Cyber security

manoj duli
manoj duliStudent at pragati engineering college
Cyber
Security
&
BY
D.V.MANOJ P.TARUN
15A31A05A7 & 15A31A05B4
II nd CSE-B II nd CSE-B
CONTENTS
 INTRODUCTION ABOUT CYBER SECURITY
 DESCRIPTION
 TYPES OF ATTACKS
 SECURITY/PREVENTIVE MEASURES
 ADVANTAGES
 DISADVANTAGES
 FACTS OF CYBER SECURITY & CYBER CRIMES
 CONCLUSION
INTRODUCTION
Cyber Security:
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from
attack, damage or unauthorized access.
Cyber Crimes:
Cyber-crimes are the criminal activities carried out by means of the
computers or networks.
DESCRIPTION
As we all know that cyber-crimes has been one of the
common practices made by the computer experts.
Cybercrimes are the activities made by the attackers for
destroying organization network, stealing others valuable
data, documents, hacking bank account and transferring
money to their own and so on.
MAN IN THE MIDDLE ATTACK
 IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND
CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE
ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.
 BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK
AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND
GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
D-DOS ATTACK
 IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)
 IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO
MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.
 ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING
TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A
WEBSITE OR AN ORGANIZATION OF COMPUTERS.
 ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A
HUGE
LOSS AND REPUTATION FOR THE COMPANY.
DOS ATTACK
 IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)
 IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL
TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
SQL INJECTON
 IT IS ABBREVATED AS THE SEQUEL INJECTION
 IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH
ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.
 IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING
THE SQL COMMANDS.
 ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN
MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING
UNEXPECTED SQL COMMANDS
XSS ATTACK
 IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK
 THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS
 THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED
 SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT
BOXES USING JAVA SCRIPT ON THE WEB APPS.
SOCIAL ENGINEERING
 SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR
GAINING THEIR TRUST TO EXPLOIT THEM.
 IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION.
SCARE WARE
 IN THIS THE HACKER TRICKS THE VICTIM THAT HIS
COMPUTER WAS AT RISK AND GIVES HIM A
SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE
INTO THE USER PC WITHOUT KNOWING TO HIM
PHISHING
 IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE
AND GAINS THE INFORMATION ABOUT HIM
PREVENTIVE/SECURE MEASURES
o Use antivirus software.
o Turn on the firewalls.
o Uninstall unnecessary software.
o Using the SSL certificates installed on the server.
o Using servers –SSH (secure method).
o Updating software updates.
o Avoid spyware/malware.
ADVANTAGES OF CYBER SECURITY
 PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.
 PROTECTS AGAINST THE DATA FROM THEFT
 INCREASE IN CYBER DEFENSE
 INCREASES THE SECURITY
 WE CAN BROWSE THE SAFE WEBSITE
 INCREASE IN CYBER SPEED
 PROTECTS NETWORKS AND RESOURCES
DIS ADVANTAGES OF CYBER CRIMES
 MAKES THE SYSTEM SLOWER THAN BEFORE.
 FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.
 HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC
 HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
 ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
FACTS ABOUT CYBER SECURITY & CYBER CRIMES
 FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF
CYBER CRIMES
 INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %
 IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN
CRIMES.
 1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR
 80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER
AFTER THE DEMONATIZATION IN INDIA
CONCLUSION
CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF
THE COIN
CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY
ERADICATED BUT CAN BE PREVENTED USING THE CYBER
SECURITY
THANK YOU
Cyber security
1 sur 18

Recommandé

Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.1K vues8 diapositives
Cyber security par
Cyber securityCyber security
Cyber securitySapna Patil
3.2K vues13 diapositives
Cybercrime and Security par
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
1.5K vues26 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityManjushree Mashal
3.2K vues41 diapositives
cyber security par
cyber securitycyber security
cyber securityBasineniUdaykumar
3.2K vues10 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives

Contenu connexe

Tendances

Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityvishakha bhagwat
4.5K vues17 diapositives
Cybersecurity par
CybersecurityCybersecurity
CybersecurityForam Gosai
1.8K vues30 diapositives
CYBER SECURITY par
CYBER SECURITYCYBER SECURITY
CYBER SECURITYPranjalShah18
1K vues22 diapositives
Cyber security presentation par
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
1.1K vues42 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityAman Pradhan
2.4K vues45 diapositives

Tendances(20)

Cyber crime and security par Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
Cyber security presentation par sweetpeace1
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace11.1K vues
Cybersecurity Attack Vectors: How to Protect Your Organization par TriCorps Technologies
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber security system presentation par A.S. Sabuj
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj2.1K vues
Cyber Security 03 par Home
Cyber Security 03Cyber Security 03
Cyber Security 03
Home943 vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues

Similaire à Cyber security

Sreerag cs network security par
Sreerag cs network securitySreerag cs network security
Sreerag cs network securitySreerag Gopinath
861 vues22 diapositives
Clinic Denial Of Services Case Study par
Clinic Denial Of Services Case StudyClinic Denial Of Services Case Study
Clinic Denial Of Services Case StudyMaritza Peterson
2 vues41 diapositives
cryptography .pptx par
cryptography .pptxcryptography .pptx
cryptography .pptxRRamyaDevi
32 vues16 diapositives
Cyber security ppt par
Cyber security pptCyber security ppt
Cyber security pptCH Asim Zubair
971 vues13 diapositives
CYBER SECURITY final ppt-1.pptx par
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxMOHAMMEDASHIK71
6 vues15 diapositives
9 Security Threats Everyone Should Be Aware Of par
9 Security Threats Everyone Should Be Aware Of9 Security Threats Everyone Should Be Aware Of
9 Security Threats Everyone Should Be Aware OfAditya Prakhar Singh
167 vues11 diapositives

Similaire à Cyber security(20)

Chapter 2 konsep dasar keamanan par newbie2019
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019477 vues
Presentation on Cyber Security par BalwantBesra
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra85 vues
Presentation on cyber crime par SMSumon8
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
SMSumon8116 vues
Web Application Security Tips par tcellsn
Web Application Security TipsWeb Application Security Tips
Web Application Security Tips
tcellsn343 vues
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in par OllieShoresna
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
OllieShoresna2 vues
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS par rausdeen anfas
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas404 vues

Dernier

Psychology KS5 par
Psychology KS5Psychology KS5
Psychology KS5WestHatch
103 vues5 diapositives
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx par
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxMs. Pooja Bhandare
93 vues51 diapositives
UNIDAD 3 6º C.MEDIO.pptx par
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptxMarcosRodriguezUcedo
124 vues32 diapositives
Java Simplified: Understanding Programming Basics par
Java Simplified: Understanding Programming BasicsJava Simplified: Understanding Programming Basics
Java Simplified: Understanding Programming BasicsAkshaj Vadakkath Joshy
316 vues155 diapositives
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx par
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
684 vues81 diapositives
ACTIVITY BOOK key water sports.pptx par
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptxMar Caston Palacio
745 vues4 diapositives

Dernier(20)

Psychology KS5 par WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch103 vues
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx par Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively par PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 598 vues
Structure and Functions of Cell.pdf par Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan701 vues
Education and Diversity.pptx par DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar177 vues
When Sex Gets Complicated: Porn, Affairs, & Cybersex par Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu73 vues
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... par Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
The Accursed House by Émile Gaboriau par DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta212 vues
Solar System and Galaxies.pptx par DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar94 vues

Cyber security

  • 1. Cyber Security & BY D.V.MANOJ P.TARUN 15A31A05A7 & 15A31A05B4 II nd CSE-B II nd CSE-B
  • 2. CONTENTS  INTRODUCTION ABOUT CYBER SECURITY  DESCRIPTION  TYPES OF ATTACKS  SECURITY/PREVENTIVE MEASURES  ADVANTAGES  DISADVANTAGES  FACTS OF CYBER SECURITY & CYBER CRIMES  CONCLUSION
  • 3. INTRODUCTION Cyber Security: Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber Crimes: Cyber-crimes are the criminal activities carried out by means of the computers or networks.
  • 4. DESCRIPTION As we all know that cyber-crimes has been one of the common practices made by the computer experts. Cybercrimes are the activities made by the attackers for destroying organization network, stealing others valuable data, documents, hacking bank account and transferring money to their own and so on.
  • 5. MAN IN THE MIDDLE ATTACK  IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.  BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
  • 6. D-DOS ATTACK  IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)  IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.  ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A WEBSITE OR AN ORGANIZATION OF COMPUTERS.  ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A HUGE LOSS AND REPUTATION FOR THE COMPANY.
  • 7. DOS ATTACK  IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)  IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
  • 8. SQL INJECTON  IT IS ABBREVATED AS THE SEQUEL INJECTION  IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.  IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING THE SQL COMMANDS.  ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING UNEXPECTED SQL COMMANDS
  • 9. XSS ATTACK  IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK  THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS  THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED  SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT BOXES USING JAVA SCRIPT ON THE WEB APPS.
  • 10. SOCIAL ENGINEERING  SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR GAINING THEIR TRUST TO EXPLOIT THEM.  IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION. SCARE WARE  IN THIS THE HACKER TRICKS THE VICTIM THAT HIS COMPUTER WAS AT RISK AND GIVES HIM A SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE INTO THE USER PC WITHOUT KNOWING TO HIM
  • 11. PHISHING  IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE AND GAINS THE INFORMATION ABOUT HIM
  • 12. PREVENTIVE/SECURE MEASURES o Use antivirus software. o Turn on the firewalls. o Uninstall unnecessary software. o Using the SSL certificates installed on the server. o Using servers –SSH (secure method). o Updating software updates. o Avoid spyware/malware.
  • 13. ADVANTAGES OF CYBER SECURITY  PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.  PROTECTS AGAINST THE DATA FROM THEFT  INCREASE IN CYBER DEFENSE  INCREASES THE SECURITY  WE CAN BROWSE THE SAFE WEBSITE  INCREASE IN CYBER SPEED  PROTECTS NETWORKS AND RESOURCES
  • 14. DIS ADVANTAGES OF CYBER CRIMES  MAKES THE SYSTEM SLOWER THAN BEFORE.  FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.  HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC  HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE  ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
  • 15. FACTS ABOUT CYBER SECURITY & CYBER CRIMES  FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF CYBER CRIMES  INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %  IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN CRIMES.  1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR  80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER AFTER THE DEMONATIZATION IN INDIA
  • 16. CONCLUSION CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF THE COIN CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY ERADICATED BUT CAN BE PREVENTED USING THE CYBER SECURITY