SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
CYBER SECURITY
FUNDAMENTALS
Cyber Security Seminar Day 1
WHAT TO EXPECT??
NEED OF SECURITY
 Increasing awareness of technology but not Security
 Continuous Development & Competition in IT
 Increasing number of Cyber Criminals
 Increasing use of Network elements & applications
 Decreasing level of skill set
Cyber Security Seminar Day 1
NEED OF SECURITY
 Any Security breach in the website of any person increases the risk of the public
image
 Any Security breach in the website of any company increases the risk of company
reputation
 Any Security breach in the government website may increase the risk on project
management and government operations
 Any Security breach in the Military sector may jeopardise the safety of any country
Cyber Security Seminar Day 1
What is HACKING??
 Hacking is an art of exploring various security breaches
 What people believe: It’s an anti-social activity
: All the hackers are bad people
 The terms Hacker and Hacking are being misinterpreted and
misunderstood with negative sidelines
COMMUNITIES OF HACKERS
 Hackers
 Crackers
 Phreaks
 Script Kiddies
TYPES OF HACKERS
 White Hat Hacker - They use their knowledge and skill set for good
constructive intents. They find out new security loopholes and their
solutions
 Black Hat Hacker - They use their knowledge and skill set for illegal
activities and destructive intents
 Grey Hat Hacker – They use their knowledge and skill set for legal and
illegal purpose. They are white hats in public but internally they do some
black hat work
HACKING STRATEGY
 Reconnaissance (Information Gathering)
 Scanning
 Gaining Access
 Maintaining Access
 Covering Tracks
Cyber Crime is no more FUN…!!!
 Cyber crime controlled by IT ACT 2008 and respective IPC (constantly evolving)
 Complete control of Govt agencies over information stored, processed and
transmitted over internet
 Upgradation of Investigating agencies with latest technology
 Service providers like ISPs, email service providers, etc are liable to share
information with Govt agencies
 Upgradation of Forensic labs
 Stringent punishment for cyber crimes
Common Scenarios - Cyber Pornography
 Cyber pornography covers pornographic websites, pornographic magazines
produced using computers and the Internet.
 Whoever publishes or transmits or causes to be published in the electronic form,
any material which is obscene in nature falls under cyber pornography
 Section 67: Punishment for publishing or transmitting obscene material in
electronic form
 Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
Common Scenarios – Identity Theft
 Identity theft is a term used to refer to fraud that involves stealing money or getting
other benefits by pretending to be someone else.
 Section 66C Punishment for identity theft.
Whoever, fraudulently or dishonestly make use of the electronic signature, password or
any other unique identification feature of any other person, shall be punished with
imprisonment of either description for a term which may extend to three years and shall
also be liable to fine which may extend to rupees one lakh.
 Section 66D Punishment for cheating by personation by using computer resource
Whoever, by means of any communication device or computer resource cheats by
personation, shall be punished with imprisonment of either description for a term which
may extend to three years and shall also be liable to fine which may extend to one lakh
rupees.
NETWORKING
FUNDAMENTALS
TYPES OF NETWORK
 LAN – Local Area Network
LAN can establish the communication within a lab or within a building
e.g.-Office, Schools, etc
 MAN – Metropolitan Area Network
MAN can establish the communication between two or more LANs
e.g.-Radio, ATM, Metro, etc
 WAN – Wide Area Network
WAN can establish the communication globally
e.g.-VSAT, Telecom Networks, Internet, etc
IP ADDRESS
IP Address is also known as,
 Logical Address, or
 Unique Identity Address
It is used to identify the systems. Whenever any computer connects itself with
the internet or with LAN, it gets one IP address, that IP address is always
unique in the network. This means, once an IP address is assigned to any
system in the network, it cannot be assigned to any other system. The same
in the internet, if one IP address has been assigned to one system, it cannot
be assigned to anyone else
IP VERSION
 IPv4 - Internet Protocol Version -4
IPv4 is a 32 bit addressing protocol. The range of this IP starts from
0.0.0.0 to 255.255.255.255
i.e. – 192.168.1.24
 IPv6 – Internet Protocol Version-6
IPv6 is a 128 bit addressing protocol. IPv6 addresses are written in
eight groups of four hexadecimal digits separated by colons.
i.e. - 2001:0db8:85a3:0000:0000:8a2e:0370:7334
IP TYPES
 Internal IP - Whenever a computer connects itself with an Internal
Network (LAN) , it gets an Internal IP. This IP will be the identity of the
particular computer in the network
 External IP - Whenever a computer connects itself with the internet , it
gets an IP address by ISP. This IP will be the identity of the particular
computer over the internet.
IP TYPES
Both the Internal & External IP address can be allocated in two forms.
 Static IP Address - Static IP Address remains same in all the sessions.
 Dynamic IP Address - Dynamic IP Address keeps changing in all the
sessions.
ISP & IANA
ISP is an Internet Service Provider. All the internet users get the IP Address
from the ISP.
 According to the client request, ISP assigns them Static or Dynamic IP
IANA manages global IP ranges space.
 IANA works in co-operation with five Regional Internet Registries (RIRs) to
allocate IP address blocks to Local Internet Registries (Internet Service
Providers) and other entities

Contenu connexe

Tendances

Tendances (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Web security
Web securityWeb security
Web security
 
It act
It actIt act
It act
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber law cases
Cyber law casesCyber law cases
Cyber law cases
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI66a it act APOORVA BILLORE ITMI
66a it act APOORVA BILLORE ITMI
 

Similaire à Cyber Security Seminar Day 1

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 
What Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemAlejandra Rodriguez
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 

Similaire à Cyber Security Seminar Day 1 (20)

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
What Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting SystemWhat Are The Advantages And Disadvantages Of I-Voting System
What Are The Advantages And Disadvantages Of I-Voting System
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
hacking
hackinghacking
hacking
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 

Plus de Apurv Singh Gautam

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark WebApurv Singh Gautam
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentApurv Singh Gautam
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management systemApurv Singh Gautam
 

Plus de Apurv Singh Gautam (15)

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark Web
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
OSINT
OSINTOSINT
OSINT
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Flexible Displays
Flexible DisplaysFlexible Displays
Flexible Displays
 
India against corruption
India against corruptionIndia against corruption
India against corruption
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management system
 

Dernier

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 

Dernier (20)

Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 

Cyber Security Seminar Day 1

  • 4. NEED OF SECURITY  Increasing awareness of technology but not Security  Continuous Development & Competition in IT  Increasing number of Cyber Criminals  Increasing use of Network elements & applications  Decreasing level of skill set
  • 6. NEED OF SECURITY  Any Security breach in the website of any person increases the risk of the public image  Any Security breach in the website of any company increases the risk of company reputation  Any Security breach in the government website may increase the risk on project management and government operations  Any Security breach in the Military sector may jeopardise the safety of any country
  • 8. What is HACKING??  Hacking is an art of exploring various security breaches  What people believe: It’s an anti-social activity : All the hackers are bad people  The terms Hacker and Hacking are being misinterpreted and misunderstood with negative sidelines
  • 9. COMMUNITIES OF HACKERS  Hackers  Crackers  Phreaks  Script Kiddies
  • 10. TYPES OF HACKERS  White Hat Hacker - They use their knowledge and skill set for good constructive intents. They find out new security loopholes and their solutions  Black Hat Hacker - They use their knowledge and skill set for illegal activities and destructive intents  Grey Hat Hacker – They use their knowledge and skill set for legal and illegal purpose. They are white hats in public but internally they do some black hat work
  • 11. HACKING STRATEGY  Reconnaissance (Information Gathering)  Scanning  Gaining Access  Maintaining Access  Covering Tracks
  • 12. Cyber Crime is no more FUN…!!!  Cyber crime controlled by IT ACT 2008 and respective IPC (constantly evolving)  Complete control of Govt agencies over information stored, processed and transmitted over internet  Upgradation of Investigating agencies with latest technology  Service providers like ISPs, email service providers, etc are liable to share information with Govt agencies  Upgradation of Forensic labs  Stringent punishment for cyber crimes
  • 13. Common Scenarios - Cyber Pornography  Cyber pornography covers pornographic websites, pornographic magazines produced using computers and the Internet.  Whoever publishes or transmits or causes to be published in the electronic form, any material which is obscene in nature falls under cyber pornography  Section 67: Punishment for publishing or transmitting obscene material in electronic form  Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
  • 14. Common Scenarios – Identity Theft  Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else.  Section 66C Punishment for identity theft. Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.  Section 66D Punishment for cheating by personation by using computer resource Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
  • 16. TYPES OF NETWORK  LAN – Local Area Network LAN can establish the communication within a lab or within a building e.g.-Office, Schools, etc  MAN – Metropolitan Area Network MAN can establish the communication between two or more LANs e.g.-Radio, ATM, Metro, etc  WAN – Wide Area Network WAN can establish the communication globally e.g.-VSAT, Telecom Networks, Internet, etc
  • 17. IP ADDRESS IP Address is also known as,  Logical Address, or  Unique Identity Address It is used to identify the systems. Whenever any computer connects itself with the internet or with LAN, it gets one IP address, that IP address is always unique in the network. This means, once an IP address is assigned to any system in the network, it cannot be assigned to any other system. The same in the internet, if one IP address has been assigned to one system, it cannot be assigned to anyone else
  • 18. IP VERSION  IPv4 - Internet Protocol Version -4 IPv4 is a 32 bit addressing protocol. The range of this IP starts from 0.0.0.0 to 255.255.255.255 i.e. – 192.168.1.24  IPv6 – Internet Protocol Version-6 IPv6 is a 128 bit addressing protocol. IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons. i.e. - 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  • 19. IP TYPES  Internal IP - Whenever a computer connects itself with an Internal Network (LAN) , it gets an Internal IP. This IP will be the identity of the particular computer in the network  External IP - Whenever a computer connects itself with the internet , it gets an IP address by ISP. This IP will be the identity of the particular computer over the internet.
  • 20. IP TYPES Both the Internal & External IP address can be allocated in two forms.  Static IP Address - Static IP Address remains same in all the sessions.  Dynamic IP Address - Dynamic IP Address keeps changing in all the sessions.
  • 21. ISP & IANA ISP is an Internet Service Provider. All the internet users get the IP Address from the ISP.  According to the client request, ISP assigns them Static or Dynamic IP IANA manages global IP ranges space.  IANA works in co-operation with five Regional Internet Registries (RIRs) to allocate IP address blocks to Local Internet Registries (Internet Service Providers) and other entities