SlideShare une entreprise Scribd logo
1  sur  18
--By Anindya Roy Sr. Manager – Tech Research CyberMedia Labs Are you Secure?
Hack A Hack is usually a technique used to subvert, misuse or cleverly change a program, gadget or mechanism in such a way as to change, or add to, its functionality. Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; or a modification of a program or device to give the user access to features that were otherwise unavailable to them. From Wikipedia
Hacking	 Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network
Agenda DDoS Sniffing Spoofing Phishing/Spamming  Brute-force/Dictionary Attacks Physical Security
DDoS A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the intensive, malicious efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
Sniffing Promiscuous Sniffing: An Ethernet sniffer or wireless sniffer is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.
How Sniffing works
How Sniffing works
Spoofing Monkey in the Middle: is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims.
How Spoofing works Mac 3 Switch Switches IP-ARP Cache Table Mac1: 192.168.0.1 -- 00:00:00:00:00:11 Mac2: 192.168.0.2 -- 00:00:00:00:00:22 Mac3: 192.168.0.3 -- 00:00:00:00:00:33 Mac 1 Mac 2
How Spoofing works Mac 3 Switch Switches IP-ARP Cache Table Mac1: 192.168.0.1 -- 00:00:00:00:00:11 Mac2: 192.168.0.2 -- 00:00:00:00:00:33 Mac3: 192.168.0.3 -- 00:00:00:00:00:22 Mac 1 Mac 2
Phishing The human Flaw: In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging
I Am the next MS CIO! AM I? 
Physical Security
Physical Security
Questions
Thanks anindyar@cybermedia.co.in anindyar.roy@gmail.com Skype: anindyaroy29 Ph: 9811565558

Contenu connexe

Tendances

Tendances (17)

Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
45
4545
45
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
 
Hacking
Hacking Hacking
Hacking
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Activity visibility
Activity visibilityActivity visibility
Activity visibility
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network security
 Network security Network security
Network security
 
Footprinting
FootprintingFootprinting
Footprinting
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Network security
Network securityNetwork security
Network security
 
Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)Unauthorized access, Men in the Middle (MITM)
Unauthorized access, Men in the Middle (MITM)
 
Paper1
Paper1Paper1
Paper1
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Honeypot
HoneypotHoneypot
Honeypot
 

Similaire à Are you Secure

Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)Wail Hassan
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicJulia Yu-Chin Cheng
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackGavin Davey
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 

Similaire à Are you Secure (20)

Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for public
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 

Are you Secure

  • 1. --By Anindya Roy Sr. Manager – Tech Research CyberMedia Labs Are you Secure?
  • 2. Hack A Hack is usually a technique used to subvert, misuse or cleverly change a program, gadget or mechanism in such a way as to change, or add to, its functionality. Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; or a modification of a program or device to give the user access to features that were otherwise unavailable to them. From Wikipedia
  • 3. Hacking Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network
  • 4. Agenda DDoS Sniffing Spoofing Phishing/Spamming Brute-force/Dictionary Attacks Physical Security
  • 5. DDoS A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the intensive, malicious efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.
  • 6.
  • 7. Sniffing Promiscuous Sniffing: An Ethernet sniffer or wireless sniffer is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.
  • 10. Spoofing Monkey in the Middle: is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims.
  • 11. How Spoofing works Mac 3 Switch Switches IP-ARP Cache Table Mac1: 192.168.0.1 -- 00:00:00:00:00:11 Mac2: 192.168.0.2 -- 00:00:00:00:00:22 Mac3: 192.168.0.3 -- 00:00:00:00:00:33 Mac 1 Mac 2
  • 12. How Spoofing works Mac 3 Switch Switches IP-ARP Cache Table Mac1: 192.168.0.1 -- 00:00:00:00:00:11 Mac2: 192.168.0.2 -- 00:00:00:00:00:33 Mac3: 192.168.0.3 -- 00:00:00:00:00:22 Mac 1 Mac 2
  • 13. Phishing The human Flaw: In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging
  • 14. I Am the next MS CIO! AM I? 
  • 18. Thanks anindyar@cybermedia.co.in anindyar.roy@gmail.com Skype: anindyaroy29 Ph: 9811565558