hack proof yourself !!!!

17
Technocrats institute of Technology Submitted by Vishwaraj Bhattrai 0191cs131118 Class-CS 2 Sem-3rd Submitted to Prof. Arjun Rajput

Upload: vraj

Post on 19-Jul-2015

154 views

Category:

Education


2 download

TRANSCRIPT

Technocrats institute of Technology

Submitted by Vishwaraj Bhattrai0191cs131118Class-CS 2Sem-3rd

Submitted to Prof. Arjun Rajput

Hack Proof yourself !!!!

Moto –hack and secure it

Why it is important to know ?

• Shopping• Online transactions• Banking• Social Networking

Every thing is being putted online

All Just i

n

Risk

Overview

• Social Engineering

• Men in the Middle Attack

• Secure your pc.

• Secure your online account.

• Security measures over mobile .

What is Social Engineering ??

How attack is being carried out ?

Attacker will give you a candy (greed)

It could be an offer about product or ,lottery.In that greed you will give your credentials.

Real world examples and defense’s to them

• Email from a friend

• The message may notify that you are a winner (lottery)

• Urgently ask for help

• Foreign offers are fake

• Research the fact

Reject requests for help or offers for help

Men in the Middle Attack ?• It is a kind of cyber attack where a malicious

actor inserts him/herself into a conversation between two parties impersonate both parties and gain access to the information that the two parties were trying to send each other .

Consequences of attack and defenses

• The attack will lead to Session hijacking (stealing of your cookies and logging into your account )

• Many sensitive data specially when you are shopping (like your credit card number and pin)

• Mitm act as a silent attack and its prevention is difficult because user dosen’t know who are in network so only possible way is to have strong encryption between client and a server .

Attacks towards systems

Common steps to Secure your home pc• Install a good antivirus software

• Bit defender ,Norton,Microtrend,Webroot (2014)

• Close all the unwanted ports in your computer.

• Choose a secure web browser • Chrome ,firefox .( worth to use them)• Keep a strong user account password.

• Always keep your firewall active (like comodo etc)

• Set up honeyspot ,IDS.

Secure your online account’s

Keep a two step verification (available in facebook,gmail)

Keep password in a good password manager (last pass 3.0)

Security measure’s at café’s

• Always try to browse in private mode of the browser .

• Before leaving make sure that you have properly logged out.

• Worth to do “ctrl+shift+delete” before leaving as it will delete your active cookies and browsed history so that any other cannot access your account.

Android os • A mobile device is more close to you rather then

you pc• Android is the king of mobile os more than 82%

of mobile devices runs android.• Due to its simplicity and user friendly nature it

has undergone wide acceptance.• Samsung,htc,sony one of the top vendors.• But due its wide reach to public and its open

source strategy many malwares and viruses are being developed for it and affecting the end users .

Ways to identify viral apps • Unwanted ads• Dataspikes • Unusally high bills• Apps you did’nt ask for • Apps that use

unnecessary function• Strange atctivity on

online accounts

Some awesome security and data hiding apps for android

• ESSET mobile security

• 360 mobile security

• Avast mobile security

• Avira mobile security

• AVL mobile security

• Vault

• Gallery lock pro

• Secure chat

• Resources www.kasperskylab.co.in

• Wiki www.wikipedia.com