cyber ppt

17
Cyber Security In Cyber Security In Modern World . Modern World . Second Year Of Computer Second Year Of Computer Engineering. Engineering. Imperial College Of Engineering And Imperial College Of Engineering And Research,, Wagholi, Nagar Road. ,Pune-421207. Research,, Wagholi, Nagar Road. ,Pune-421207. Submitted by... Submitted by... Mr.Mandar pathrikar. Mr.Mandar pathrikar.

Upload: mandar-pathrikar

Post on 29-Nov-2014

9.398 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Cyber ppt

Cyber Security In Cyber Security In Modern World .Modern World .

Second Year Of Computer Engineering.Second Year Of Computer Engineering.

Imperial College Of Engineering And Research,, Wagholi, Nagar Imperial College Of Engineering And Research,, Wagholi, Nagar Road. ,Pune-421207.Road. ,Pune-421207.

Submitted by...Submitted by... Mr.Mandar Mr.Mandar

pathrikar.pathrikar.

Page 2: Cyber ppt

Growing problem in Growing problem in cyber worldcyber world

Computer worms Computer worms and viruses.and viruses.

Password cracking.Password cracking. Unauthorized Unauthorized

network access.network access. Interception and Interception and

fabrication of fabrication of emails.emails.

Theft of passwords.Theft of passwords. Unauthorized Unauthorized

accessaccess

Page 3: Cyber ppt

Software Available In Market Software Available In Market

Who Affect The Who Affect The Cyber CrimeCyber Crime

1. Brute force attack.1. Brute force attack. Brute force attack is a Brute force attack is a

method of defeating a method of defeating a cryptographic scheme by cryptographic scheme by trying a large number of trying a large number of possibilities. possibilities.

It is exhaustively working It is exhaustively working through all possible keys through all possible keys in order to decrypt a in order to decrypt a message.message.

Page 4: Cyber ppt

Actual window of brute Actual window of brute forceforce

  

Page 5: Cyber ppt

USA cyber security.USA cyber security.

Great features provided in the USA Great features provided in the USA security.security.

1.1. Strong Authentication.Strong Authentication.

2.2. Snort center & their working for Snort center & their working for government.government.

Page 6: Cyber ppt

1 . Strong Authentication1 . Strong Authentication

Government agencies must be able to Government agencies must be able to authenticate and authorize internal and authenticate and authorize internal and external users and reliably secure online external users and reliably secure online data exchanges, transactions, and data exchanges, transactions, and communications.communications.

Provide the PIK ,to the user.Provide the PIK ,to the user. Encryption is able to transform data into a Encryption is able to transform data into a

form that makes it almost impossible to form that makes it almost impossible to read it without the right keyread it without the right key

Page 7: Cyber ppt

Snort Center & their Snort Center & their working.working.

Page 8: Cyber ppt

Snort Center & their Snort Center & their working.working.

Snort Centers in their company so Snort Centers in their company so that they can easily detect this that they can easily detect this crime happening in the small part.crime happening in the small part.

The Snort Centers are find out those The Snort Centers are find out those pc whose directly changes their pc whose directly changes their path of working, and notepath of working, and note

down address of that ,working pc down address of that ,working pc & on that basis investigation & on that basis investigation occurred.occurred.

Page 9: Cyber ppt

How to Monitor Cyber How to Monitor Cyber Crime. Crime.

1.1. The Radar Page.The Radar Page.

2.2. Nessus vulnerability scannerNessus vulnerability scanner

Page 10: Cyber ppt

The Radar Page.The Radar Page.

Page 11: Cyber ppt

The Radar Page.The Radar Page. The latest Information Security Threats , in The latest Information Security Threats , in

whole world only USA and Europe is using that whole world only USA and Europe is using that is radar page developed by Security Wizardry is radar page developed by Security Wizardry PortalPortal. .

In simple word if we explain the radar page in In simple word if we explain the radar page in that we can say that, it work like a simple that we can say that, it work like a simple radar but, it have full control on the data radar but, it have full control on the data transformation system.transformation system.

In every 20sec. This page is updated.In every 20sec. This page is updated. If any where in the network free downloading If any where in the network free downloading

is going on then within an 20sec. It will tract is going on then within an 20sec. It will tract their address.their address.

Page 12: Cyber ppt

2. Nessus vulnerability 2. Nessus vulnerability scanner.scanner.

ff

Page 13: Cyber ppt

Nessus vulnerability Nessus vulnerability scannerscanner

Nessus vulnerability scanner is the system Nessus vulnerability scanner is the system which play very important roll in US cyber which play very important roll in US cyber world.world.

Now what exactly this scanner doing ,when Now what exactly this scanner doing ,when any company send the data from or product any company send the data from or product from their server to the client ,this all data is from their server to the client ,this all data is send in terms of packets, if any hacker are send in terms of packets, if any hacker are link with this network and stolen the data, link with this network and stolen the data, the information regarding hacker is send to the information regarding hacker is send to the main console computer of the Nessus the main console computer of the Nessus vulnerability scanner.vulnerability scanner.

Page 14: Cyber ppt

Crimes Happen in Cyber Crimes Happen in Cyber world.world.

Today I am going to tell you about the famous Today I am going to tell you about the famous crime in the history of cyber world.crime in the history of cyber world.

The name of that engineer is “The name of that engineer is “zxeerzxeer”. he divides ”. he divides the sub module in all his group members, but the sub module in all his group members, but testing part, he keep it for himself.testing part, he keep it for himself.

He made a small software in that database. In He made a small software in that database. In that database information about every client is that database information about every client is saved .the money which is available after decimal saved .the money which is available after decimal point is collected from everyone account and it point is collected from everyone account and it will saved in the who is the last client available in will saved in the who is the last client available in that database. His name is started from “z” so that database. His name is started from “z” so that all that money is saved in his account .that all that money is saved in his account .

Page 15: Cyber ppt

Crimes Happen in Cyber Crimes Happen in Cyber worldworld

But after some year the person whose But after some year the person whose name is “name is “zzeer”zzeer” is open account in that is open account in that bank, he found that his account money is bank, he found that his account money is automatically increasing then he reported automatically increasing then he reported to bank. After checking the software they to bank. After checking the software they understand that the some software is understand that the some software is added into it who collect the money which added into it who collect the money which is available after the decimal digit from all is available after the decimal digit from all account ,in that period he earn $2billion.account ,in that period he earn $2billion.

  

Page 16: Cyber ppt

PreventionsPreventions USING INTRUSION ALERT PROGRAMS-: USING INTRUSION ALERT PROGRAMS-: They need to be They need to be

operating constantly so that all unusual behavior on network is operating constantly so that all unusual behavior on network is caught immediately. caught immediately.

USING ENCRYPTION-: USING ENCRYPTION-: Encryption is able to transform data Encryption is able to transform data into a form that makes it almost impossible to read it without the into a form that makes it almost impossible to read it without the right key. This key is used to allow controlled access to the right key. This key is used to allow controlled access to the information to selected people.information to selected people.

PASSWORD-: PASSWORD-: Password should be charged with regular interval Password should be charged with regular interval of time and it should be alpha numeric and should be difficult to of time and it should be alpha numeric and should be difficult to judge. judge.

USING NETWORK SCANNING PROGRAMS-: USING NETWORK SCANNING PROGRAMS-: we all should we all should install all this software in our computer so that we can get the install all this software in our computer so that we can get the information about warms and Trojan in the network, so it is very information about warms and Trojan in the network, so it is very beneficial for our network system.beneficial for our network system.

Page 17: Cyber ppt

ConclusionConclusion . .

At thee last I want to conclude that if At thee last I want to conclude that if our government include private sectors our government include private sectors for securing the cyber world then ,It is for securing the cyber world then ,It is great development in the cyber world.great development in the cyber world.

If we really want to improve our If we really want to improve our technology then we have to take this technology then we have to take this steps.steps.

Employment is also available at larger Employment is also available at larger amount.amount.

Education of consumer and industry Education of consumer and industry players about anti-crime measures.players about anti-crime measures.