SlideShare une entreprise Scribd logo
1  sur  27
By Arifa Ali, Hannah Buckley, Paul Byrne and Matthew Hastie
 Ethical Hacking & Black Hat Hacking
 Types of Hacking/Data Theft
 Statistics/Examples of Attacks
 Skills Required to Prevent Attacks
 Measures to Prevent Attacks
 Brief History
 Who is a hacker and what do Hackers do ?
 Hackers Techniques
 System Hacking, Network Hacking, Software Hacking
 Someone who bypasses the systems and Passwords.
 Taking advantage of weaknesses left in the system by
    developers.
   This person knows computer programming
   Can be a Hacker Subculture
   Access confidential information
   Broadcast confidential documents e.g.
    Name, address, etc.
   Espionage
 Over the internet
 Over Lan
 Locally
 Offline
 Theft
 Deception
 Ip Addresses
 Telephone
 Email
 Malicious Hackers


 Villain


 Violates Computer Security
 Computer Security


 A Computer Hacker intending to improve security.


 The Hero
 Black Hat Hackers ( The bad guy Violates computers)

 White Hat Hackers (The Hero Breaks security for good reasons)

 Blue Hat Hacker (consults firms, system tested before launch)

 Grey Hacker(Mixture of white & Black offers their service to
  improve for a small fee)

 Hacktivist (Utilizes Technology)

 Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature

 Elite Hacker (The most skilled Hacker)(Masters of deception)

 Ethical Hacker(employee and authorised Hacker)

 Bots ( software tools the hackers use )
SQL Injection
•SQL injection is a type of attack often used
against data driven applications.
•It is a technique that exploits an applications
security weaknesses.
•Used to steal databases full of credit card
information, passwords, or personal details.
DDOS Attacks
•Distributed Denial of Service.
•Used to make a machine or network resource
inaccessible to users.
•DDOS attacks usually utilise botnets.
Social Engineering
•Social engineering is the art of manipulating
people into divulging personal and confidential
information.
•Requires very little technical skill.
•Relies heavily on human interaction to get
results.
•Most often used in tandem with other exploits.
Malware and Viruses
•Malicious Software.
•Used by an attacker to steal data, disrupt
operations or access a private network.
•Used to describe many different types of
software including
viruses, worms, Trojans, keyloggers, spyware
and others.
Computer Virus
•Any computer program that can replicate itself
and spread from one computer to another
without input from its creator.
•Needs to attach itself to an existing program in
order for it to work.
•They are used to deliver many different
payloads.
Computer Worm
•A program similar to a virus; it can replicate
itself and spread from one computer to another.
•Unlike a virus a worm does not need to be
attached to an existing program in order to
function.
•Always cause harm to the network, even if it is
just increased bandwidth consumption, whereas
a virus will always corrupt and/or modify files on
a computer.
Trojan Horse
•A program that pretends to do one thing, but in
reality does something else.
•Used to record keystrokes input by a user
•Can be used to steal
usernames, passwords, credit card
information, personal details and so on.
•Usually employ a form of social engineering.
Firewalls
•Program used to monitor network traffic.
•Have a set of rules that they use to filter
packets trying to enter the network.
•Usually placed between a trusted network and
one that is less trusted.
Antivirus Software
•Used to prevent access to computer systems by
unwanted programs.
•Utilises many different methods to protect the
computer.
•Often search for signs of viruses on every
website that is visited and do regular scans of
the computer to check for infections.
 Password Cracking-Attempting to guess a password using
  a program.
  • Brute Forcing-A program that guesses a password by
    inputting as many randomly generated passwords using the
    computer’s processing power.
  • Dictionary Hack-A program that guesses passwords based
    on words in a dictionary or the program’s vocabulary.
 Packet Sniffing-Sniffing packets sent over the internet to
  gain security details over unsecured connections.
 Phishing-Legitimate looking sites designed to farm
  information inputted by the user.
 Rootkit-Stealth software which inhibits use of programs
  executed by the user and hides (usually malicious)
  processes.
 Keyloggers-records keystrokes and can be software or
  hardware.
 Scareware-A form of software designed to scare the user
  into divulging information (such as credit card
  information) much like social engineering.
 IP Spoofing-Masks the IP address of a hacker and
  prevents them from being found
 Attacks on the increase
 In 2010 431 million adults worldwide were victims of
  cyber crime
 Costs 114 billion pounds worldwide
 Costs U.K 27 billion pounds a year
 10.5% of the worlds hackers are from the U.K
 In Brazil 83% of the population have suffered from
  internet crime.

 America is not far behind with 73% falling victim to
  internet crime.

 Cyber crime can be down to anyone from professional
  criminals to teenagers
 April 2011 Sony Play station network shut down due to
  external intrusion

 Password is crucial


 More letters, numbers and characters in a password the
  harder it is to crack
 Spam blocker
 Anti Virus software
 Firewall protection
 Encryption software
 Caution in providing personal information
 Secure Shopping
 Avoidance of scans
 Monitoring of your child’s computer activities
 Employ more skilled individuals
  • Pros: Eliminates the need on relying on a small number of
    people
  • Cons: Very costly
 Improve education on internet security and/or lower
  costs for fees
 Job Awareness-people are not aware certain jobs are
  available
 Higher starting wages to give potential employees an
  incentive
Any Questions?

Contenu connexe

Tendances

Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security introAbhilash Ak
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 

Tendances (19)

It
ItIt
It
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
internet security
internet securityinternet security
internet security
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
New internet security
New internet securityNew internet security
New internet security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Computer security
Computer securityComputer security
Computer security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 

En vedette

Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

En vedette (9)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 

Similaire à Internet security powerpoint

Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02sanjay kumar
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
Information security
 Information security Information security
Information securityJin Castor
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 

Similaire à Internet security powerpoint (20)

Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Information security
 Information security Information security
Information security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
HACKING
HACKINGHACKING
HACKING
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

Internet security powerpoint

  • 1. By Arifa Ali, Hannah Buckley, Paul Byrne and Matthew Hastie
  • 2.  Ethical Hacking & Black Hat Hacking  Types of Hacking/Data Theft  Statistics/Examples of Attacks  Skills Required to Prevent Attacks  Measures to Prevent Attacks
  • 3.  Brief History  Who is a hacker and what do Hackers do ?  Hackers Techniques  System Hacking, Network Hacking, Software Hacking
  • 4.  Someone who bypasses the systems and Passwords.  Taking advantage of weaknesses left in the system by developers.  This person knows computer programming  Can be a Hacker Subculture  Access confidential information  Broadcast confidential documents e.g. Name, address, etc.  Espionage
  • 5.  Over the internet  Over Lan  Locally  Offline  Theft  Deception  Ip Addresses  Telephone  Email
  • 6.  Malicious Hackers  Villain  Violates Computer Security
  • 7.  Computer Security  A Computer Hacker intending to improve security.  The Hero
  • 8.  Black Hat Hackers ( The bad guy Violates computers)  White Hat Hackers (The Hero Breaks security for good reasons)  Blue Hat Hacker (consults firms, system tested before launch)  Grey Hacker(Mixture of white & Black offers their service to improve for a small fee)  Hacktivist (Utilizes Technology)  Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature  Elite Hacker (The most skilled Hacker)(Masters of deception)  Ethical Hacker(employee and authorised Hacker)  Bots ( software tools the hackers use )
  • 9. SQL Injection •SQL injection is a type of attack often used against data driven applications. •It is a technique that exploits an applications security weaknesses. •Used to steal databases full of credit card information, passwords, or personal details.
  • 10. DDOS Attacks •Distributed Denial of Service. •Used to make a machine or network resource inaccessible to users. •DDOS attacks usually utilise botnets.
  • 11. Social Engineering •Social engineering is the art of manipulating people into divulging personal and confidential information. •Requires very little technical skill. •Relies heavily on human interaction to get results. •Most often used in tandem with other exploits.
  • 12. Malware and Viruses •Malicious Software. •Used by an attacker to steal data, disrupt operations or access a private network. •Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.
  • 13. Computer Virus •Any computer program that can replicate itself and spread from one computer to another without input from its creator. •Needs to attach itself to an existing program in order for it to work. •They are used to deliver many different payloads.
  • 14. Computer Worm •A program similar to a virus; it can replicate itself and spread from one computer to another. •Unlike a virus a worm does not need to be attached to an existing program in order to function. •Always cause harm to the network, even if it is just increased bandwidth consumption, whereas a virus will always corrupt and/or modify files on a computer.
  • 15. Trojan Horse •A program that pretends to do one thing, but in reality does something else. •Used to record keystrokes input by a user •Can be used to steal usernames, passwords, credit card information, personal details and so on. •Usually employ a form of social engineering.
  • 16. Firewalls •Program used to monitor network traffic. •Have a set of rules that they use to filter packets trying to enter the network. •Usually placed between a trusted network and one that is less trusted.
  • 17. Antivirus Software •Used to prevent access to computer systems by unwanted programs. •Utilises many different methods to protect the computer. •Often search for signs of viruses on every website that is visited and do regular scans of the computer to check for infections.
  • 18.  Password Cracking-Attempting to guess a password using a program. • Brute Forcing-A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power. • Dictionary Hack-A program that guesses passwords based on words in a dictionary or the program’s vocabulary.  Packet Sniffing-Sniffing packets sent over the internet to gain security details over unsecured connections.  Phishing-Legitimate looking sites designed to farm information inputted by the user.
  • 19.  Rootkit-Stealth software which inhibits use of programs executed by the user and hides (usually malicious) processes.  Keyloggers-records keystrokes and can be software or hardware.  Scareware-A form of software designed to scare the user into divulging information (such as credit card information) much like social engineering.  IP Spoofing-Masks the IP address of a hacker and prevents them from being found
  • 20.  Attacks on the increase  In 2010 431 million adults worldwide were victims of cyber crime  Costs 114 billion pounds worldwide  Costs U.K 27 billion pounds a year  10.5% of the worlds hackers are from the U.K
  • 21.  In Brazil 83% of the population have suffered from internet crime.  America is not far behind with 73% falling victim to internet crime.  Cyber crime can be down to anyone from professional criminals to teenagers
  • 22.
  • 23.  April 2011 Sony Play station network shut down due to external intrusion  Password is crucial  More letters, numbers and characters in a password the harder it is to crack
  • 24.
  • 25.  Spam blocker  Anti Virus software  Firewall protection  Encryption software  Caution in providing personal information  Secure Shopping  Avoidance of scans  Monitoring of your child’s computer activities
  • 26.  Employ more skilled individuals • Pros: Eliminates the need on relying on a small number of people • Cons: Very costly  Improve education on internet security and/or lower costs for fees  Job Awareness-people are not aware certain jobs are available  Higher starting wages to give potential employees an incentive

Notes de l'éditeur

  1. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.