SlideShare una empresa de Scribd logo
1 de 24
The Coding Club & DC91361 Present

INTERNET SECURITY
                                Naga Rohit S
GMail Hacking
GMail Hacking
What we will cover today
 Online Scams
       Why you din’t win $1m
 Spam – Mail Bomb
       Write your own spam bot
 Phishing
       Understanding the Phishermen
 Identity Theft
 Malware
       Stuxnet
 AntiVirus, Firewall and IDS
 Best Practices Online
 Browser Wars
       Pwn2Own
 Gymkhana Elections
       Why it could have been a failure
Lottery – Help - Funds

 Rule 1
   You did not win any lottery.
 Rule 2
   You do not inherit any overseas property.
 Rule 3
   You won’t receive any commission for helping
    people transfer their funds
 Rule 4
   Unsolicited income is a trap.
Ge3k Humour
Think before you help

 Before you want to donate, Just Google it and
  donate only to established and recognized
  organizations.
Spam – Mail Bomb

 Spam is just another unsolicited email.
 The very fact that you may receive an email
  which you may be anticipating from a
  ‘stranger’ is the reason why spam filter’s life is
  miserable 
 Often these carry several ‘infections’ with
  them. More on this later!
Ge3k Humour
Phishing

 Phishing attacks use spoofed e-mails and
  fraudulent websites designed to fool
  recipients into divulging personal financial
  data such as credit card numbers, account
  usernames and passwords, social security
  numbers, etc.
Demo

 Mwhaaha ahaha haha..
Malware

 Spyware
Malware

 Trojans
Malware

 Virus
Stuxnet
Antivirus, Firewall and IDS
Best Practices Online

 Get a ‘Good’ Web Browser
 HTTPS vs HTTP
 Unique Password
   A unique password for every site
     Best Security
     Impossible to Remember
 Semi Unique Password
   A complicated password with slight changes for
    different sites
   Difficult to Remember
Best Practices Online

 Unique Password Per Tier
   Top Tier Websites
       Google, Facebook, IITG Webmail, etc.
   Medium Tier Websites
       Microsoft, Yahoo, etc.
   Low Tier Websites
       Competitions, Subscriptions, Registrations, etc.

 Update and Patch your Operating System,
  Browser and AntiVirus.
 Don’t download attachments until you are really
  anticipating some attachment from the sender.
Browser Wars
Gymkhana Election System
Questions
What’s in Store for 2012-2013?




Feedback or even Just to say Hi!

Más contenido relacionado

La actualidad más candente

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
copperroo
 

La actualidad más candente (20)

Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
h@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in androidh@kin9 & vulnerability assessment in android
h@kin9 & vulnerability assessment in android
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
How to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBroHow to Avoid Crypto Scams - Crypto JBro
How to Avoid Crypto Scams - Crypto JBro
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
School presentation
School presentationSchool presentation
School presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Privacy On The Internet
Privacy On The InternetPrivacy On The Internet
Privacy On The Internet
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 

Destacado (6)

Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
SVCC Google App Engine: Java Runtime
SVCC Google App Engine: Java RuntimeSVCC Google App Engine: Java Runtime
SVCC Google App Engine: Java Runtime
 
Big Data Analytics Preview
Big Data Analytics PreviewBig Data Analytics Preview
Big Data Analytics Preview
 
GAE_20100112
GAE_20100112GAE_20100112
GAE_20100112
 
Get up and running with google app engine in 60 minutes or less
Get up and running with google app engine in 60 minutes or lessGet up and running with google app engine in 60 minutes or less
Get up and running with google app engine in 60 minutes or less
 
App Engine On Air: Munich
App Engine On Air: MunichApp Engine On Air: Munich
App Engine On Air: Munich
 

Similar a Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91361 Group

Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 

Similar a Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91361 Group (20)

Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patel
 
Phishing
PhishingPhishing
Phishing
 
Web Security
Web SecurityWeb Security
Web Security
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Spamming and Hacking.pptx
Spamming and Hacking.pptxSpamming and Hacking.pptx
Spamming and Hacking.pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91361 Group

  • 1. The Coding Club & DC91361 Present INTERNET SECURITY Naga Rohit S
  • 4. What we will cover today  Online Scams  Why you din’t win $1m  Spam – Mail Bomb  Write your own spam bot  Phishing  Understanding the Phishermen  Identity Theft  Malware  Stuxnet  AntiVirus, Firewall and IDS  Best Practices Online  Browser Wars  Pwn2Own  Gymkhana Elections  Why it could have been a failure
  • 5. Lottery – Help - Funds  Rule 1  You did not win any lottery.  Rule 2  You do not inherit any overseas property.  Rule 3  You won’t receive any commission for helping people transfer their funds  Rule 4  Unsolicited income is a trap.
  • 7. Think before you help  Before you want to donate, Just Google it and donate only to established and recognized organizations.
  • 8. Spam – Mail Bomb  Spam is just another unsolicited email.  The very fact that you may receive an email which you may be anticipating from a ‘stranger’ is the reason why spam filter’s life is miserable   Often these carry several ‘infections’ with them. More on this later!
  • 10. Phishing  Phishing attacks use spoofed e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.
  • 11.
  • 12.
  • 19. Best Practices Online  Get a ‘Good’ Web Browser  HTTPS vs HTTP  Unique Password  A unique password for every site  Best Security  Impossible to Remember  Semi Unique Password  A complicated password with slight changes for different sites  Difficult to Remember
  • 20. Best Practices Online  Unique Password Per Tier  Top Tier Websites  Google, Facebook, IITG Webmail, etc.  Medium Tier Websites  Microsoft, Yahoo, etc.  Low Tier Websites  Competitions, Subscriptions, Registrations, etc.  Update and Patch your Operating System, Browser and AntiVirus.  Don’t download attachments until you are really anticipating some attachment from the sender.
  • 24. What’s in Store for 2012-2013? Feedback or even Just to say Hi!