever you want your searches traceless • Clear the cookies and the history every 2 months. • Avoid auto login saves time but your safety?
  • 13. iOS • iphone os - iOS • Developed based on unix • used by apple closed coded • Benefits of sandboxing • limitation slow roll out of features • Fast updates
  • 14. Android • Freedom • users mode • customise the appearance • easier access to the google services including the mail the contacts the calendar system • drawbacks too much resource allocation. • Hacking prone
  • 15. Windows Phone • Better than windows mobile • Fast growing • Benefits of the existing users • easier to learn for the majority of the users • hugely inspired the windows 8/8.1 and the windows 10
  • 16. • There are other Mobile OS available like ubuntu, sailfish, Tizen and many more. • But then why is it that they are not popular? • Not well developed App stores - the hardware companies want to go with the tried and tested • the os will require a specific hardware and • best is already used.
  • 18. – Fred Durst “If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.”
  • 19. Black Hat Hacker • Dont follow rules • Doesn't do hacking for approved reasons • Malicious codes / virus • Violates computer security
  • 20. White Hat Hackers • Computer Security • Improves Security and Services • Hacks with the permission of the user.
  • 21. Hactivists • The story of Anonymous • The NSA • The Digital Terrorism. • Does Good / Bad
  • 23. Virus • A program that can replicate by itself and can spread from one computer to another with out the input from the creator • Needs a host program • The purpose for the virus can be different or it can be used for any purpose eg kali linux payload management
  • 24. Computer Worms • It is similiar to virus and can replicate through network • It is a self sustaining program doesn't need to be attached with any of the programs • Common symptoms include overall sluggishness in the os and the slowness in the network due to increase bandwith consumption.
  • 25. Trojan Horse • One of the most irritating programs in the computer world. • Inspiration from the TROY story • Does something entirely different from what it is suppose to do tricks the user. Started as a greeting card virus. • Commonly used to hack and steal information from the users commonly used in keyloggers. Hence it is called social engineering toolkit.
  • 26. Types of hacking • Password cracking : it can be done in 2 ways through brute force or through dictionary guessing. • Packet sniffing : all information through the internet always passes through as packets and thus softwares like wireshark can sniff the packet data and hence get the information • Phishing : My most favourite method of hacking because requires very less work and then fool the customers into giving their information. CLONING the website.
  • 27. Types of Hacking • Rootkit: Software that can hid the unwanted process from seeing in the windows task manger. • Key loggers : if you have access to the computer installing a key loggers can provide all that is typed in that computer. taps in to the typing in the computer. • Scareware/ransomware: Commonly disguise as an antivirus making you pay for the security or for providing information. Credit card informations !!! • IP spoofing / MAC address cloning : use the id of some other person and avoid being detected in the hacked network to avoid the forensic detection.
  • 28. Free advice • Always protect your system with an antivirus !!!!!!! and keep it updated. • use cloud antivirus • never use a cracked system or a cracked antivirus. • it affects your motherboard and also your security.
  • 29. RECENT TRENDS IN THE TECHNOLOGICAL FIRMS
  • 30. Who wants 1 device ? • Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit and apple watch. • Google with chrome books chrome cast android and other services like the google glass and even internet itself- project loom android wear • Windows with laptops, phones,xbox surface tabs and surface TV and Zune players, Office. • All want not one device but your complete home and the complete ecosystem • the maximum effects come with the maximum devices
  • 33. Self driving cars of the future. - Benz
  • 34. • Wireless charging • Hands free control • 3D projectors • 3D Printers - Guess what chicken of the future will be printed. • Robotic skeletons for army. • Control the home from Anywhere in the world through Home kit. • Free and wireless payments through NFC.
  • 36. Finger Print Scanner • It is simple • uses a unique design • Much safer than the face recognition • Partial and complete recognition of the finger print • Safe place to store the data • Can carry along where ever you go • But not hack free • Sensors inaccurate to detect a finger or differentiate from an animal • Good for making authentication for the payments.
  • 37.
  • 38. USB Tokenisation • A single usb key • No passwords • Connect the USB • Incorruptible Data ROM storage. • Best used in offices, for authentication.
  • 39.
  • 40. iris recognition system. • the most secure in the world • error rate is high • requires very good sensors • Used for very high security measures in the military • mass usage still in testing • Checking for the possibilities for the daily usage. • inconvenient for almost daily usage.
  • 41.