Internet Security in Web 2.0
-
Upload
arjunsinh-sindhav -
Category
Internet
-
view
282 -
download
1
Transcript of Internet Security in Web 2.0
INTERNET SECURITY Professor name: Ing. Petr Banda, Ph.D, Maria Persenkiya Nastassia Makarava
OUTLINE:
What is hacking? Who is a hacker and what do Hackers
do ? Methods of Hacking Statistics/Examples of Attacks Types of viruses, malware, Trojan
horses Measures for internet security Conclusion
HELLO! I AM A HACKER! Hacker - Person who gains
authorized/unauthorized access to a computer WITHOUT seeming of causing damage.
Hacking is the gaining of access to a computer and viewing, copying, or creating data(leaving a trace) without the intention of destroying data or maliciously harming the computer.
WHAT DO HACKERS DO ? The passes the systems and Passwords.
Taking advantage of weaknesses left in the system by developers. This person knows computer programming and Access confidential information to Broadcast confidential documents.
e.g. Name, address, etc. Espionage
GROWING COMPLICATED THREATS “Love Letter” worm May 2000;
more than 650 individual sites indicating more than 500,000 individual systems are affected
“SQL Slammer” worm January 2003
crashed the Internet and infected roughly “75,000 systems within 15 minutes” on all systems running Microsoft Windows, considerable network degradation huge amount of damages and clean up costs
METHODS OF HACKING
Over the internet Over Lan Locally Offline Theft Deception Ip Addresses Telephone Email
TYPES OF HACKERS! Black Hat Hackers ( The bad guy Violates computers)
White Hat Hackers (The Hero Breaks security for good reasons)
Blue Hat Hacker (consults firms, system tested before launch)
Grey Hacker(Mixture of white and Black offers their service to improve for a small fee)
Hacktivist (Utilizes Technology)
Script Kiddie (Skiddie)Kid- Child lacking knowledge, Immature
Elite Hacker (The most skilled Hacker)(Masters of deception) Ethical Hacker(employee and authorised Hacker) Bots ( software tools the hackers use )
BLACK HAT HACKER
Malicious Hackers Villain Violates Computer Security
WHITE HAT HACKER Computer Security A Computer Hacker intending to
improve security. The Hero
TYPES OF HACKING. Password Cracking-Attempting to guess a password using a program.
Brute Forcing-A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power.
Dictionary Hack- A program that guesses passwords based on words in a dictionary or the program’s vocabulary.
Packet Sniffing- Sniffing packets sent over the internet to gain security details over unsecured connections.
Phishing-Legitimate looking sites designed to farm information inputted by the user.
WAYS OF HACKING! SQL INJECTION DDOS ATTACKS SOCIAL ENGINEERING
SQL INJECTION SQL injection is a type of attack often
used against data driven applications. It is a technique that exploits an
applications security weaknesses. Used to steal databases full of credit
card information, passwords, or personal details
DDOS ATTACKS
Distributed Denial of Service. Used to make a machine or network
resource inaccessible to users. DDOS attacks usually utilise botnets.
SOCIAL ENGINEERING
Social engineering is the art of manipulating people into divulging personal and confidential information.
Requires very little technical skill. Relies heavily on human interaction to get results.
Most often used in tandem with other exploits.
MALWARE AND VIRUSES
Malicious Software. Used by an attacker to steal data,
disrupt operations or access a private network.
Used to describe many different types of software including viruses, worms, Trojans, keyloggers, spyware and others.
COMPUTER VIRUSES Any computer program that can
replicate itself and spread from one computer to another without input from its creator.
Needs to attach itself to an existing program in order for it to work.
They are used to deliver many different payloads.
COMPUTER WORM A program similar to a virus; it can replicate
itself and spread from one computer to another.
Unlike a virus a worm does not need to be attached to an existing program in order to function.
Always cause harm to the network, even if it is just increased bandwidth consumption, where as a virus will always corrupt and/or modify files on a computer.
TROJAN HORSE
A program that pretends to do one thing, but in reality does something else.
Used to record keystrokes input by a user
Can be used to steal usernames, passwords, credit card information, personal details and soon.
Usually employ a form of social engineering.
HOW TO PROTECT? Firewall
Program used to monitor network traffic.
Have a set of rules that they use to filter packets trying to enter the network.
Usually placed between a trusted network andone that is less trusted.
ANTIVIRUS Used to prevent access to computer
systems by unwanted programs. Utilises many different methods to
protect the computer. Often search for signs of viruses on
every website that is visited and do regular scans of the computer to check for infections.
HOW ANTIVIRUS WORKS?
Scanning -- Allows user to analyze all the files one at a time and to check them in order to see if they contain a virus.
Real-time monitoring -- This antivirus feature is constantly active, constantly monitoring to keep any suspect file at bay. Express repair – Once it detects an infected virus, an antivirus will first quarantine it in order to prevent it from multiplying .
File scanning – scan all files on computer .
Download scanning – scan all files that are being download form a ftp site .Heuristic scanning – scan all usual files .Email scanning – scan all received email
ANTIVIRUS SOFTWARES:
SKILLS TO PREVENT CYBERCRIME Spam blocker Anti Virus software Firewall protection Encryption software Caution in providing personal information
Secure Shopping Avoidance of scans Monitoring of your child’s computer
activities
CONCLUSION Employ more skilled individuals Pros: Eliminates the need on relying on a small number of people Cons: Very costly
Improve education on internet security and/or lower costs for fees
Job Awareness-people are not aware certain jobs are available
Higher starting wages to give potential employees an incentive