internet security
DESCRIPTION
A brief introduction on Internet Security. After viewing this presentation you would able to find answer for the below questions... !!! How are credit cards getting hacked ? How are emails getting hacked? How are computers getting hacked ? Regards AvnishTRANSCRIPT
![Page 1: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/1.jpg)
![Page 2: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/2.jpg)
Hacking & Cracking. Story. How to prevent yourself from getting
Hacked› Key-Loggers› Trojan› Sniffer› Phishing› Office Password Recover› Credit Cards Fraud
Ways to protect your home computers.
![Page 3: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/3.jpg)
What Is Hacking…. ?
What Is Cracking… ?
Who are Hackers… ?
Who Are Crackers…?
![Page 4: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/4.jpg)
Hacking is penetrating into someone's system with their permission and a purpose of securing it.
Hackers are the one who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
![Page 5: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/5.jpg)
Cracking is penetrating into someone's system without their permission just for fun or to harm that system and get some crucial data…
Crackers are smart as hackers but they lack in ethics. They do it for their own amusement and with wrong intentions… They are bad guys.
![Page 6: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/6.jpg)
A 13 year old hacker in US with his other friend used to hack for fun. They always enjoyed breaking into other’s system.
After few days they crossed the line and became crackers and did all sort of hacking.
They got the Privileged rights of others without their permission but fortunately for them and for us they did nothing wrong
![Page 7: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/7.jpg)
![Page 8: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/8.jpg)
They are the zillionaries of world and their name’s are
Mr. Bill Gates & Mr. Paul Allen
![Page 9: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/9.jpg)
![Page 10: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/10.jpg)
Hackers use Key-Loggers often to hack into systems.
Its very easy to use key-logger, One can install this software anywhere & can hack PC.
Lets see a Demo for this .. !!!!
![Page 11: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/11.jpg)
![Page 12: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/12.jpg)
Avoid going to Net-Café. Don’t use Un-trusted friends Laptop OR
computer. Incase you go to Net-café check for
TASK-MANAGER and check what all processes are running.
SVCHOST.EXE
![Page 13: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/13.jpg)
![Page 14: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/14.jpg)
A Trojan is a program that may appear to be a normal program, but in fact does something malicious.
Trojans are often used to gain backdoor. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.
They simply give access to some Hacker OR Cracker.
![Page 15: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/15.jpg)
Don’t open unknown Emails (Specially Forwarded email which are zipped)
Don’t Accept any file from friends while you are talking to him online.
Checkout for SVCHOST.EXE file which is always attacked by Trojan file.
![Page 16: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/16.jpg)
A program and/or device that monitors data traveling over a network. Sniffers are used for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
![Page 17: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/17.jpg)
Sniffers are use to Sniff packets Espically used in wi-fi connection. You can simply run any sniffer and
capture the packet within your network or outside network
Tools:- Etheral, Natas, Tcpdump
![Page 18: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/18.jpg)
Don’t connect to unknown Wifi Network. If you are using Wifi Network, make it
password protected. In-case if you are using unknown or un-
trusted Wifi connection better don’t do any credit card transactions or any other payment mode.
Change your password if you have used un-trusted or unknown Wifi Connection
![Page 19: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/19.jpg)
![Page 20: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/20.jpg)
The act of sending an e-mail to a user falsely and an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers. The Web site, however, is bogus and set up only to steal the user’s information.
![Page 21: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/21.jpg)
![Page 22: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/22.jpg)
![Page 23: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/23.jpg)
Phishing email From: *****Bank
[mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank
Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you.
https://infinity.*****bank.co.in/Verify.jsp****** Bank Limited
![Page 24: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/24.jpg)
Always check url before login into any services.› E.g
www.gmail.com might be www.gmaiil.com www.gmail.com might be www.gmails.com www.gmail.com might
bewww.mail.login.gmail.com
Use Anti Phishing Software. Don’t open any URL blindly which you
get in your email.
![Page 25: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/25.jpg)
People have a bad Habit of giving password, and forgetting the password of office application as they rarely use them.
Here what Office password recovery helps you… (Live Demo)
You can find password Software: - Advance office password
recovery
![Page 26: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/26.jpg)
1. Dictonary Attack2. Brute force attack
3. Brute force with mask
![Page 27: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/27.jpg)
Places where your credit cards can get hacked.› Restaurant.› Petrol pumps. › Shopping malls. › Computers.› iBanking.› Online Fund Transfer.› Credit Card Booking› ATM Machine
![Page 28: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/28.jpg)
![Page 29: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/29.jpg)
![Page 30: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/30.jpg)
FALSE slot Fixed tothe original cardslot. (Same colorand sticker ).Contains additionalcard reader to copyyour cardinformation ..andduplicate your card
![Page 31: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/31.jpg)
![Page 32: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/32.jpg)
32
![Page 33: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/33.jpg)
You simply have to type credit card number into www page off the vendor for online transaction
If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card
![Page 34: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/34.jpg)
![Page 35: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/35.jpg)
Use anti-virus software and firewalls - keep them up to date
Use Nod32, Avast, Norton, Kaspersky,Macfee…
![Page 36: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/36.jpg)
Use Original Windows Version, Avoid Piracy of Windows.
Regularly keep updating all softwares
Keep your operating system up to date with critical security updates and patches
This help to patch up the loopholes or vulnerabilities, which reduces hacking attempts
![Page 37: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/37.jpg)
Don't open emails or attachments from unknown sources.
If u don’t know the person whom u have received mail avoid it, or delete it.
Don’t open attachment from mail directly.
Don’t open and website link if you get and unknown person mail
![Page 38: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/38.jpg)
Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist.
As we have already checked how dictonary attack works.
The same formula would be aplied to crack Email passwords…
![Page 39: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/39.jpg)
Still people keep their password as their:-
Pet name Combination of their name+Birthday Combination of name+bike no Some write their password at the back
of keyboard or monitor etc…
![Page 40: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/40.jpg)
Always keep password having combination of upper case + lower case + Numbers + special characters
A password should be atleast 8-10 character long
E.g. Gur122-@
![Page 41: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/41.jpg)
• Don't share access to your computers with strangers
• If a stranger tries to use your computer and hack anything its ur MAC address is recorded. And Mac address can be traced
![Page 42: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/42.jpg)
Disconnect from the Internet when not in use
Update ur security on a regular basis
Make sure your employees and family members know this info too!
![Page 43: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/43.jpg)
Back-up your computer data on disks or CDs often.
Because after all no computer is 100% secure.
As we say “prevention is better than cure”
Follow this rule.
![Page 44: Internet Security](https://reader037.vdocument.in/reader037/viewer/2022110119/5562df5ad8b42a38778b45af/html5/thumbnails/44.jpg)
Any Question… ?