internet security

Post on 25-May-2015

1.709 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

A brief introduction on Internet Security. After viewing this presentation you would able to find answer for the below questions... !!! How are credit cards getting hacked ? How are emails getting hacked? How are computers getting hacked ? Regards Avnish

TRANSCRIPT

Hacking & Cracking. Story. How to prevent yourself from getting

Hacked› Key-Loggers› Trojan› Sniffer› Phishing› Office Password Recover› Credit Cards Fraud

Ways to protect your home computers.

What Is Hacking…. ?

What Is Cracking… ?

Who are Hackers… ?

Who Are Crackers…?

Hacking is penetrating into someone's system with their permission and a purpose of securing it.

Hackers are the one who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.

Cracking is penetrating into someone's system without their permission just for fun or to harm that system and get some crucial data…

Crackers are smart as hackers but they lack in ethics. They do it for their own amusement and with wrong intentions… They are bad guys.

A 13 year old hacker in US with his other friend used to hack for fun. They always enjoyed breaking into other’s system.

After few days they crossed the line and became crackers and did all sort of hacking.

They got the Privileged rights of others without their permission but fortunately for them and for us they did nothing wrong

They are the zillionaries of world and their name’s are

Mr. Bill Gates & Mr. Paul Allen

Hackers use Key-Loggers often to hack into systems.

Its very easy to use key-logger, One can install this software anywhere & can hack PC.

Lets see a Demo for this .. !!!!

Avoid going to Net-Café. Don’t use Un-trusted friends Laptop OR

computer. Incase you go to Net-café check for

TASK-MANAGER and check what all processes are running.

SVCHOST.EXE

A Trojan is a program that may appear to be a normal program, but in fact does something malicious.

Trojans are often used to gain backdoor. Trojans do not replicate as viruses do, nor make copies of themselves as worms do.

They simply give access to some Hacker OR Cracker.

Don’t open unknown Emails (Specially Forwarded email which are zipped)

Don’t Accept any file from friends while you are talking to him online.

Checkout for SVCHOST.EXE file which is always attacked by Trojan file.

A program and/or device that monitors data traveling over a network. Sniffers are used for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.

Sniffers are use to Sniff packets Espically used in wi-fi connection. You can simply run any sniffer and

capture the packet within your network or outside network

Tools:- Etheral, Natas, Tcpdump

Don’t connect to unknown Wifi Network. If you are using Wifi Network, make it

password protected. In-case if you are using unknown or un-

trusted Wifi connection better don’t do any credit card transactions or any other payment mode.

Change your password if you have used un-trusted or unknown Wifi Connection

The act of sending an e-mail to a user falsely and an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers. The Web site, however, is bogus and set up only to steal the user’s information.

Phishing email From: *****Bank

[mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank

Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you.

https://infinity.*****bank.co.in/Verify.jsp****** Bank Limited

Always check url before login into any services.› E.g

www.gmail.com might be www.gmaiil.com www.gmail.com might be www.gmails.com www.gmail.com might

bewww.mail.login.gmail.com

Use Anti Phishing Software. Don’t open any URL blindly which you

get in your email.

People have a bad Habit of giving password, and forgetting the password of office application as they rarely use them.

Here what Office password recovery helps you… (Live Demo)

You can find password Software: - Advance office password

recovery

1. Dictonary Attack2. Brute force attack

3. Brute force with mask

Places where your credit cards can get hacked.› Restaurant.› Petrol pumps. › Shopping malls. › Computers.› iBanking.› Online Fund Transfer.› Credit Card Booking› ATM Machine

FALSE slot Fixed tothe original cardslot. (Same colorand sticker ).Contains additionalcard reader to copyyour cardinformation ..andduplicate your card

32

You simply have to type credit card number into www page off the vendor for online transaction

If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card

Use anti-virus software and firewalls - keep them up to date

Use Nod32, Avast, Norton, Kaspersky,Macfee…

Use Original Windows Version, Avoid Piracy of Windows.

Regularly keep updating all softwares

Keep your operating system up to date with critical security updates and patches

This help to patch up the loopholes or vulnerabilities, which reduces hacking attempts

Don't open emails or attachments from unknown sources.

If u don’t know the person whom u have received mail avoid it, or delete it.

Don’t open attachment from mail directly.

Don’t open and website link if you get and unknown person mail

Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist.

As we have already checked how dictonary attack works.

The same formula would be aplied to crack Email passwords…

Still people keep their password as their:-

Pet name Combination of their name+Birthday Combination of name+bike no Some write their password at the back

of keyboard or monitor etc…

Always keep password having combination of upper case + lower case + Numbers + special characters

A password should be atleast 8-10 character long

E.g. Gur122-@

• Don't share access to your computers with strangers

• If a stranger tries to use your computer and hack anything its ur MAC address is recorded. And Mac address can be traced

Disconnect from the Internet when not in use

Update ur security on a regular basis

Make sure your employees and family members know this info too!

Back-up your computer data on disks or CDs often.

Because after all no computer is 100% secure.

As we say “prevention is better than cure”

Follow this rule.

Any Question… ?

Reach me @ hravnish@gmail.com

+919764636061

www.avnish.co.in

top related