2. CONTENTS
INTRODUCTION ABOUT CYBER SECURITY
DESCRIPTION
TYPES OF ATTACKS
SECURITY/PREVENTIVE MEASURES
ADVANTAGES
DISADVANTAGES
FACTS OF CYBER SECURITY & CYBER CRIMES
CONCLUSION
3. INTRODUCTION
Cyber Security:
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from
attack, damage or unauthorized access.
Cyber Crimes:
Cyber-crimes are the criminal activities carried out by means of the
computers or networks.
4. DESCRIPTION
As we all know that cyber-crimes has been one of the
common practices made by the computer experts.
Cybercrimes are the activities made by the attackers for
destroying organization network, stealing others valuable
data, documents, hacking bank account and transferring
money to their own and so on.
5. MAN IN THE MIDDLE ATTACK
IN THIS ATTACK, THE ATTACKER WILL IMPERSONATE BETWEEN THE USER AND THE INTERNET AND
CREATES A POP –UP TO LOGIN , SO THAT THE USER WILL LOGIN WITH HIS DETAILS. THEN THE
ATTACKER WILL GET TO KNOW THEN THE USER’S SENSITIVE INFORMATION.
BY USING THE SECURED WEBSITES THAT HAS HTTPS CONNECTION WE CAN PREVENT THIS ATTACK
AND BY USING intrusion detection system (IDS) WHICH DETECTS THE NTEWORK AND
GIVES THE ALERTS TO THE USER IF SOMONE TRIES TO ATTACK.
6. D-DOS ATTACK
IT IS ABBREVATED AS DISTRIBUTED DENIAL OF SERVICE ATTACK(D-DOS ATTACK)
IN ORDER TO PERFORM AN ATTACK, THE ATTACKER WILL RECRUIT AN ARMY OF BOTS. TO
MAKE A BOT THE ATTACKER WILL CREATE A MALWARE AND SENDS IT TO A COMPUTER.
ONCE IF A COMPUTER IS MADE INTO A BOT THEN THE COMPUTER PERFORMS ACCORDING
TO THE ORDERS OF THE ATTACKER . THEN THE ATTACKER CAN PERFOM AN ATTACK ON A
WEBSITE OR AN ORGANIZATION OF COMPUTERS.
ONCE IF AN ORGANIZATION HAS CAUGHT UNDER THIS ATTACK THEN THERE WILL BE A
HUGE
LOSS AND REPUTATION FOR THE COMPANY.
7. DOS ATTACK
IT IS ABBREVATED AS THE DENIAL OF SERVICE ATTACKATTACK)
IN THIS ATTACK THE ATTACKER WILL MAKES SEVERAL REQUESTS TO THE SERVER BY SENDING SPECIAL
TYPES OF MESSAGES CREARTING TRAFFIC , SO THAT THE USER CANNOT USE THAT WEBSITE
8. SQL INJECTON
IT IS ABBREVATED AS THE SEQUEL INJECTION
IT IS CAUSED DUE TO THE APPLICATION SECURITY WEAKNESS WHICH
ALLOWS THE ATTACKER TO CONTROL THE APPLICATION DATABASE.
IN THIS THE ATTACKER WILL GETS ACCESS TO THE DATABASE BY USING
THE SQL COMMANDS.
ONCE IF THE ATTACKER GETS ACCESS TO THE DATABASE THEN HE CAN
MANIPULATE AND DELETE THE DATA IN THE DATABASE BY SENDING
UNEXPECTED SQL COMMANDS
9. XSS ATTACK
IT IS ABBREVATED AS THE CROSS SITE SCRIPTING ATTACK
THE XSS ATTACK IS MAINLY SEEN IN THE WEB APPLICATIONS
THE FRONT END CODE LIKE HTML,CSS AND JAVASCRIPT CAN BE MODIFIED
SO HERE IN THIS ATTACK THE HACKER WILL MODIFY THE CODE AND MAKES IT DISPLAY AS THE ALERT
BOXES USING JAVA SCRIPT ON THE WEB APPS.
10. SOCIAL ENGINEERING
SOCIAL ENGINEERING IS THE ART OF MANIPULATING PEOPLE TO GIVE UP SENSITIVE INFORMATION OR
GAINING THEIR TRUST TO EXPLOIT THEM.
IN THIS ATTACK THE ATTACKER WILL HEAVILY RELIES ON THE HUMAN INTERACTION.
SCARE WARE
IN THIS THE HACKER TRICKS THE VICTIM THAT HIS
COMPUTER WAS AT RISK AND GIVES HIM A
SOLUTION TO DOWNLOAD AND INSTALL THE MALWARE
INTO THE USER PC WITHOUT KNOWING TO HIM
11. PHISHING
IN THIS THE ATTACKER WILL INTERACT WITH THE RECIEPIENT WITH A EMAIL AS THE TRUSTED SOURCE
AND GAINS THE INFORMATION ABOUT HIM
12. PREVENTIVE/SECURE MEASURES
o Use antivirus software.
o Turn on the firewalls.
o Uninstall unnecessary software.
o Using the SSL certificates installed on the server.
o Using servers –SSH (secure method).
o Updating software updates.
o Avoid spyware/malware.
13. ADVANTAGES OF CYBER SECURITY
PROTECTS THE COMPUTERS AGAINST VIRUS,WORMS AND MALWARE.
PROTECTS AGAINST THE DATA FROM THEFT
INCREASE IN CYBER DEFENSE
INCREASES THE SECURITY
WE CAN BROWSE THE SAFE WEBSITE
INCREASE IN CYBER SPEED
PROTECTS NETWORKS AND RESOURCES
14. DIS ADVANTAGES OF CYBER CRIMES
MAKES THE SYSTEM SLOWER THAN BEFORE.
FIREWALLS WOULD BE DIFFICULT TO CONFIGURE CORRECTLY.
HUGE AMOUNT OF LOSS IN MONEY FOR THE BANKS,COMPANIES ETC
HUGE AMOUNT OF DATA LOSS OCCURS IN THE DATABASE
ACCESS TO DIFFERENT ACCOUNTS WITH GAINED INFORMATION
15. FACTS ABOUT CYBER SECURITY & CYBER CRIMES
FOR EVERY SECOND 18 MEMBERS ARE BECOMING A VICTIMS OF
CYBER CRIMES
INDIA RANKS IN THE 5TH POSITION IN CYBER CRIMES WITH 16.9 %
IN STATES MAHARASHTRA AND UTTAT PRADESH RANKS TOP IN
CRIMES.
1 MILLION CYBER SECURITY JOBS HAS BEEN TAKEN IN THE TEAR
80,000 CYBER CRIMES HAS BEEN DONE FROM 9TH-12TH DECEMBER
AFTER THE DEMONATIZATION IN INDIA
16. CONCLUSION
CYBER SECURITY AND CYBER CRIMES ARE TWO SIDES OF
THE COIN
CYBER CRIMES ARE THE ONES WHICH CANNOT BE COMPLETELY
ERADICATED BUT CAN BE PREVENTED USING THE CYBER
SECURITY