SlideShare a Scribd company logo
1 of 25
 INTERNET SECURITY
 Professor name: Ing. Petr Banda, Ph.D,

 Maria Persenkiya
 Nastassia Makarava
OUTLINE:
 What is hacking?
 Who is a hacker and what do Hackers do ?
 Methods of Hacking
 Statistics/Examples of Attacks
 Types of viruses, malware, Trojan horses
 Measures for internet security
 Conclusion
HELLO! I AM A HACKER!
 Hacker - Person who gains
authorized/unauthorized access to a
computer WITHOUT seeming of causing
damage.
 Hacking is the gaining of access to a
computer and viewing, copying, or creating
data(leaving a trace) without the intention of
destroying data or maliciously harming the
computer.
WHAT DO HACKERS DO ?
 The passes the systems and Passwords.
Taking advantage of weaknesses left in the
system by developers. This person knows
computer programming and Access
confidential information to Broadcast
confidential documents.
e.g. Name, address, etc. Espionage
GROWING COMPLICATED THREATS
 “Love Letter” worm May 2000;
more than 650 individual sites indicating more than
500,000 individual systems are affected
 “SQL Slammer” worm January 2003
crashed the Internet and infected roughly “75,000
systems within 15 minutes” on all systems running
Microsoft Windows, considerable network degradation
huge amount of damages and clean up costs
METHODS OF HACKING
 Over the internet
 Over Lan
 Locally Offline
 Theft
 Deception
 Ip Addresses
 Telephone
 Email
TYPES OF HACKERS!
 Black Hat Hackers ( The bad guy Violates computers)
 White Hat Hackers (The Hero Breaks security for good reasons)
 Blue Hat Hacker (consults firms, system tested before launch)
 Grey Hacker(Mixture of white and Black offers their service to improve for a
small fee)
 Hacktivist (Utilizes Technology)
 Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature
 Elite Hacker (The most skilled Hacker)(Masters of deception)
 Ethical Hacker(employee and authorised Hacker)
 Bots ( software tools the hackers use )
BLACK HAT HACKER
 Malicious Hackers
 Villain
 Violates Computer Security
WHITE HAT HACKER
 Computer Security
 A Computer Hacker intending to improve
security.
 The Hero
TYPES OF HACKING.
 Password Cracking-Attempting to guess a password using a
program.
 Brute Forcing-A program that guesses a password by inputting
as many randomly generated passwords using the computer’s
processing power.
 Dictionary Hack- A program that guesses passwords based on
words in a dictionary or the program’s vocabulary.
 Packet Sniffing- Sniffing packets sent over the internet to gain
security details over unsecured connections.
 Phishing-Legitimate looking sites designed to farm information
inputted by the user.
WAYS OF HACKING!
 SQL INJECTION
 DDOS ATTACKS
 SOCIAL ENGINEERING
SQL INJECTION
 SQL injection is a type of attack often used
against data driven applications.
 It is a technique that exploits an applications
security weaknesses.
 Used to steal databases full of credit card
information, passwords, or personal details
DDOS ATTACKS
 Distributed Denial of Service.
 Used to make a machine or network
resource inaccessible to users.
 DDOS attacks usually utilise botnets.
SOCIAL ENGINEERING
 Social engineering is the art of manipulating
people into divulging personal and
confidential information.
 Requires very little technical skill. Relies
heavily on human interaction to get results.
 Most often used in tandem with other
exploits.
MALWARE AND VIRUSES
 Malicious Software.
 Used by an attacker to steal data, disrupt
operations or access a private network.
 Used to describe many different types of
software including viruses, worms, Trojans,
keyloggers, spyware and others.
COMPUTER VIRUSES
 Any computer program that can replicate
itself and spread from one computer to
another without input from its creator.
 Needs to attach itself to an existing program
in order for it to work.
 They are used to deliver many different
payloads.
COMPUTER WORM
 A program similar to a virus; it can replicate
itself and spread from one computer to another.
 Unlike a virus a worm does not need to be
attached to an existing program in order to
function.
 Always cause harm to the network, even if it is
just increased bandwidth consumption, where
as a virus will always corrupt and/or modify files
on a computer.
TROJAN HORSE
 A program that pretends to do one thing, but
in reality does something else.
 Used to record keystrokes input by a user
 Can be used to steal usernames, passwords,
credit card information, personal details and
soon.
 Usually employ a form of social engineering.
HOW TO PROTECT?
 Firewall
 Program used to monitor network traffic.
 Have a set of rules that they use to filter
packets trying to enter the network.
 Usually placed between a trusted network
andone that is less trusted.
ANTIVIRUS
 Used to prevent access to computer systems
by unwanted programs.
 Utilises many different methods to protect the
computer.
 Often search for signs of viruses on every
website that is visited and do regular scans
of the computer to check for infections.
HOW ANTIVIRUS WORKS?
 Scanning -- Allows user to analyze all the files one at a time and
to check them in order to see if they contain a virus.
 Real-time monitoring -- This antivirus feature is constantly active,
constantly monitoring to keep any suspect file at bay. Express
repair – Once it detects an infected virus, an antivirus will first
quarantine it in order to prevent it from multiplying .
 File scanning – scan all files on computer .
 Download scanning – scan all files that are being download form
a ftp site .Heuristic scanning – scan all usual files .Email scanning
– scan all received email
ANTIVIRUS SOFTWARES:
SKILLS TO PREVENT CYBERCRIME
 Spam blocker
 Anti Virus software
 Firewall protection
 Encryption software
 Caution in providing personal information
Secure Shopping
 Avoidance of scans
 Monitoring of your child’s computer activities
CONCLUSION
 Employ more skilled individuals
 Pros: Eliminates the need on relying on a small number of people
 Cons: Very costly
 Improve education on internet security and/or
lower costs for fees
 Job Awareness-people are not aware certain
jobs are available
 Higher starting wages to give potential
employees an incentive
Internet Security in Web 2.0

More Related Content

What's hot

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Internet security
Internet securityInternet security
Internet securityat1211
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 

What's hot (20)

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Malware
MalwareMalware
Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet security
Internet securityInternet security
Internet security
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Hacking
HackingHacking
Hacking
 
internet security
internet securityinternet security
internet security
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 

Viewers also liked

What's for Thanksgiving Dinner?
What's for Thanksgiving Dinner?What's for Thanksgiving Dinner?
What's for Thanksgiving Dinner?Nicole Monturo
 
Life elemetary unit 3 places
Life elemetary unit 3 placesLife elemetary unit 3 places
Life elemetary unit 3 placesMondher Chaaben
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboardCody Mims
 
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...luis Are
 
Was Pearl Harbour an Unprecedented Surprise Attack
Was Pearl Harbour an Unprecedented Surprise Attack Was Pearl Harbour an Unprecedented Surprise Attack
Was Pearl Harbour an Unprecedented Surprise Attack Peter Hammond
 

Viewers also liked (8)

What's for Thanksgiving Dinner?
What's for Thanksgiving Dinner?What's for Thanksgiving Dinner?
What's for Thanksgiving Dinner?
 
Life elemetary unit 3 places
Life elemetary unit 3 placesLife elemetary unit 3 places
Life elemetary unit 3 places
 
Albero1
Albero1Albero1
Albero1
 
Bandwagon billboard
Bandwagon billboardBandwagon billboard
Bandwagon billboard
 
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...
Quemado ST Johnson Instalacion 1000 HP CB High Pressure Boiler Retrofit Peten...
 
Boiler draught
Boiler draughtBoiler draught
Boiler draught
 
Was Pearl Harbour an Unprecedented Surprise Attack
Was Pearl Harbour an Unprecedented Surprise Attack Was Pearl Harbour an Unprecedented Surprise Attack
Was Pearl Harbour an Unprecedented Surprise Attack
 
Best Manual Shavers
Best Manual ShaversBest Manual Shavers
Best Manual Shavers
 

Similar to Internet Security in Web 2.0

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02sanjay kumar
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingzing12345
 

Similar to Internet Security in Web 2.0 (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security
Cyber security Cyber security
Cyber security
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Mitppt
MitpptMitppt
Mitppt
 

Recently uploaded

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 

Recently uploaded (20)

GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 

Internet Security in Web 2.0

  • 1.  INTERNET SECURITY  Professor name: Ing. Petr Banda, Ph.D,   Maria Persenkiya  Nastassia Makarava
  • 2. OUTLINE:  What is hacking?  Who is a hacker and what do Hackers do ?  Methods of Hacking  Statistics/Examples of Attacks  Types of viruses, malware, Trojan horses  Measures for internet security  Conclusion
  • 3. HELLO! I AM A HACKER!  Hacker - Person who gains authorized/unauthorized access to a computer WITHOUT seeming of causing damage.  Hacking is the gaining of access to a computer and viewing, copying, or creating data(leaving a trace) without the intention of destroying data or maliciously harming the computer.
  • 4. WHAT DO HACKERS DO ?  The passes the systems and Passwords. Taking advantage of weaknesses left in the system by developers. This person knows computer programming and Access confidential information to Broadcast confidential documents. e.g. Name, address, etc. Espionage
  • 5. GROWING COMPLICATED THREATS  “Love Letter” worm May 2000; more than 650 individual sites indicating more than 500,000 individual systems are affected  “SQL Slammer” worm January 2003 crashed the Internet and infected roughly “75,000 systems within 15 minutes” on all systems running Microsoft Windows, considerable network degradation huge amount of damages and clean up costs
  • 6. METHODS OF HACKING  Over the internet  Over Lan  Locally Offline  Theft  Deception  Ip Addresses  Telephone  Email
  • 7. TYPES OF HACKERS!  Black Hat Hackers ( The bad guy Violates computers)  White Hat Hackers (The Hero Breaks security for good reasons)  Blue Hat Hacker (consults firms, system tested before launch)  Grey Hacker(Mixture of white and Black offers their service to improve for a small fee)  Hacktivist (Utilizes Technology)  Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature  Elite Hacker (The most skilled Hacker)(Masters of deception)  Ethical Hacker(employee and authorised Hacker)  Bots ( software tools the hackers use )
  • 8. BLACK HAT HACKER  Malicious Hackers  Villain  Violates Computer Security
  • 9. WHITE HAT HACKER  Computer Security  A Computer Hacker intending to improve security.  The Hero
  • 10. TYPES OF HACKING.  Password Cracking-Attempting to guess a password using a program.  Brute Forcing-A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power.  Dictionary Hack- A program that guesses passwords based on words in a dictionary or the program’s vocabulary.  Packet Sniffing- Sniffing packets sent over the internet to gain security details over unsecured connections.  Phishing-Legitimate looking sites designed to farm information inputted by the user.
  • 11. WAYS OF HACKING!  SQL INJECTION  DDOS ATTACKS  SOCIAL ENGINEERING
  • 12. SQL INJECTION  SQL injection is a type of attack often used against data driven applications.  It is a technique that exploits an applications security weaknesses.  Used to steal databases full of credit card information, passwords, or personal details
  • 13. DDOS ATTACKS  Distributed Denial of Service.  Used to make a machine or network resource inaccessible to users.  DDOS attacks usually utilise botnets.
  • 14. SOCIAL ENGINEERING  Social engineering is the art of manipulating people into divulging personal and confidential information.  Requires very little technical skill. Relies heavily on human interaction to get results.  Most often used in tandem with other exploits.
  • 15. MALWARE AND VIRUSES  Malicious Software.  Used by an attacker to steal data, disrupt operations or access a private network.  Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.
  • 16. COMPUTER VIRUSES  Any computer program that can replicate itself and spread from one computer to another without input from its creator.  Needs to attach itself to an existing program in order for it to work.  They are used to deliver many different payloads.
  • 17. COMPUTER WORM  A program similar to a virus; it can replicate itself and spread from one computer to another.  Unlike a virus a worm does not need to be attached to an existing program in order to function.  Always cause harm to the network, even if it is just increased bandwidth consumption, where as a virus will always corrupt and/or modify files on a computer.
  • 18. TROJAN HORSE  A program that pretends to do one thing, but in reality does something else.  Used to record keystrokes input by a user  Can be used to steal usernames, passwords, credit card information, personal details and soon.  Usually employ a form of social engineering.
  • 19. HOW TO PROTECT?  Firewall  Program used to monitor network traffic.  Have a set of rules that they use to filter packets trying to enter the network.  Usually placed between a trusted network andone that is less trusted.
  • 20. ANTIVIRUS  Used to prevent access to computer systems by unwanted programs.  Utilises many different methods to protect the computer.  Often search for signs of viruses on every website that is visited and do regular scans of the computer to check for infections.
  • 21. HOW ANTIVIRUS WORKS?  Scanning -- Allows user to analyze all the files one at a time and to check them in order to see if they contain a virus.  Real-time monitoring -- This antivirus feature is constantly active, constantly monitoring to keep any suspect file at bay. Express repair – Once it detects an infected virus, an antivirus will first quarantine it in order to prevent it from multiplying .  File scanning – scan all files on computer .  Download scanning – scan all files that are being download form a ftp site .Heuristic scanning – scan all usual files .Email scanning – scan all received email
  • 23. SKILLS TO PREVENT CYBERCRIME  Spam blocker  Anti Virus software  Firewall protection  Encryption software  Caution in providing personal information Secure Shopping  Avoidance of scans  Monitoring of your child’s computer activities
  • 24. CONCLUSION  Employ more skilled individuals  Pros: Eliminates the need on relying on a small number of people  Cons: Very costly  Improve education on internet security and/or lower costs for fees  Job Awareness-people are not aware certain jobs are available  Higher starting wages to give potential employees an incentive