Internet security powerpoint
description
Transcript of Internet security powerpoint
![Page 1: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/1.jpg)
By Arifa Ali, Hannah Buckley, Paul Byrne and Matthew Hastie
Internet Security
![Page 2: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/2.jpg)
Ethical Hacking & Black Hat HackingTypes of Hacking/Data TheftStatistics/Examples of AttacksSkills Required to Prevent AttacksMeasures to Prevent Attacks
Introduction
![Page 3: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/3.jpg)
Brief History Who is a hacker and what do Hackers do ? Hackers Techniques System Hacking, Network Hacking, Software Hacking
Outline
![Page 4: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/4.jpg)
Someone who bypasses the systems and Passwords.Taking advantage of weaknesses left in the system by
developers.This person knows computer programmingCan be a Hacker SubcultureAccess confidential informationBroadcast confidential documents e.g. Name, address,
etc.Espionage
Who is a Hacker and what can they do ?
![Page 5: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/5.jpg)
Over the internetOver Lan LocallyOfflineTheftDeceptionIp AddressesTelephoneEmail
Methods of Hacking
![Page 6: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/6.jpg)
Malicious Hackers
Villain
Violates Computer Security
Black Hat Cracker
![Page 7: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/7.jpg)
Computer Security
A Computer Hacker intending to improve security.
The Hero
White Hat Hacker
![Page 8: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/8.jpg)
List of Hackers
Black Hat Hackers ( The bad guy Violates computers)
White Hat Hackers (The Hero Breaks security for good reasons)
Blue Hat Hacker (consults firms, system tested before launch)
Grey Hacker(Mixture of white & Black offers their service to improve for a small fee)
Hacktivist (Utilizes Technology)
Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature
Elite Hacker (The most skilled Hacker)(Masters of deception)
Ethical Hacker(employee and authorised Hacker)
Bots ( software tools the hackers use )
![Page 9: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/9.jpg)
SQL Injection
•SQL injection is a type of attack often used against data driven applications. •It is a technique that exploits an applications security weaknesses.•Used to steal databases full of credit card information, passwords, or personal details.
![Page 10: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/10.jpg)
DDOS Attacks
•Distributed Denial of Service.•Used to make a machine or network resource inaccessible to users.•DDOS attacks usually utilise botnets.
![Page 11: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/11.jpg)
Social Engineering
•Social engineering is the art of manipulating people into divulging personal and confidential information. •Requires very little technical skill.•Relies heavily on human interaction to get results.•Most often used in tandem with other exploits.
![Page 12: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/12.jpg)
Malware and Viruses
•Malicious Software.•Used by an attacker to steal data, disrupt operations or access a private network.•Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.
![Page 13: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/13.jpg)
Computer Virus
•Any computer program that can replicate itself and spread from one computer to another without input from its creator.•Needs to attach itself to an existing program in order for it to work.•They are used to deliver many different payloads.
![Page 14: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/14.jpg)
Computer Worm
•A program similar to a virus; it can replicate itself and spread from one computer to another.•Unlike a virus a worm does not need to be attached to an existing program in order to function.•Always cause harm to the network, even if it is just increased bandwidth consumption, whereas a virus will always corrupt and/or modify files on a computer.
![Page 15: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/15.jpg)
Trojan Horse
•A program that pretends to do one thing, but in reality does something else.•Used to record keystrokes input by a user•Can be used to steal usernames, passwords, credit card information, personal details and so on.•Usually employ a form of social engineering.
![Page 16: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/16.jpg)
Firewalls
•Program used to monitor network traffic. •Have a set of rules that they use to filter packets trying to enter the network.•Usually placed between a trusted network and one that is less trusted.
![Page 17: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/17.jpg)
Antivirus Software
•Used to prevent access to computer systems by unwanted programs.•Utilises many different methods to protect the computer.•Often search for signs of viruses on every website that is visited and do regular scans of the computer to check for infections.
![Page 18: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/18.jpg)
Password Cracking-Attempting to guess a password using a program.• Brute Forcing-A program that guesses a password by
inputting as many randomly generated passwords using the computer’s processing power.
• Dictionary Hack-A program that guesses passwords based on words in a dictionary or the program’s vocabulary.
Packet Sniffing-Sniffing packets sent over the internet to gain security details over unsecured connections.
Phishing-Legitimate looking sites designed to farm information inputted by the user.
Types of Hacking/Data Theft
![Page 19: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/19.jpg)
Rootkit-Stealth software which inhibits use of programs executed by the user and hides (usually malicious) processes.
Keyloggers-records keystrokes and can be software or hardware.
Scareware-A form of software designed to scare the user into divulging information (such as credit card information) much like social engineering.
IP Spoofing-Masks the IP address of a hacker and prevents them from being found
Types of Hacking/Data Theft
![Page 20: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/20.jpg)
StatisticsAttacks on the increaseIn 2010 431 million adults worldwide were victims of
cyber crimeCosts 114 billion pounds worldwideCosts U.K 27 billion pounds a year10.5% of the worlds hackers are from the U.K
![Page 21: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/21.jpg)
StatisticsIn Brazil 83% of the population have suffered from
internet crime.
America is not far behind with 73% falling victim to internet crime.
Cyber crime can be down to anyone from professional criminals to teenagers
![Page 22: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/22.jpg)
Annual Damage Costs
![Page 23: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/23.jpg)
StatisticsApril 2011 Sony Play station network shut down due to
external intrusion
Password is crucial
More letters, numbers and characters in a password the harder it is to crack
![Page 24: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/24.jpg)
Yearly amount of internet fraud
![Page 25: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/25.jpg)
Skills to prevent cyber crimeSpam blockerAnti Virus softwareFirewall protectionEncryption softwareCaution in providing personal informationSecure ShoppingAvoidance of scansMonitoring of your child’s computer activities
![Page 26: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/26.jpg)
Employ more skilled individuals• Pros: Eliminates the need on relying on a small number of
people• Cons: Very costly
Improve education on internet security and/or lower costs for fees
Job Awareness-people are not aware certain jobs are available
Higher starting wages to give potential employees an incentive
Measures to reduce shortage of skills
![Page 27: Internet security powerpoint](https://reader033.fdocuments.in/reader033/viewer/2022061122/54701d22af7959aa1f8b460b/html5/thumbnails/27.jpg)
Any Questions?
Conclusion