Information & cyber security, Winter training ,bsnl. online
1. Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Presented By:
Presented By:
Pintu
Pintu Basak
Basak
JTO/NSCBTTC/
JTO/NSCBTTC/Kalyani
Kalyani
2. Contents
Contents
• What is Cyber Security?
• Why Cyber Security?
• Indication of Infections
• Major Security Problems
• Cyber Security Facts and Stats
• What is Cyber Crime?
Advantages of Cyber Security
What is Cyber Crime?
• Advantages of Cyber Security
• SafetyTips
• Mobile Phone Security
• Banking Security
• Cyber Security Question
• Tools used in Cyber Security
• Conclusion
• Reference
3. What is Cyber Security?
What is Cyber Security?
• Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
attacks, vulnerabilities, damages and unauthorized access.
• Cyber security standards are security standards which
enable organizations or individuals to practice safe security
enable organizations or individuals to practice safe security
techniquesto minimize the number of successful cyber
security attacks.
• Cyber security is very important for network, data and
applications.
4. Why Cyber Security?
Why Cyber Security?
• Confidentiality, Integrity and
Availability have served as
the standard for computer
Security since the time of
Security since the time of
first mainframes.
8. Indication of Infections
Indication of Infections
• Poor System Performance
• Delayed network speed
• Crashing of Applications
• Abnormal System Behavior
• Unknown Services are running
• System Not Shutting Down
• Hard Disk is Busy
• Random error codes popping up
• Pop ups ads, warnings, and other
unwanted material
• Browser pages redirecting to a
• Unknown Services are running
• Change in file extension or
contents
• Automatic shutdown of System
• Browser pages redirecting to a
website you’ve never interacted
with
• Password locked out of
important files or the system
itself
9. System vulnerabilities to attack
System vulnerabilities to attack
• Use of Default User Accounts and Password
• Remote Access Not Disabled /Allowing Remote Access
• No proper Access Controls on Files
• Non Availability of Updated Antivirus and Firewall
• Non Availability of Updated Antivirus and Firewall
• Un-necessary Services running
10. Major Security Problems
Major Security Problems
• Virus and worms
• Malware
• Spyware
• Adware
• Denial of Service
• Spam Email
• Ransomware
• Key Logger
• Adware
• Hacking
• Phishing
• Trojan horses
• Key Logger
• ATM Skimming and Point of Sale
• Password Cracking
crimes
11. Viruses and Worms
Viruses and Worms
• AVirus is a “program that is
loaded onto your computer
without your knowledge and
runs against your wishes.
runs against your wishes.
• Viruses Attach themselves to
a file.
• Worms don’t need to attach
themselves.
13. Malware
Malware
• The word "malware" comes from the term "MALicious
softWARE. “ Malware is any software that infects and
damages a computer system without the owner's knowledge
or permission.
14. How to stop Malware
How to stop Malware
• Download an anti-malware
program that also helps prevent
infections.
• Activate Network Threat
• Activate Network Threat
Protection, Firewall,Antivirus.
15. Spyware
Spyware
• Spyware is a type of
malware that hackers use to
spy on you in order to gain
access to your personal
information, banking
information, banking
details, or online activity.
• We should protect
ourselves by installing an
anti-spyware tool.
16. Adware
Adware
• Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that
could potentially be
could potentially be
dangerous for your device.
• The best way to remove
adware is to use an adware
removal tool.
17. Hacking
Hacking
• Hacking in simple terms
means an illegal intrusion into
a computer system and/or
network.
• Hacker is a person who
• Hacker is a person who
breaks into computers, usually
by gaining access to
administrative controls.
18. Types of Hackers
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
19. White Hat Hacker
White Hat Hacker
• Individual professing hacker
skills and using them for
defensive purposes and also
known as Security analyst
20. Black Hat Hacker
Black Hat Hacker
• Individuals with extraordinary
computing skills, restoring to
malicious or destructive
activist.
21. Gray Hat Hacker
Gray Hat Hacker
• Individuals who work both
offensively and defensively
at various times
22. How to prevent hacking
How to prevent hacking
• It may be impossible to
prevent computer hacking,
however effective security
controls including strong
passwords, and the use of
passwords, and the use of
firewalls can helps.
23. Phishing
Phishing
• Phishing is a fraudulent attempt, usually made through email,
to steal your personal and sensitive information such as
username, password and credit card details.
• A common online phishing scam starts with an email message
that appears to come from a trusted source(legitimate site)
that appears to come from a trusted source(legitimate site)
but actually directs recipients to provide information to a
fraudulent web site.
25. Trojan Horses
Trojan Horses
• Trojan is a type of malware that pretends
to be something useful, helpful, or fun
while actually causing harm or stealing
data.
• Trojans are often silently downloading
• Trojans are often silently downloading
other malware (e.g. spyware, adware,
ransomware) on an infected device as
well.
26. How to avoid Trojan Horses
How to avoid Trojan Horses
• Security suites, such as Avast,
McAfee Internet Security, will
prevent you from downloading
Trojan Horses.
27. Denial of Service
Denial of Service
• This is an act by the criminals who floods the Bandwidth of
the victims network.
• In the DoS attack, a hacker uses internet connection to flood
a target with fake request-usually in an attempt to exhaust
server resources or until the target cannot respond or simply
server resources or until the target cannot respond or simply
crashes.
• On the other hand, DDoS attacks are launched from multiple
connected devices that are distributed across the internet.
28. Denial of Service
Denial of Service
• DoS :When a single host
attacks.
• DDoS :When multiple
hosts attack simultaneously
and continuously
and continuously
29. Spam Email
Spam Email
• Spamming is the use of electronic messaging systems to
send unsolicited messages (spam), especially advertising, as
well as sending messages repeatedly from the same site.
• Spam is a serious security
concern as it can be used
concern as it can be used
to deliverTrojan horses,
viruses, worms, spyware,
and targeted phishing attacks.
30. Ransomware
Ransomware
• Hackers use this technique to lock you out of your devices and
demand a ransom money in return for access.
• The most dangerous ransomware attacks are caused by
Wannacry, Petya,Cerber and Locky ransomware.
31. Keylogger
Keylogger
• Keylogger also known as a keystroke logger or system monitor.
It can be a program or a hardware installed in the system,
which log each key strokes and map it to a text file and send it
to the creator.
32. ATM Skimming and Point of Sale Crimes
ATM Skimming and Point of Sale Crimes
• It is a technique of compromising the ATM machine by
installing a skimming device, at top of the machine keypad to
appear as a genuine keypad or a device made to be affixed to
the card reader to look like a part of the machine.
• Successful implementation of skimmers cause in ATM
• Successful implementation of skimmers cause in ATM
machine to collect card numbers and personal identification
number that are later replicated to carry out fraudulent
transaction.
33.
34. Password Cracking
Password Cracking
• Password attacks are attacks
by hackers that are able to
determine passwords or find
passwords to different
protected electronic areas and
protected electronic areas and
social network sites.
36. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• There is a hacker attack every 39 seconds
• 95% of breached records came from only three industries in
2016
• 43% of cyber attacks target small business
• The average cost of a data breach in 2020 will exceed $150
• The average cost of a data breach in 2020 will exceed $150
million
• Over 75% of healthcare industry has been infected with
malware over last year
37. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• Large-scale DDoS attacks increase in size by 500%
• Approximately $6 trillion is expected to be spent globally on
cyber security by 2021
• More than 77% of organizations do not have a Cyber Security
• More than 77% of organizations do not have a Cyber Security
Incident Response plan
• Share prices fall 7.27% on average after a breach
38. What is Cyber Crime?
What is Cyber Crime?
• Any criminal act done with the help of computer or any
electronic devices through internet is Cyber Crime.
• Unlawful act wherein the computer is either a tool or target
or both.
39. Cyber Crimes includes
Cyber Crimes includes
• Illegal access
• Illegal Interception
• System Interference
• Data Interference
• Data Interference
• Misuse of devices
• Fraud
40. History of Cyber Crime
History of Cyber Crime
• The first cyber crime was recorded in the year1820.
• The first spam email took place in 1978 when it was sent over
the ARPANet.
• On January 18, 1994, the first large scale spam hit the USENET.
• On January 18, 1994, the first large scale spam hit the USENET.
“Global Alert for All: Jesus is Coming Soon” was cross-
posted to every available newsgroup by a student.
• The firstVirus, Elk Cloner was installed on an Apple Computer
in 1982 written by Rich Skrenta.
41. Advantages of Cyber Security
Advantages of Cyber Security
• It will defend from hacks and viruses.
• It helps us to browse the safe website.
• Internet Security processes all the incoming and outgoing data
on our computer.
The cyber security will defend us from critical attacks.
• The cyber security will defend us from critical attacks.
• Protection for data and network
• Prevention of unauthorized users
• Protection to end users
42. Safety Tips
Safety Tips
• Read Privacy policy carefully when you submit the data through
internet.
• Encryption: lots of website uses SSL (secure socket layer)to
encrypt a data.
• Disable remote connectivity.
• Disable remote connectivity.
• The application of cyber security used in our PC needs update
every week.
• The security developers update their database every week . Hence
the new virus also deleted.
43. Safety Tips
Safety Tips
• Monitor for any changes in Configuration of ‘High risk’ devices
• Monitor Failed Login Attempts, Unusual Traffic, Changes to the
Firewall,Access Grants to Firewall
• Keep OS Updated
• Install Security Patches for OS
• Install Security Patches for OS
• Harden OS by turning off unnecessary Services and features
• Do not Install Programs of unknown origin
• Take precautions while using emails
44. Mobile Phone security
Mobile Phone security
• Use a strong password, Pattern lock
• Face and Finger print detection is
better
• Screen Lock/ App Lock
• Never store username/password in
• Never store username/password in
mobile
• Software Updates
• VPN
45. Banking Security
Banking Security
• Change Password and PIN (in a period of around 3 months)
• Do not use your same email password
• Always use HTTPS server while online transactions
• Use osk instead of our physical keyboard to login to banking sites.
• Go for the OTP instead of security password.
Do not share OTP to some other parties
Go for the OTP instead of security password.
• Do not share OTP to some other parties
• Never Response to anonymous call asking for your Account No,
Credit Card No,Transaction OTP etc.
• Use MPIN in UPI Transactions
• E-wallet Security
46. Real Time Cyber Security
Real Time Cyber Security
Question & Solution
Question & Solution
47. How do I know if an App is safe?
How do I know if an App is safe?
• Download apps from official app stores like App Store or
Google's Play Store only.
• Read the user reviews.
• Check out the developer. Rovio Entertainment makes Angry
• Check out the developer. Rovio Entertainment makes Angry
Birds Space; if you're downloading the game from other
developer, you're probably going to regret it.
• Install a mobile security app.
48. If an app is safe, is there anything to
If an app is safe, is there anything to
worry about it?
worry about it?
• Most free apps stay free by displaying messages from third-
party ad networks.
• Since the ad code comes from remote servers, it could
• Since the ad code comes from remote servers, it could
contain all kinds of bad things, including "root" apps that can
snatch complete control of your phone.
49. Is it safe to check my bank account on
Is it safe to check my bank account on
my phone?
my phone?
• "Short answer, 'Yes with an if,’ long answer, 'No with a but.’"
• Basically, we're pretty safe if we play it smart and have some
antispyware and malware protection in place.
50. Is every internet connection safe?
Is every internet connection safe?
• Cellular carrier's 3G or 4G network should be relatively secure.
• Wi-Fi hotspots can be a hacking honeypot
• Use only SecureWi-Fi (encrypted withWPA2 )
Use only the secure websites for sensitive operations.
• Use only the secure websites for sensitive operations.
• Turn-off the Wi-Fi once work is done.
51. I am using an unsecuredWi
I am using an unsecuredWi-
-Fi from my
Fi from my
neighbor. Is it possible for them to get
neighbor. Is it possible for them to get
access to my login ID and password?
access to my login ID and password?
• Yes, it is possible to access my IP address, passwords, GPS
tracking, and others information.
tracking, and others information.
• There is every chance that the connection could be used to
hack the device, gain access to the system, or attribute the
unwanted browsing history to me.
52. Tools used in Cyber Security
Tools used in Cyber Security
• Professional Look at Net
• F-RAT
61. Conclusion
Conclusion
• The only system which is truly secure is one which is switched
off and unplugged.
• So , only way to be safe is Pay attention and Act smart.