Information security Presentation

23
Information Security By: • Dhirendra Kumar

description

This Presentation is all about internet hacking as well as security.

Transcript of Information security Presentation

Information Security

By: • Dhirendra Kumar

Contents:

• Information Security

• Need of Protection

• Hackers

• Type of Hackers

• Hack Attacks

• Live Hacking

• How to get rid of it

What Is Information Security

• Process by which digital information assets are protected

• Area which is very sensitive: Policies and procedures, authentication,

attacks, remote access, E-mail, Web, wireless, devices, media/medium, secure architectures, IDSes/IPSes, operating systems, secure code, Cryptography, physical security, digital media analysis…

Why protection is important?

•Increased Networked Environment and Network base application

•Evolution of Technology has focus primarily on each of use•Everything and also everyone interested to work online.

How is Information Lost?

McAfee Survey Results 2007McAfee Survey Results 2007

•Only 23% malicious (65% of this, an inside job!)

•Only 8% of total loss due to Hacking, Phishing etc

•77% an ‘accident’ or ‘only doing my job?’

Hackers

•A Hacker is a person intensely interested in the arcane and recondite workings of any computer operating system.•Hackers have Good Knowledge of almost every operating System.

Type Of Hackers.

There are Three Type of Hackers:

1.White Hat Hacker2.Gray Hat Hacker3.Black Hat Hacker

1.White Hat Hackers: :They are also known as Ethical Hackers

3.Black Hat Hackers:-

A Black hat hackers is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent.

2.Gray Hat Hackers: It’s depends on his/her Situations

How much damagescan a security breach cause

• 44% of UK businesses suffered at least one malicious security breach in 2002(now 50%)

• The average cost was £30,000

• Several cost more than £500,000

• and these are just the reported incidents …!

Source: The DTI Information Security Breaches survey

Type of Lost Information?

Online Hacking

• Main target of Hackers is to down the Website. And steal confidential information .

• Steal Money online by using fraud Banking site.(phishing) Etc……..

Difference between them

• Cracker: a malicious system security breaker.

• Hacker: a person enjoying exploring the systems and stretching their capabilities; programmer enthusiast; good fast programmer; expert in a specific field

Thinking of Hackers

• KISS Principle: “Keep It Simple, Stupid”

• Trojan Horse: a malicious security breaking program that makes backdoor for the Hackers.

• Wetware: humans and our nervous system compared to software and/or hardware

The Three Laws of Secure Computing(according to us)

1. Don't buy a computer.

2. If you do buy a computer, don't plug it in.

3. If you do plug it in, sell it and return to step 1

Before Hacking site looks like

After Hacking Site looks like..

Live Hacking with Win7

• Change Any computer password without knowing the old password

Try to get rid of it

• Do not allow unknown to use your Personal computer if there is any confidential Information.

• If you have any site then secure your Administrator area with security application or methods.

• Online hacking is very common so Do not Share your password to any one. Even your girlfriend.

Try to get rid of it (continue…)

• Do not Download any unknown files from your e-mail attachment ..

• If you are clicking on the link for login in to any page from your e-mail then check the address bar.

• Install best Firewall in your server/computer system..

Try to get rid of it (continue…)

• Do not send your any kind of information to unknown person on Internet (Facebook,gmail,yahoo…….etc)

• Beware to the Social engineering

• Do not send any kind of information on any unknown e-mail.example:-British Lottery, Coca cola prize…..etc

Bibliography

• www.wikipedia.com

• www.undergroundhackers.com

• www.ibm.com

• www.bitcollege.in (Weak security site)

• www.evilhackers.in

Acknowledgment

We are sincerely thankful to Mrs. Medha Mukhergee and Mr. Sudipto Dutta as without their support it was not possible for us to make this presentation.

Thanks for your attention ..…………..Any Question?https://www.facebook.com/DeaMonhaxoR