Z Score,T Score, Percential Rank and Box Plot Graph
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
1. 1
Cyber Security Threads & Security in Web
Cloud Servers
Presentation on FDP
TRYLOGIC SOFT SOLUTIONS AP PVT LTD
Prepared By-
Vikalp Sharma
2. 2
Cyber Security-Terms
2
In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use of an asset.
Cyber security is the state or process of protecting and recovering networks, devices and programs from any
type of cyber attack.
Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis,
documentation and preservation of digital evidence.
4. 4
Latest Incidents
2020
January
Ransomware Attack.
Greenville Water, a popular water utility company
that services nearly 500,000 residents
2019
January
2018
August
World Economical forum meet said : More than 1.1 billion
data of aadhar card is under breach.
Facebook Data & Adobe 2.9 million users data.
Cosmos Bank, Pune Branch , 94 Crores rupees wiped money
and transferred to Hong Kong based bank.
5. 5
2014
Marriot Reported 500 million guest data
compromised & Also Russian hackers
revealed stolen data 1.2 billion login on
4,20,000 websites.
2018
July
2016
ATM systems hacked in Kolkata into Canara bank ATM,
wiped more than 20 lacks from different accounts.
Kaspersky lab report says: 758 million malicious attack
occurred & Ransom ware wannacry incident.
2015
Adultfriendfinder was attacked & data was publicly
published.
Local file inclusion breach was inducted.
9. 9
Cyber Connected Devices
Smartphones are connected
with internet
Smart TV, Self Driving
Car, Watches
Appliances at home runs on
electricity, Home Automation
Everything around us will be
concerning internet
That’s what IOT is all about
10. 10
BREACH POSSIBILITY
Changing the Digital message
and wrong message spread
all over
Damaging the Traffic
System & Home activity
Device control and physical
damage by terrorist
World Economical and
physical crisis, Blocking
Cart (e-commerce)
01
02
03
04
12. 12
These statements control a database server behind a web application. Attackers
can use SQL Injection vulnerabilities to bypass application security measures.
This particular vulnerability uses malicious codes to attack
servers that store critical data for websites
only use stored procedures and
prepared statements.
validate all SQL data
inputs against a
whitelist
SQL INJECTION
SELECT * FROM `admin_credentials` WHERE username="" and password="" or 1=1
13. 13
Attacks with Public Wi-Fi?
Man-in-the-Middle
Packet Analyzers,
Sniffers.
Ad-hoc Network,
Endpoint attack
Mishandled Wi-Fi Security
Set-Ups, Unencrypted
Network
Don’t:
Allow your Wi-Fi to auto-connect to
networks, Work with Sensitive
website, Leave Wi-Fi Open, login
unprotected network
14. 14
Precautions are the Solutions
Secure Communication
Start to be safe
Safe
MAC filters
WPA2
Firewall
Mail filter and
site blocker
Antivirus
Locker or
Encrypted
Snort for DDOS
Two step
Authentication
Human
Risk
15. 15
Research Topics in Cyber Security
1
Violence Analysis in Cyber Tweets and Cyber Recruitment
Plagiarism detection in articles and research ( Adapted by Many University by own tools)
Network Security and Malicious node Detection
Cloud Security with Data Storage and Cloud Authentication
Different password techniques for Authentication & Authorization
Privacy preserving to Medical Data in Application & Cloud
Temporal Cyber Security Big Data
Security Analysis of Intelligent Transportation Systems
Security in IOT Devices, Automation, VANET , Cloud , Mobile Devices……Block Chain?
16. 16
Block-Chain: Just A Overview
Block chains leverage techniques from a field of mathematics and computer science, known as cryptography, to
sign every transaction (e.g. the transfer of assets from one person to another) with a unique digital signature
belonging to the user who initiated the transaction. These signatures are held privately but are verifiable
publicly.
18. 18
Useful tips
1
Customize your account and settings
Selection of country for communication
Two factor authentication
Do not click any unwanted link
Block ads and identify ads in any platform
Do-not accept un-Authorized Access/ Do not install Un-trusted application
Keep Alert Settings with all your passwords, keep encryption usage at possible area.