SlideShare a Scribd company logo
1 of 18
Cyber
Security
&
BY
D.V.MANOJ P.TARUN
15A31A05A7 & 15A31A05B4
II nd CSE-B II nd CSE-B
CONTENTS
 INTRODUCTION ABOUT CYBER SECURITY
 DESCRIPTION
 TYPES OF ATTACKS
 SECURITY/PREVENTIVE MEASURES
 ADVANTAGES
 DISADVANTAGES
 FACTS OF CYBER SECURITY & CYBER CRIMES
 CONCLUSION
INTRODUCTION
Cyber Security:
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from
attack, damage or unauthorized access.
Cyber Crimes:
Cyber-crimes are the criminal activities carried out by means of the
computers or networks.
DESCRIPTION
As we all know that cyber-crimes has been one of the
common practices made by the computer experts.
Cybercrimes are the activities made by the attackers for
destroying organization network, stealing others valuable
data, documents, hacking bank account and transferring
money to their own and so on.
MAN IN THE MIDDLE ATTACK
 IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND
CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE
ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.
 BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK
AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND
GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
D-DOS ATTACK
 IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)
 IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO
MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.
 ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING
TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A
WEBSITE OR AN ORGANIZATION OF COMPUTERS.
 ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A
HUGE
LOSS AND REPUTATION FOR THE COMPANY.
DOS ATTACK
 IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)
 IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL
TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
SQL INJECTON
 IT IS ABBREVATED AS THE SEQUEL INJECTION
 IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH
ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.
 IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING
THE SQL COMMANDS.
 ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN
MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING
UNEXPECTED SQL COMMANDS
XSS ATTACK
 IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK
 THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS
 THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED
 SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT
BOXES USING JAVA SCRIPT ON THE WEB APPS.
SOCIAL ENGINEERING
 SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR
GAINING THEIR TRUST TO EXPLOIT THEM.
 IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION.
SCARE WARE
 IN THIS THE HACKER TRICKS THE VICTIM THAT HIS
COMPUTER WAS AT RISK AND GIVES HIM A
SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE
INTO THE USER PC WITHOUT KNOWING TO HIM
PHISHING
 IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE
AND GAINS THE INFORMATION ABOUT HIM
PREVENTIVE/SECURE MEASURES
o Use antivirus software.
o Turn on the firewalls.
o Uninstall unnecessary software.
o Using the SSL certificates installed on the server.
o Using servers –SSH (secure method).
o Updating software updates.
o Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
 PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.
 PROTECTS AGAINST THE DATA FROM THEFT
 INCREASE IN CYBER DEFENSE
 INCREASES THE SECURITY
 WE CAN BROWSE THE SAFE WEBSITE
 INCREASE IN CYBER SPEED
 PROTECTS NETWORKS AND RESOURCES
DIS ADVANTAGES OF CYBER CRIMES
 MAKES THE SYSTEM SLOWER THAN BEFORE.
 FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.
 HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC
 HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
 ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
FACTS ABOUT CYBER SECURITY & CYBER CRIMES
 FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF
CYBER CRIMES
 INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %
 IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN
CRIMES.
 1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR
 80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER
AFTER THE DEMONATIZATION IN INDIA
CONCLUSION
CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF
THE COIN
CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY
ERADICATED BUT CAN BE PREVENTED USING THE CYBER
SECURITY
THANK YOU
Cyber security

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 

Similar to Cyber security

Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
 
CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxMOHAMMEDASHIK71
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware OfAditya Prakhar Singh
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeSMSumon8
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tipstcellsn
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 

Similar to Cyber security (20)

Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptx
 
9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware Of
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Malware | spyware removal
Malware | spyware removalMalware | spyware removal
Malware | spyware removal
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Web Application Security Tips
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 

Recently uploaded

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Cyber security

  • 1. Cyber Security & BY D.V.MANOJ P.TARUN 15A31A05A7 & 15A31A05B4 II nd CSE-B II nd CSE-B
  • 2. CONTENTS  INTRODUCTION ABOUT CYBER SECURITY  DESCRIPTION  TYPES OF ATTACKS  SECURITY/PREVENTIVE MEASURES  ADVANTAGES  DISADVANTAGES  FACTS OF CYBER SECURITY & CYBER CRIMES  CONCLUSION
  • 3. INTRODUCTION Cyber Security: Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber Crimes: Cyber-crimes are the criminal activities carried out by means of the computers or networks.
  • 4. DESCRIPTION As we all know that cyber-crimes has been one of the common practices made by the computer experts. Cybercrimes are the activities made by the attackers for destroying organization network, stealing others valuable data, documents, hacking bank account and transferring money to their own and so on.
  • 5. MAN IN THE MIDDLE ATTACK  IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.  BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
  • 6. D-DOS ATTACK  IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)  IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.  ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A WEBSITE OR AN ORGANIZATION OF COMPUTERS.  ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A HUGE LOSS AND REPUTATION FOR THE COMPANY.
  • 7. DOS ATTACK  IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)  IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
  • 8. SQL INJECTON  IT IS ABBREVATED AS THE SEQUEL INJECTION  IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.  IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING THE SQL COMMANDS.  ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING UNEXPECTED SQL COMMANDS
  • 9. XSS ATTACK  IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK  THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS  THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED  SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT BOXES USING JAVA SCRIPT ON THE WEB APPS.
  • 10. SOCIAL ENGINEERING  SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR GAINING THEIR TRUST TO EXPLOIT THEM.  IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION. SCARE WARE  IN THIS THE HACKER TRICKS THE VICTIM THAT HIS COMPUTER WAS AT RISK AND GIVES HIM A SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE INTO THE USER PC WITHOUT KNOWING TO HIM
  • 11. PHISHING  IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE AND GAINS THE INFORMATION ABOUT HIM
  • 12. PREVENTIVE/SECURE MEASURES o Use antivirus software. o Turn on the firewalls. o Uninstall unnecessary software. o Using the SSL certificates installed on the server. o Using servers –SSH (secure method). o Updating software updates. o Avoid spyware/malware.
  • 13. ADVANTAGES OF CYBER SECURITY  PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.  PROTECTS AGAINST THE DATA FROM THEFT  INCREASE IN CYBER DEFENSE  INCREASES THE SECURITY  WE CAN BROWSE THE SAFE WEBSITE  INCREASE IN CYBER SPEED  PROTECTS NETWORKS AND RESOURCES
  • 14. DIS ADVANTAGES OF CYBER CRIMES  MAKES THE SYSTEM SLOWER THAN BEFORE.  FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.  HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC  HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE  ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
  • 15. FACTS ABOUT CYBER SECURITY & CYBER CRIMES  FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF CYBER CRIMES  INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %  IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN CRIMES.  1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR  80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER AFTER THE DEMONATIZATION IN INDIA
  • 16. CONCLUSION CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF THE COIN CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY ERADICATED BUT CAN BE PREVENTED USING THE CYBER SECURITY