cyber security and its defense
TRANSCRIPT
![Page 1: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/1.jpg)
PRESENTED BY S.PARSHURAM
FOR MORE INFORMATIONPING ME ATFB:WWW.FACEBOOK.COM/198.168.0.OWWW.CYBERTECHPCBLOG.WORDPRESS.COMWWW.CYBERTECHPC.BLOGSPOT.COM
![Page 2: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/2.jpg)
CYBER SECURITY AND ITS DEFENSE
BYS.PARSHURAM REDDY
![Page 3: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/3.jpg)
WHAT IS CYBER SECURITY• As we know present generation totally depend upon the computer • And also there is also increase of security for these computers• Illegal activity to these systems are called as CYBER SECUIRITY• so how to protect our self from it• And also there is a proverb that there will be no 100%secuirity to any
systems• But we can be increase our vulnerability of our systems
![Page 4: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/4.jpg)
TYPES OF CYBER ATTACKS• Brute forcing attacks• Sql injection• Social engineering(pishing)• Dictionary attacks & shoulder surfing• Virus or worms• Ransomware• Man in the middle attack• Direct denial of service (DDOS) attack • Email and software forgering
![Page 5: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/5.jpg)
HISTORY• The fisrt recorded cyber crime was recorded in year 1820• The first spam email took in 1978 when it was sent over Arpanet• The first virus was installed on a apple computer in 1982
![Page 6: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/6.jpg)
DICTIONARY ATTACK• It is a type of attack in which hacker uses a dictionary
to crack password• This type of attacks are not so effective • And also time taken process
![Page 7: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/7.jpg)
SHOULDER SURFING• A tried and true method of
gaining acess• In this type of attacks
passwords are leaked by observing our shoulders• When typing password
![Page 8: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/8.jpg)
SNIFFING & PORT SCANNING SNIFFING
Sniffing a process of capturing and analyzing the traffic in a network
PORT SCANNINGIt is a method to probe a system for open ports
Intruder can exploit the vulnerabilities of open ports
![Page 9: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/9.jpg)
VIRUS AND WORMS• Virus and worms are the programs coded in such a way that the
its take control of whole system • Its size is 1 kb!!!!!!
![Page 10: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/10.jpg)
BRUTE FORCING ATTACK• It is method of cracking password
same as dictionary attack• But trying with number and symbols
![Page 11: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/11.jpg)
SQL INJECTION• It’s a type of attack to take
advantage of ur database• And copy your credentials and
perform hacking
![Page 12: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/12.jpg)
A BRIEF ABOUT SOCIAL ENGINEERING ATTACKS• In a word I can say that”a lazy click can smash your
career” • Clever manipulation of natural human tendency to trust• Here is example of cloning a website facebook• Actually its not a original page it’s a • Pished page
![Page 13: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/13.jpg)
RANSOMWARE• Ran+sum+ware• Its is type of attck where hacker
gain access and encrypts all data() and demands money if admin wants the data back
![Page 14: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/14.jpg)
MAN IN THE MIDDLE• Its atype oh hacking where
hackers capture network flow this is called as sniffing• Then acts as a middle man
between server and client and obtain passwords
![Page 15: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/15.jpg)
DDOS(DISTRIBUTED DENIAL OF SERVICE)
• Distributed DoS attack. A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
![Page 16: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/16.jpg)
EMAIL SPOOFING AND SOFTWARE FORGERING
• this is a part of social engineering attacks• In these type of attacks email are
forgeries and spammed by malicious virus and RATS• Same in the case of software's. When we
install software's the actual software does not install but other programs get installed in background
![Page 17: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/17.jpg)
PROTECTION FROM THESE ATTACKS• Before download in any thing check its
certificate• Do not open any mails of any
anonymous persons
![Page 18: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/18.jpg)
• Improve ips and ids • Keep different passwords for every account• Frequently change ur passwords atlest ones for month• If u found any odd file delete them immediately • Perform antivirus scan every day• If u observe that if ur pc lags and slows down scan ur pc and delete
new files that were created just before system lags
![Page 19: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/19.jpg)
A uQ ERI SENY
![Page 20: Cyber security and its defense](https://reader035.vdocuments.us/reader035/viewer/2022070601/58880db71a28ab083c8b46bb/html5/thumbnails/20.jpg)