SlideShare une entreprise Scribd logo
1  sur  19
1
Cyber Security Threads & Security in Web
Cloud Servers
Presentation on FDP
TRYLOGIC SOFT SOLUTIONS AP PVT LTD
Prepared By-
Vikalp Sharma
2
Cyber Security-Terms
2
In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use of an asset.
Cyber security is the state or process of protecting and recovering networks, devices and programs from any
type of cyber attack.
Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis,
documentation and preservation of digital evidence.
3
Latest News
3
04
4
Latest Incidents
2020
January
Ransomware Attack.
Greenville Water, a popular water utility company
that services nearly 500,000 residents
2019
January
2018
August
World Economical forum meet said : More than 1.1 billion
data of aadhar card is under breach.
Facebook Data & Adobe 2.9 million users data.
Cosmos Bank, Pune Branch , 94 Crores rupees wiped money
and transferred to Hong Kong based bank.
5
2014
Marriot Reported 500 million guest data
compromised & Also Russian hackers
revealed stolen data 1.2 billion login on
4,20,000 websites.
2018
July
2016
ATM systems hacked in Kolkata into Canara bank ATM,
wiped more than 20 lacks from different accounts.
Kaspersky lab report says: 758 million malicious attack
occurred & Ransom ware wannacry incident.
2015
Adultfriendfinder was attacked & data was publicly
published.
Local file inclusion breach was inducted.
6
Example Around Us
7
Hackers View: How Attacks are
possible
TOR
Google chrome
Hola
Email Spoofing
Emkei, m-k
SMS Spoofing
Smsgang.com
Spy
software
Steganography
8
AUTOMATION ACTIVITY
Food, living, corporates
Home automation
Smart traffic & digital
boards
Automation robots ,
automobile
9
Cyber Connected Devices
Smartphones are connected
with internet
Smart TV, Self Driving
Car, Watches
Appliances at home runs on
electricity, Home Automation
Everything around us will be
concerning internet
That’s what IOT is all about
10
BREACH POSSIBILITY
Changing the Digital message
and wrong message spread
all over
Damaging the Traffic
System & Home activity
Device control and physical
damage by terrorist
World Economical and
physical crisis, Blocking
Cart (e-commerce)
01
02
03
04
11
Spoofing
Phishing
Private information capture &
Users activity capture
Floating Wrong
information
Threats while using internet
SQL Injection
12
These statements control a database server behind a web application. Attackers
can use SQL Injection vulnerabilities to bypass application security measures.
This particular vulnerability uses malicious codes to attack
servers that store critical data for websites
only use stored procedures and
prepared statements.
validate all SQL data
inputs against a
whitelist
SQL INJECTION
SELECT * FROM `admin_credentials` WHERE username="" and password="" or 1=1
13
Attacks with Public Wi-Fi?
Man-in-the-Middle
Packet Analyzers,
Sniffers.
Ad-hoc Network,
Endpoint attack
Mishandled Wi-Fi Security
Set-Ups, Unencrypted
Network
Don’t:
Allow your Wi-Fi to auto-connect to
networks, Work with Sensitive
website, Leave Wi-Fi Open, login
unprotected network
14
Precautions are the Solutions
Secure Communication
Start to be safe
Safe
MAC filters
WPA2
Firewall
Mail filter and
site blocker
Antivirus
Locker or
Encrypted
Snort for DDOS
Two step
Authentication
Human
Risk
15
Research Topics in Cyber Security
1
Violence Analysis in Cyber Tweets and Cyber Recruitment
Plagiarism detection in articles and research ( Adapted by Many University by own tools)
Network Security and Malicious node Detection
Cloud Security with Data Storage and Cloud Authentication
Different password techniques for Authentication & Authorization
Privacy preserving to Medical Data in Application & Cloud
Temporal Cyber Security Big Data
Security Analysis of Intelligent Transportation Systems
Security in IOT Devices, Automation, VANET , Cloud , Mobile Devices……Block Chain?
16
Block-Chain: Just A Overview
Block chains leverage techniques from a field of mathematics and computer science, known as cryptography, to
sign every transaction (e.g. the transfer of assets from one person to another) with a unique digital signature
belonging to the user who initiated the transaction. These signatures are held privately but are verifiable
publicly.
17
18
Useful tips
1
Customize your account and settings
Selection of country for communication
Two factor authentication
Do not click any unwanted link
Block ads and identify ads in any platform
Do-not accept un-Authorized Access/ Do not install Un-trusted application
Keep Alert Settings with all your passwords, keep encryption usage at possible area.
19
https://www.facebook.com/trylogicddugky/Head Office : Bhuvana Towers, #201 & 202, 2nd FLOOR, SD Road,
Secunderabad, Telangana 500003
DDU GKY MP : DK3/26, DANISH KUNJ, KOLAR ROAD, BHOPAL
info@trylogic.in
vikalp@trylogic.in
+91 91092 85858
ADDRESS PHONE & EMAIL SOCIAL MEDIA
TRYLOGIC SOFT SOLUTIONS AP PVT LTD
VIKALP SHARMA
Whatsapp : +91 8770988973

Contenu connexe

Tendances

Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-onlyIvanti
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 

Tendances (19)

Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
IoT
IoTIoT
IoT
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020

Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks TrendsCharles Mok
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 

Similaire à Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020 (20)

Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
IoT and security
IoT and securityIoT and security
IoT and security
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 

Dernier

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020

  • 1. 1 Cyber Security Threads & Security in Web Cloud Servers Presentation on FDP TRYLOGIC SOFT SOLUTIONS AP PVT LTD Prepared By- Vikalp Sharma
  • 2. 2 Cyber Security-Terms 2 In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset. Cyber security is the state or process of protecting and recovering networks, devices and programs from any type of cyber attack. Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis, documentation and preservation of digital evidence.
  • 4. 4 Latest Incidents 2020 January Ransomware Attack. Greenville Water, a popular water utility company that services nearly 500,000 residents 2019 January 2018 August World Economical forum meet said : More than 1.1 billion data of aadhar card is under breach. Facebook Data & Adobe 2.9 million users data. Cosmos Bank, Pune Branch , 94 Crores rupees wiped money and transferred to Hong Kong based bank.
  • 5. 5 2014 Marriot Reported 500 million guest data compromised & Also Russian hackers revealed stolen data 1.2 billion login on 4,20,000 websites. 2018 July 2016 ATM systems hacked in Kolkata into Canara bank ATM, wiped more than 20 lacks from different accounts. Kaspersky lab report says: 758 million malicious attack occurred & Ransom ware wannacry incident. 2015 Adultfriendfinder was attacked & data was publicly published. Local file inclusion breach was inducted.
  • 7. 7 Hackers View: How Attacks are possible TOR Google chrome Hola Email Spoofing Emkei, m-k SMS Spoofing Smsgang.com Spy software Steganography
  • 8. 8 AUTOMATION ACTIVITY Food, living, corporates Home automation Smart traffic & digital boards Automation robots , automobile
  • 9. 9 Cyber Connected Devices Smartphones are connected with internet Smart TV, Self Driving Car, Watches Appliances at home runs on electricity, Home Automation Everything around us will be concerning internet That’s what IOT is all about
  • 10. 10 BREACH POSSIBILITY Changing the Digital message and wrong message spread all over Damaging the Traffic System & Home activity Device control and physical damage by terrorist World Economical and physical crisis, Blocking Cart (e-commerce) 01 02 03 04
  • 11. 11 Spoofing Phishing Private information capture & Users activity capture Floating Wrong information Threats while using internet SQL Injection
  • 12. 12 These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. This particular vulnerability uses malicious codes to attack servers that store critical data for websites only use stored procedures and prepared statements. validate all SQL data inputs against a whitelist SQL INJECTION SELECT * FROM `admin_credentials` WHERE username="" and password="" or 1=1
  • 13. 13 Attacks with Public Wi-Fi? Man-in-the-Middle Packet Analyzers, Sniffers. Ad-hoc Network, Endpoint attack Mishandled Wi-Fi Security Set-Ups, Unencrypted Network Don’t: Allow your Wi-Fi to auto-connect to networks, Work with Sensitive website, Leave Wi-Fi Open, login unprotected network
  • 14. 14 Precautions are the Solutions Secure Communication Start to be safe Safe MAC filters WPA2 Firewall Mail filter and site blocker Antivirus Locker or Encrypted Snort for DDOS Two step Authentication Human Risk
  • 15. 15 Research Topics in Cyber Security 1 Violence Analysis in Cyber Tweets and Cyber Recruitment Plagiarism detection in articles and research ( Adapted by Many University by own tools) Network Security and Malicious node Detection Cloud Security with Data Storage and Cloud Authentication Different password techniques for Authentication & Authorization Privacy preserving to Medical Data in Application & Cloud Temporal Cyber Security Big Data Security Analysis of Intelligent Transportation Systems Security in IOT Devices, Automation, VANET , Cloud , Mobile Devices……Block Chain?
  • 16. 16 Block-Chain: Just A Overview Block chains leverage techniques from a field of mathematics and computer science, known as cryptography, to sign every transaction (e.g. the transfer of assets from one person to another) with a unique digital signature belonging to the user who initiated the transaction. These signatures are held privately but are verifiable publicly.
  • 17. 17
  • 18. 18 Useful tips 1 Customize your account and settings Selection of country for communication Two factor authentication Do not click any unwanted link Block ads and identify ads in any platform Do-not accept un-Authorized Access/ Do not install Un-trusted application Keep Alert Settings with all your passwords, keep encryption usage at possible area.
  • 19. 19 https://www.facebook.com/trylogicddugky/Head Office : Bhuvana Towers, #201 & 202, 2nd FLOOR, SD Road, Secunderabad, Telangana 500003 DDU GKY MP : DK3/26, DANISH KUNJ, KOLAR ROAD, BHOPAL info@trylogic.in vikalp@trylogic.in +91 91092 85858 ADDRESS PHONE & EMAIL SOCIAL MEDIA TRYLOGIC SOFT SOLUTIONS AP PVT LTD VIKALP SHARMA Whatsapp : +91 8770988973