SlideShare a Scribd company logo
Web Security
Website: www.snipercorporation.com
What is web security?
Web Security, also known as “Cyber security”
involves protecting that information by
preventing, detecting, and responding to
attacks.
Website: www.snipercorporation.com
Web Security: Terminologies
• Hacker – people who seek to exploit
weaknesses in software and computer
systems for their own gain.
• Viruses - A piece of code has a detrimental
effect, such as corrupting the system or
destroying data.
Website: www.snipercorporation.com
Web Security: Terminologies
• Worms - Worms propagate without user
intervention. Once the victim computer has
been infected the worm will attempt to find
and infect other computers.
• Trojan horses - A Trojan horse program is
software that claims to be one thing while in
fact doing something different behind the
scenes.
Website: www.snipercorporation.com
Web Security: Terminologies
Ransomware
• A form of trojan that has been around since 1989 (as
the “PC CYBORG” trojan)
• It infects the target computer by encrypting the
owner's personal files.
• The victim is then contacted and offered a key to
decrypt the files in exchange for cash
Website: www.snipercorporation.com
Web Security: Terminologies
Firewalls:
Mechanism for content regulation and data filtering
• Blocking unwanted traffic from entering the sub-
network (inbound)
• Preventing subnet users' use of unauthorised
material/sites (outbound)
Website:: www.snipercorporation.com
Web Security Issues
• Malicious websites
• Email Viruses
• Phishing
• DDOS
Website: www.snipercorporation.com
Malicious websites
• Malicious Websites are those which contains Malwares, viruses, trojans
etc. and effects your System.
• More than 3 million Web pages on the Internet are malicious.
• According to Google, the percent is one in 1,000.
• The experts call these attacks "drive-by downloads"
Malicious websites
China - 67%
US - 15%
Russia - 4%
Malaysia - 2.2%
Korea - 2%
Website: www.snipercorporation.com
Malicious websites
Preventive measures
- Use latest browser software
- Internet Explorer version 9+
- Mozilla Firefox
- Opera
Internet Explorer 6 is the most vulnerable as well as
the most widely used browser.
It is highly recommended to upgrade from IE 6
Website: www.snipercorporation.com
Email Viruses
It is unsolicited e-mail on the Internet.
A virus that comes within an attached file
in an e-mail message. When that file is
opened, the virus does its damage.
Macro viruses can come in Microsoft
Word documents that are sent as e-
mail attachments.
Website: www.snipercorporation.com
Email Viruses
• It has the ability to scan the complete
address book in the email client program
and it is regular problem of outlook users.
• Once the virus enters your system, it
starts sending out emails to your friends
and colleagues or to the random list of
recipients and forward the same virus.
• Such emails are better known as No-reply
emails which pass a message where you
cannot send the message back to them.
Website: www.snipercorporation.com
Email Viruses
- Corporate employees are
reported to accrue a loss of
productivity of 3.1%. - Nucleus
Research Analysis
- To increase the effectiveness
of SPAM detection, always
report any SPAM mail to your
SPAM filter.
Website: www.snipercorporation.com
Phishing
This is a method of luring an unsuspecting user
into giving out their username and password
for a secure web resource, usually a bank,
credit card account, login information etc.
Website: www.snipercorporation.com
Phishing
• Usually achieved by creating a website identical to the secure
site
• User is sent email requesting them to log in, and providing a
link to the bogus site
• When user logs in, password is stored and used to access the
account by the attacker
• Difficult to guard against, particularly if using HTML email
Website: www.snipercorporation.com
Phishing
Phishing Email sample:
Subject: Verify your E-mail with Citibank
This email was sent by the Citibank server to verify your E-mail
address. You must complete this process by clicking on the link
below and entering in the small window your Citibank ATM/Debit
Card number and PIN that you use on ATM.
This is done for your protection - because some of our members
no longer have access to their email addresses and we must
verify it.
To verify your E-mail address and access your bank account,
click on the link below:
https://web.da-us.citibank.com/signin/citifi/scripts/email_verify.jsp
Thank you for using Citibank
Website: www.snipercorporation.com
Phishing
The link uses an anchor text, and the actual
website opens as,
http://citibusinessonline.da.us.citibank.com.citionline.ru/...
Instead of,
http://www.citibank.com/us/index.htm
Phishing
Landing Page
Website: www.snipercorporation.com
Phishing
- Unwitting users submit the data, and the data
is captured by scammers and all the money in
their account will be stolen immediately.
- This method is the main reason for loss of
email passwords also.
Website: www.snipercorporation.com
Denial of Service
It is an attack to make a computer resource
unavailable to its intended users.
Resources:
- Bandwidth & CPU
Website: www.snipercorporation.com
How it Works?
• One way to attack a company’s network or
website is to flood its systems with
information.
• Web and e-mail servers can only handle a
finite amount of traffic and an attacker
overloads the targeted system with packets of
data.
Website: www.snipercorporation.com
How to prevent?
• Simple special-purpose high-speed
firewalls being deployed in the core of
the Internet at inter-domain boundaries
to serve as a filter of sorts
• Gives Upstream access control to a server
under stress
Middle wall or Firewall
Website: www.snipercorporation.com
Take Action
If everyone keep their systems secure, such
threats can never happen.
Small gestures can avoid gigantic problems in
our context.
Website: www.snipercorporation.com
Action Plan
• Use Anti-virus
• Use Anti-Spyware
• Use Total Security Software
• Be aware not to fall for scams and phishing
attacks
• Report SPAM
Website: www.snipercorporation.com
Thank You
Website: www.snipercorporation.com

More Related Content

What's hot

Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Web security
Web securityWeb security
Web security
Jatin Grover
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Web security
Web securityWeb security
Web security
Subhash Basistha
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Intellipaat
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
Sajid Hasan
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 

What's hot (20)

Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Web security
Web securityWeb security
Web security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Web security
Web securityWeb security
Web security
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Network security
Network securityNetwork security
Network security
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Similar to Web security ppt sniper corporation

Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
LucaMartins7
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
Denise Bailey
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 

Similar to Web security ppt sniper corporation (20)

Web Security
Web SecurityWeb Security
Web Security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Recently uploaded

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 

Recently uploaded (20)

Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 

Web security ppt sniper corporation

  • 2. What is web security? Web Security, also known as “Cyber security” involves protecting that information by preventing, detecting, and responding to attacks. Website: www.snipercorporation.com
  • 3. Web Security: Terminologies • Hacker – people who seek to exploit weaknesses in software and computer systems for their own gain. • Viruses - A piece of code has a detrimental effect, such as corrupting the system or destroying data. Website: www.snipercorporation.com
  • 4. Web Security: Terminologies • Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers. • Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. Website: www.snipercorporation.com
  • 5. Web Security: Terminologies Ransomware • A form of trojan that has been around since 1989 (as the “PC CYBORG” trojan) • It infects the target computer by encrypting the owner's personal files. • The victim is then contacted and offered a key to decrypt the files in exchange for cash Website: www.snipercorporation.com
  • 6. Web Security: Terminologies Firewalls: Mechanism for content regulation and data filtering • Blocking unwanted traffic from entering the sub- network (inbound) • Preventing subnet users' use of unauthorised material/sites (outbound) Website:: www.snipercorporation.com
  • 7. Web Security Issues • Malicious websites • Email Viruses • Phishing • DDOS Website: www.snipercorporation.com
  • 8. Malicious websites • Malicious Websites are those which contains Malwares, viruses, trojans etc. and effects your System. • More than 3 million Web pages on the Internet are malicious. • According to Google, the percent is one in 1,000. • The experts call these attacks "drive-by downloads" Malicious websites China - 67% US - 15% Russia - 4% Malaysia - 2.2% Korea - 2% Website: www.snipercorporation.com
  • 9. Malicious websites Preventive measures - Use latest browser software - Internet Explorer version 9+ - Mozilla Firefox - Opera Internet Explorer 6 is the most vulnerable as well as the most widely used browser. It is highly recommended to upgrade from IE 6 Website: www.snipercorporation.com
  • 10. Email Viruses It is unsolicited e-mail on the Internet. A virus that comes within an attached file in an e-mail message. When that file is opened, the virus does its damage. Macro viruses can come in Microsoft Word documents that are sent as e- mail attachments. Website: www.snipercorporation.com
  • 11. Email Viruses • It has the ability to scan the complete address book in the email client program and it is regular problem of outlook users. • Once the virus enters your system, it starts sending out emails to your friends and colleagues or to the random list of recipients and forward the same virus. • Such emails are better known as No-reply emails which pass a message where you cannot send the message back to them. Website: www.snipercorporation.com
  • 12. Email Viruses - Corporate employees are reported to accrue a loss of productivity of 3.1%. - Nucleus Research Analysis - To increase the effectiveness of SPAM detection, always report any SPAM mail to your SPAM filter. Website: www.snipercorporation.com
  • 13. Phishing This is a method of luring an unsuspecting user into giving out their username and password for a secure web resource, usually a bank, credit card account, login information etc. Website: www.snipercorporation.com
  • 14. Phishing • Usually achieved by creating a website identical to the secure site • User is sent email requesting them to log in, and providing a link to the bogus site • When user logs in, password is stored and used to access the account by the attacker • Difficult to guard against, particularly if using HTML email Website: www.snipercorporation.com
  • 15. Phishing Phishing Email sample: Subject: Verify your E-mail with Citibank This email was sent by the Citibank server to verify your E-mail address. You must complete this process by clicking on the link below and entering in the small window your Citibank ATM/Debit Card number and PIN that you use on ATM. This is done for your protection - because some of our members no longer have access to their email addresses and we must verify it. To verify your E-mail address and access your bank account, click on the link below: https://web.da-us.citibank.com/signin/citifi/scripts/email_verify.jsp Thank you for using Citibank Website: www.snipercorporation.com
  • 16. Phishing The link uses an anchor text, and the actual website opens as, http://citibusinessonline.da.us.citibank.com.citionline.ru/... Instead of, http://www.citibank.com/us/index.htm
  • 18. Phishing - Unwitting users submit the data, and the data is captured by scammers and all the money in their account will be stolen immediately. - This method is the main reason for loss of email passwords also. Website: www.snipercorporation.com
  • 19. Denial of Service It is an attack to make a computer resource unavailable to its intended users. Resources: - Bandwidth & CPU Website: www.snipercorporation.com
  • 20. How it Works? • One way to attack a company’s network or website is to flood its systems with information. • Web and e-mail servers can only handle a finite amount of traffic and an attacker overloads the targeted system with packets of data. Website: www.snipercorporation.com
  • 21. How to prevent? • Simple special-purpose high-speed firewalls being deployed in the core of the Internet at inter-domain boundaries to serve as a filter of sorts • Gives Upstream access control to a server under stress Middle wall or Firewall Website: www.snipercorporation.com
  • 22. Take Action If everyone keep their systems secure, such threats can never happen. Small gestures can avoid gigantic problems in our context. Website: www.snipercorporation.com
  • 23. Action Plan • Use Anti-virus • Use Anti-Spyware • Use Total Security Software • Be aware not to fall for scams and phishing attacks • Report SPAM Website: www.snipercorporation.com