SlideShare a Scribd company logo
1 of 21
Download to read offline
INTRUSION
By Eduardo Cambinda 2007
Introduction
• Intrusion is someone who goes into a place or
situation where he is not expected to be, in
simple words is someone unwanted: someone
is in not invited to partying but apear in party
Intrusion in Computing
• In this century computer is used everywhere in
our life, for writing, chatting, partying, selfing,
working etc. and attacks are more sophisticated
everywhere to collect data or just to intrude in
corporate Networks, to exploit weaknesses into
the Network system like websites, e-mail, and
with app that can run any system anytime
anywhere.
Data Security
• Data Security is Related to protect digital privacy
to prevent unauthorised access to computers,
database, websites, data corruption etc. Thera
are many securities policies established on
needed level, some organisation like ISO that
ensuring that information is accessed only to
those authorised to have access.
Data Security
• This graphic represent a communication process from
source to destination without any attacks, I will share the
four types of Attacks in this presentation: Interruption;
Interception; Modification and fabrication. All attacks
depend how quickly you can run, if you can run in 120mbps
than you are basically fit, if u can run as an intrusion more
than that so you are luck.
Source Destination
DATA SECURITY
Interruption
• Interruption is a state where the access be
unavailable or get destroyed, like you wanna
travel you have your tickets booked but you
reach the airport there is no plane to travel
basically that, cutting the signal.
source DESTINATION
Data Security
Modification
SOURCE
DESTINATION
DATA SECURITY
MODIFICATION
• In Modification information is intercepted and
modified by an unauthorised party while in
transit from the source to the destination
DATA SECURITY
FABRICATION
SOURCE DESTINATION
Data Security
Fabrication
• Fabrication is process of inventing something , it occur when an attackers
inserts into the systems without the sender’s involvement there are two
categories of fabrication Replaying and Masquerading
• Replaying is intercept the message insert new style and authenticate it
• Masquerading when an attacker clam to be legitimate source or owner adding
new records to information
Data Security
• In data security there are some aspects we should
take care of proprieties:
• Confidentiality
• Integrity
• Availability
• Authentication
• Non-repudiation
Data security
• Confidentiality is keeping data private or secret, that only
accessible to the authorised Dudes, like the source, destination,
timing of the communication and data.
• Integrity is the quality of data, it can't be altered or destroyed by
an unauthorised Dude, it is a security principle that protects
information from being modified.
• Availability is the way the data is able to used or obtained.
• Authentication is the security measured or a process to prove
that something is true.
• Non-Repudiation is the assurance that a contract you sign cant
be denied by any of the parts involved
SECURITY MECHANISM
• We discussed about security Proprieties core of
quality for any data system, various securities
tools and mechanism can be used to force the
securities proprieties are:
• Attack Prevention
• Attack Avoidance
• Attack Detection
SECURITY MECHANISM
Attack Prevention
• Attack Prevention, a cyber attack is an attack made from one computer to
another targeting information stored in it, is a part of cyber crime, Attack
prevention can be defined as a series of securities mechanisms implemented to
prevent or defend against various kid of attack before they occurs to affect the
target systems, access control includes authentication, authorisation and audit
• Attack Avoidance is the way in which information is modified in the way that
make unusable of the attack, cryptography is one of the technology used in
attack avoidance SKC, PKC. HC
• Attack Detection is the assume that the attacker is able to bypass the installed
security system to find the target desire. That something went wrong and
identify the problem
• Intrusion Detection is the way you located a dude having a fun in your system
creating malicious some tools to detect and report malicious in your network
system
ATTACK
• An Attack The way computer security tools is
challenged creating a negative impact in
information system.
Attack
treat
Target
VULNERABILITY
ATTACK MODELS
• There are many models but some Dudes they
divide it in two:
• Traditional Attack model: one-to-one attack
model, one-to-many attack model.
• Distributed Attack Model: many-to-one attack
model, many-to-many attack model
ATTACK MODEL
• Traditional Attack model is originates from a
single point, it is a single architecture there is a
single layer between target and attacker.
• One-To-One Attack model is like a single
relationship from attacker to target from a single
machine
• One-to-Many it is relation is from one to many
Attack Target
Attack Models
• It originate from a single machine to more than one target
• Distributed Attack models this is based on many to one
and many to many relationship, its originated from
intermediate that are compromised by attacker
• Many-to-one the attacker and target have many to one
relationship, many dude contacted to attack one target
• Many-to-Many the attacker and target have many to many
relationship, the attacker use many host for his duties,
the attacker compromise the system installing backdoor
and tools for his fun
IDS AND IPS
• IDS stand for interaction detection System are
software and hardware based system that detect
intrusion to network-based intrusion
detection(NIDS), host-based intrusion detection
System(HIDS), Hybrid Intrusion detection
system(HIDS) on a number of telltale sign
• IPS intrusion prevention system, all corporate are
protected by firewall those firewall allow some
traffic like web traffic to an internal web server
TYPES OF COMPUTER
INTRUSION
• INTRUDERS
• BLACK HAT HACKER
• HACKER SPIES SUPPORTED BY GOVERNMENT
• CYBERTERRORISTS
• CORPORATED SPIES
• PROFISSIONALS CRIMINALS
• VANDALS
• ETC….
QUICK BYTE
• bit defender process…..
• analyser Linux based bits
• tcp run
• bits defects intruders

More Related Content

What's hot (20)

Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Security threats
Security threatsSecurity threats
Security threats
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Database security
Database securityDatabase security
Database security
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 

Viewers also liked

Top Companies for Graduates to Work For - 2015-16
Top Companies for Graduates to Work For - 2015-16Top Companies for Graduates to Work For - 2015-16
Top Companies for Graduates to Work For - 2015-16Hazel Morton
 
Think kidneys in primary and secondary care
Think kidneys in primary and secondary careThink kidneys in primary and secondary care
Think kidneys in primary and secondary careRenal Association
 
Deporte, ejercicio y estilos de vida
Deporte, ejercicio y estilos de vidaDeporte, ejercicio y estilos de vida
Deporte, ejercicio y estilos de vidaGabrielcano92
 
Network Security July 1
Network Security July 1Network Security July 1
Network Security July 1Jd Mercado
 
Open Source Software Concepts
Open Source Software ConceptsOpen Source Software Concepts
Open Source Software ConceptsJITENDRA LENKA
 
Collapse of angolan banking system copy
Collapse of angolan banking system copyCollapse of angolan banking system copy
Collapse of angolan banking system copyEduardo Cambinda
 
Yii Framework Security
Yii Framework SecurityYii Framework Security
Yii Framework SecurityIlko Kacharov
 
Informatics Practices Chapter 2 Open Source Software Concepts Class 12th
 Informatics Practices Chapter 2  Open Source Software Concepts Class 12th Informatics Practices Chapter 2  Open Source Software Concepts Class 12th
Informatics Practices Chapter 2 Open Source Software Concepts Class 12thHarsh Mathur
 
K-Sheldon-WA_text.Doc
K-Sheldon-WA_text.DocK-Sheldon-WA_text.Doc
K-Sheldon-WA_text.DocKonie Sheldon
 

Viewers also liked (20)

Teaching Statistics Without Mathematics An Innovation Approach to Public Adm...
Teaching  Statistics Without Mathematics An Innovation Approach to Public Adm...Teaching  Statistics Without Mathematics An Innovation Approach to Public Adm...
Teaching Statistics Without Mathematics An Innovation Approach to Public Adm...
 
Big data
Big dataBig data
Big data
 
Top Companies for Graduates to Work For - 2015-16
Top Companies for Graduates to Work For - 2015-16Top Companies for Graduates to Work For - 2015-16
Top Companies for Graduates to Work For - 2015-16
 
Think kidneys in primary and secondary care
Think kidneys in primary and secondary careThink kidneys in primary and secondary care
Think kidneys in primary and secondary care
 
Table s1
Table s1 Table s1
Table s1
 
slideshare y sildeboom
slideshare y sildeboom slideshare y sildeboom
slideshare y sildeboom
 
Articles en mathematics_5
Articles en mathematics_5Articles en mathematics_5
Articles en mathematics_5
 
Articles en silent way_5
Articles en silent way_5Articles en silent way_5
Articles en silent way_5
 
Deporte, ejercicio y estilos de vida
Deporte, ejercicio y estilos de vidaDeporte, ejercicio y estilos de vida
Deporte, ejercicio y estilos de vida
 
Proceedings boston 2013
Proceedings boston 2013Proceedings boston 2013
Proceedings boston 2013
 
RSM AKI September 2015
RSM AKI September 2015RSM AKI September 2015
RSM AKI September 2015
 
News SA 10 2017
News SA 10 2017News SA 10 2017
News SA 10 2017
 
Network Security July 1
Network Security July 1Network Security July 1
Network Security July 1
 
Open Source Software Concepts
Open Source Software ConceptsOpen Source Software Concepts
Open Source Software Concepts
 
Collapse of angolan banking system copy
Collapse of angolan banking system copyCollapse of angolan banking system copy
Collapse of angolan banking system copy
 
Cyberpunk
CyberpunkCyberpunk
Cyberpunk
 
Yii Framework Security
Yii Framework SecurityYii Framework Security
Yii Framework Security
 
Informatics Practices Chapter 2 Open Source Software Concepts Class 12th
 Informatics Practices Chapter 2  Open Source Software Concepts Class 12th Informatics Practices Chapter 2  Open Source Software Concepts Class 12th
Informatics Practices Chapter 2 Open Source Software Concepts Class 12th
 
K-Sheldon-WA_text.Doc
K-Sheldon-WA_text.DocK-Sheldon-WA_text.Doc
K-Sheldon-WA_text.Doc
 
CyberPunk
CyberPunkCyberPunk
CyberPunk
 

Similar to Intrusion in computing

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 

Similar to Intrusion in computing (20)

Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 

More from Eduardo Cambinda

More from Eduardo Cambinda (7)

How to check out your paper
How to check out your paperHow to check out your paper
How to check out your paper
 
Proposta:resumo para o ministerio da industria
Proposta:resumo para  o ministerio da industriaProposta:resumo para  o ministerio da industria
Proposta:resumo para o ministerio da industria
 
Social Media
Social MediaSocial Media
Social Media
 
Internship report copy
Internship report copyInternship report copy
Internship report copy
 
Social media copy
Social media copySocial media copy
Social media copy
 
Network client configuration
Network client configurationNetwork client configuration
Network client configuration
 
CASE STUDY
CASE STUDY CASE STUDY
CASE STUDY
 

Recently uploaded

Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Intrusion in computing

  • 2. Introduction • Intrusion is someone who goes into a place or situation where he is not expected to be, in simple words is someone unwanted: someone is in not invited to partying but apear in party
  • 3. Intrusion in Computing • In this century computer is used everywhere in our life, for writing, chatting, partying, selfing, working etc. and attacks are more sophisticated everywhere to collect data or just to intrude in corporate Networks, to exploit weaknesses into the Network system like websites, e-mail, and with app that can run any system anytime anywhere.
  • 4. Data Security • Data Security is Related to protect digital privacy to prevent unauthorised access to computers, database, websites, data corruption etc. Thera are many securities policies established on needed level, some organisation like ISO that ensuring that information is accessed only to those authorised to have access.
  • 5. Data Security • This graphic represent a communication process from source to destination without any attacks, I will share the four types of Attacks in this presentation: Interruption; Interception; Modification and fabrication. All attacks depend how quickly you can run, if you can run in 120mbps than you are basically fit, if u can run as an intrusion more than that so you are luck. Source Destination
  • 6. DATA SECURITY Interruption • Interruption is a state where the access be unavailable or get destroyed, like you wanna travel you have your tickets booked but you reach the airport there is no plane to travel basically that, cutting the signal. source DESTINATION
  • 8. DATA SECURITY MODIFICATION • In Modification information is intercepted and modified by an unauthorised party while in transit from the source to the destination
  • 10. Data Security Fabrication • Fabrication is process of inventing something , it occur when an attackers inserts into the systems without the sender’s involvement there are two categories of fabrication Replaying and Masquerading • Replaying is intercept the message insert new style and authenticate it • Masquerading when an attacker clam to be legitimate source or owner adding new records to information
  • 11. Data Security • In data security there are some aspects we should take care of proprieties: • Confidentiality • Integrity • Availability • Authentication • Non-repudiation
  • 12. Data security • Confidentiality is keeping data private or secret, that only accessible to the authorised Dudes, like the source, destination, timing of the communication and data. • Integrity is the quality of data, it can't be altered or destroyed by an unauthorised Dude, it is a security principle that protects information from being modified. • Availability is the way the data is able to used or obtained. • Authentication is the security measured or a process to prove that something is true. • Non-Repudiation is the assurance that a contract you sign cant be denied by any of the parts involved
  • 13. SECURITY MECHANISM • We discussed about security Proprieties core of quality for any data system, various securities tools and mechanism can be used to force the securities proprieties are: • Attack Prevention • Attack Avoidance • Attack Detection
  • 14. SECURITY MECHANISM Attack Prevention • Attack Prevention, a cyber attack is an attack made from one computer to another targeting information stored in it, is a part of cyber crime, Attack prevention can be defined as a series of securities mechanisms implemented to prevent or defend against various kid of attack before they occurs to affect the target systems, access control includes authentication, authorisation and audit • Attack Avoidance is the way in which information is modified in the way that make unusable of the attack, cryptography is one of the technology used in attack avoidance SKC, PKC. HC • Attack Detection is the assume that the attacker is able to bypass the installed security system to find the target desire. That something went wrong and identify the problem • Intrusion Detection is the way you located a dude having a fun in your system creating malicious some tools to detect and report malicious in your network system
  • 15. ATTACK • An Attack The way computer security tools is challenged creating a negative impact in information system. Attack treat Target VULNERABILITY
  • 16. ATTACK MODELS • There are many models but some Dudes they divide it in two: • Traditional Attack model: one-to-one attack model, one-to-many attack model. • Distributed Attack Model: many-to-one attack model, many-to-many attack model
  • 17. ATTACK MODEL • Traditional Attack model is originates from a single point, it is a single architecture there is a single layer between target and attacker. • One-To-One Attack model is like a single relationship from attacker to target from a single machine • One-to-Many it is relation is from one to many Attack Target
  • 18. Attack Models • It originate from a single machine to more than one target • Distributed Attack models this is based on many to one and many to many relationship, its originated from intermediate that are compromised by attacker • Many-to-one the attacker and target have many to one relationship, many dude contacted to attack one target • Many-to-Many the attacker and target have many to many relationship, the attacker use many host for his duties, the attacker compromise the system installing backdoor and tools for his fun
  • 19. IDS AND IPS • IDS stand for interaction detection System are software and hardware based system that detect intrusion to network-based intrusion detection(NIDS), host-based intrusion detection System(HIDS), Hybrid Intrusion detection system(HIDS) on a number of telltale sign • IPS intrusion prevention system, all corporate are protected by firewall those firewall allow some traffic like web traffic to an internal web server
  • 20. TYPES OF COMPUTER INTRUSION • INTRUDERS • BLACK HAT HACKER • HACKER SPIES SUPPORTED BY GOVERNMENT • CYBERTERRORISTS • CORPORATED SPIES • PROFISSIONALS CRIMINALS • VANDALS • ETC….
  • 21. QUICK BYTE • bit defender process….. • analyser Linux based bits • tcp run • bits defects intruders