+ All Categories
Home > Documents > Security and Hacking PPT

Security and Hacking PPT

Date post: 21-Jul-2016
Category:
Upload: inder-singh
View: 28 times
Download: 1 times
Share this document with a friend
Description:
General Security threats and information
22
Presented By Anjali Gupta Sakshi khanna Sakshi Garg Arjun Kaura Inderdeep Singh Information Security And Hacking
Transcript
Page 1: Security and Hacking PPT

Presented ByAnjali GuptaSakshi khannaSakshi GargArjun Kaura Inderdeep Singh

Information Security And Hacking

Page 2: Security and Hacking PPT

WHAT IS “ IT SECURITY”

INFORMATION Information Applied to Technology Elements of Information are

Integrity, availability, Authentication, Confidentiality

Security Freedom from risk or danger; safety. Freedom from doubt, anxiety, or fear.

Page 3: Security and Hacking PPT

WHO IS VULNERABLE?

Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government

agencies Multinational corporations ANYONE ON THE NETWORK

Page 4: Security and Hacking PPT

WHAT IS HACKING? Hacking : Unauthorized use or attempts

circumvent or bypass the security mechanism of an information system

Hacktivism : Hacking for Social and political cause

Ethical Hacking : It is a methodology adopted by ethical hacker to discover the vulnerabilities existing in information system.

Page 5: Security and Hacking PPT

TYPES OF HACKERS

White Hat Hackers

Black Hat Hackers

Grey Hat Hackers

Page 6: Security and Hacking PPT
Page 7: Security and Hacking PPT

TYPES OF HACKING ATTACKS Viruses Social Engineering Worms SQL injection Trojan Horse Spoofing Social Engineering Spamming Etc..

Page 8: Security and Hacking PPT

HOW VIRUSES WORKS

Page 9: Security and Hacking PPT

HOW TROJAN HORSES WORKS

Trojan Horse is Activated when the Software or attachmentis executed.

Trojan Horse is arrives via email or software like free games

Trojan Horse release virus monitors computer activity,install backdoor or transmits information to hacker

Page 10: Security and Hacking PPT

SOCIAL ENGINEERING

Phishing Atta

ck Shoulder Surfing

Page 11: Security and Hacking PPT

PHISHING SITE

Page 12: Security and Hacking PPT

SPAMMING Sending e-mail messages in

bulk. Spamming can leave the

information system vulnerable to overload

Email Bombing : Sending huge volumes of email to an address in an attempt to overflow the mailbox 

Page 13: Security and Hacking PPT

SPYWARE KEYLOGGER

• Keylogger is the action of tracking (or logging) the keys struck on a keyboard

• Screen logging: Screenshots are taken in order to capture graphics-based information

• Webcam logger

• Mobile keyloger

Page 14: Security and Hacking PPT
Page 15: Security and Hacking PPT

COUNTERMEASURE OF ATTACKS Firewall

Intrusion Detection System

Encryption

Awareness

Page 16: Security and Hacking PPT

FIREWALL

• Controls incoming and outgoing network traffics

• Builds a bridge between two networks or with external network

Page 17: Security and Hacking PPT

INTRUSION DETECTION SYSTEM

• Monitors malicious activity, policy violation and produces reports to management system

• Policy formation

Page 18: Security and Hacking PPT

ENCRYPTION

Page 19: Security and Hacking PPT

TOP TEN MOST-DESTRUCTIVE COMPUTER VIRUSES Stuxnet Conficker Virus Zeus PoisonIvy MyDoom Slammer Code Red I LOVE YOU Melissa Oompa-A

Page 20: Security and Hacking PPT

ANYNOMOUS

Page 21: Security and Hacking PPT

PROTECT YOURSELF FROM HACKERS

Keep Your Firewall Turned On Install or Update Your Antivirus

Software Never save any password Use strong passwords Don't use the same password for

everything. Do not give out your IP address Secure your Wifi network

Page 22: Security and Hacking PPT

Recommended