Internet Security in Web 2.0

25
INTERNET SECURITY Professor name: Ing. Petr Banda, Ph.D, Maria Persenkiya Nastassia Makarava

Transcript of Internet Security in Web 2.0

Page 1: Internet Security in Web 2.0

INTERNET SECURITY Professor name: Ing. Petr Banda, Ph.D, Maria Persenkiya Nastassia Makarava

Page 2: Internet Security in Web 2.0

OUTLINE:

What is hacking? Who is a hacker and what do Hackers

do ? Methods of Hacking Statistics/Examples of Attacks Types of viruses, malware, Trojan

horses Measures for internet security Conclusion

Page 3: Internet Security in Web 2.0

HELLO! I AM A HACKER! Hacker - Person who gains

authorized/unauthorized access to a computer WITHOUT seeming of causing damage. 

Hacking is the gaining of access to a computer and viewing, copying, or creating data(leaving a trace) without the intention of destroying data or maliciously harming the computer. 

Page 4: Internet Security in Web 2.0

WHAT DO HACKERS DO ? The passes the systems and Passwords.

Taking advantage of weaknesses left in the system by developers. This person knows computer programming and Access confidential information to Broadcast confidential documents.

e.g. Name, address, etc. Espionage

Page 5: Internet Security in Web 2.0

GROWING COMPLICATED THREATS “Love Letter” worm May 2000;

more than 650 individual sites indicating more than 500,000 individual systems are affected

“SQL Slammer” worm January 2003

crashed the Internet and infected roughly “75,000 systems within 15 minutes” on all systems running Microsoft Windows, considerable network degradation huge amount of damages and clean up costs

Page 6: Internet Security in Web 2.0

METHODS OF HACKING

Over the internet Over Lan Locally Offline Theft Deception Ip Addresses Telephone Email

Page 7: Internet Security in Web 2.0

TYPES OF HACKERS! Black Hat Hackers ( The bad guy Violates computers)

White Hat Hackers (The Hero Breaks security for good reasons)

Blue Hat Hacker (consults firms, system tested before launch)

Grey Hacker(Mixture of white and Black offers their service to improve for a small fee)

Hacktivist (Utilizes Technology)

Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature

Elite Hacker (The most skilled Hacker)(Masters of deception) Ethical Hacker(employee and authorised Hacker) Bots ( software tools the hackers use )

Page 8: Internet Security in Web 2.0

BLACK HAT HACKER

Malicious Hackers Villain Violates Computer Security

Page 9: Internet Security in Web 2.0

WHITE HAT HACKER Computer Security A Computer Hacker intending to

improve security. The Hero

Page 10: Internet Security in Web 2.0

TYPES OF HACKING. Password Cracking-Attempting to guess a password using a program.

Brute Forcing-A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power.

Dictionary Hack- A program that guesses passwords based on words in a dictionary or the program’s vocabulary.

Packet Sniffing- Sniffing packets sent over the internet to gain security details over unsecured connections.

Phishing-Legitimate looking sites designed to farm information inputted by the user.

Page 11: Internet Security in Web 2.0

WAYS OF HACKING! SQL INJECTION DDOS ATTACKS SOCIAL ENGINEERING

Page 12: Internet Security in Web 2.0

SQL INJECTION SQL injection is a type of attack often

used against data driven applications. It is a technique that exploits an

applications security weaknesses. Used to steal databases full of credit

card information, passwords, or personal details

Page 13: Internet Security in Web 2.0

DDOS ATTACKS

Distributed Denial of Service. Used to make a machine or network

resource inaccessible to users. DDOS attacks usually utilise botnets.

Page 14: Internet Security in Web 2.0

SOCIAL ENGINEERING

Social engineering is the art of manipulating people into divulging personal and confidential information.

Requires very little technical skill. Relies heavily on human interaction to get results.

Most often used in tandem with other exploits.

Page 15: Internet Security in Web 2.0

MALWARE AND VIRUSES

Malicious Software. Used by an attacker to steal data,

disrupt operations or access a private network.

Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.

Page 16: Internet Security in Web 2.0

COMPUTER VIRUSES Any computer program that can

replicate itself and spread from one computer to another without input from its creator.

Needs to attach itself to an existing program in order for it to work.

They are used to deliver many different payloads.

Page 17: Internet Security in Web 2.0

COMPUTER WORM A program similar to a virus; it can replicate

itself and spread from one computer to another.

Unlike a virus a worm does not need to be attached to an existing program in order to function.

Always cause harm to the network, even if it is just increased bandwidth consumption, where as a virus will always corrupt and/or modify files on a computer.

Page 18: Internet Security in Web 2.0

TROJAN HORSE

A program that pretends to do one thing, but in reality does something else.

Used to record keystrokes input by a user

Can be used to steal usernames, passwords, credit card information, personal details and soon.

Usually employ a form of social engineering.

Page 19: Internet Security in Web 2.0

HOW TO PROTECT? Firewall

Program used to monitor network traffic.

Have a set of rules that they use to filter packets trying to enter the network.

Usually placed between a trusted network andone that is less trusted.

Page 20: Internet Security in Web 2.0

ANTIVIRUS Used to prevent access to computer

systems by unwanted programs. Utilises many different methods to

protect the computer. Often search for signs of viruses on

every website that is visited and do regular scans of the computer to check for infections.

Page 21: Internet Security in Web 2.0

HOW ANTIVIRUS WORKS?

Scanning -- Allows user to analyze all the files one at a time and to check them in order to see if they contain a virus.

Real-time monitoring -- This antivirus feature is constantly active, constantly monitoring to keep any suspect file at bay. Express repair – Once it detects an infected virus, an antivirus will first quarantine it in order to prevent it from multiplying .

File scanning – scan all files on computer .

Download scanning – scan all files that are being download form a ftp site .Heuristic scanning – scan all usual files .Email scanning – scan all received email

Page 22: Internet Security in Web 2.0

ANTIVIRUS SOFTWARES:

Page 23: Internet Security in Web 2.0

SKILLS TO PREVENT CYBERCRIME Spam blocker Anti Virus software Firewall protection Encryption software Caution in providing personal information

Secure Shopping Avoidance of scans Monitoring of your child’s computer

activities

Page 24: Internet Security in Web 2.0

CONCLUSION Employ more skilled individuals Pros: Eliminates the need on relying on a small number of people Cons: Very costly

Improve education on internet security and/or lower costs for fees

Job Awareness-people are not aware certain jobs are available

Higher starting wages to give potential employees an incentive

Page 25: Internet Security in Web 2.0