SlideShare una empresa de Scribd logo
1 de 64
Descargar para leer sin conexión
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Presented By:
Presented By:
Pintu
Pintu Basak
Basak
JTO/NSCBTTC/
JTO/NSCBTTC/Kalyani
Kalyani
Contents
Contents
• What is Cyber Security?
• Why Cyber Security?
• Indication of Infections
• Major Security Problems
• Cyber Security Facts and Stats
• What is Cyber Crime?
Advantages of Cyber Security
What is Cyber Crime?
• Advantages of Cyber Security
• SafetyTips
• Mobile Phone Security
• Banking Security
• Cyber Security Question
• Tools used in Cyber Security
• Conclusion
• Reference
What is Cyber Security?
What is Cyber Security?
• Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
attacks, vulnerabilities, damages and unauthorized access.
• Cyber security standards are security standards which
enable organizations or individuals to practice safe security
enable organizations or individuals to practice safe security
techniquesto minimize the number of successful cyber
security attacks.
• Cyber security is very important for network, data and
applications.
Why Cyber Security?
Why Cyber Security?
• Confidentiality, Integrity and
Availability have served as
the standard for computer
Security since the time of
Security since the time of
first mainframes.
Confidentiality
Confidentiality
Protecting
information from
Example:
Criminal steals
customers’ usernames,
passwords, or credit
card information
information from
unauthorized
access and
disclosure
Integrity
Integrity
Protecting
information from
Example:
Someone alters payroll
information or a
proposed product
design.
information from
unauthorized
modification
design.
Availability
Availability
Preventing
Example:
Your customers
are unable to
access your
online services
Preventing
disruption in how
information is
accessed
Indication of Infections
Indication of Infections
• Poor System Performance
• Delayed network speed
• Crashing of Applications
• Abnormal System Behavior
• Unknown Services are running
• System Not Shutting Down
• Hard Disk is Busy
• Random error codes popping up
• Pop ups ads, warnings, and other
unwanted material
• Browser pages redirecting to a
• Unknown Services are running
• Change in file extension or
contents
• Automatic shutdown of System
• Browser pages redirecting to a
website you’ve never interacted
with
• Password locked out of
important files or the system
itself
System vulnerabilities to attack
System vulnerabilities to attack
• Use of Default User Accounts and Password
• Remote Access Not Disabled /Allowing Remote Access
• No proper Access Controls on Files
• Non Availability of Updated Antivirus and Firewall
• Non Availability of Updated Antivirus and Firewall
• Un-necessary Services running
Major Security Problems
Major Security Problems
• Virus and worms
• Malware
• Spyware
• Adware
• Denial of Service
• Spam Email
• Ransomware
• Key Logger
• Adware
• Hacking
• Phishing
• Trojan horses
• Key Logger
• ATM Skimming and Point of Sale
• Password Cracking
crimes
Viruses and Worms
Viruses and Worms
• AVirus is a “program that is
loaded onto your computer
without your knowledge and
runs against your wishes.
runs against your wishes.
• Viruses Attach themselves to
a file.
• Worms don’t need to attach
themselves.
Solution
Solution
• Install a security suite that protects the computer against
threats such as viruses and worms.
Malware
Malware
• The word "malware" comes from the term "MALicious
softWARE. “ Malware is any software that infects and
damages a computer system without the owner's knowledge
or permission.
How to stop Malware
How to stop Malware
• Download an anti-malware
program that also helps prevent
infections.
• Activate Network Threat
• Activate Network Threat
Protection, Firewall,Antivirus.
Spyware
Spyware
• Spyware is a type of
malware that hackers use to
spy on you in order to gain
access to your personal
information, banking
information, banking
details, or online activity.
• We should protect
ourselves by installing an
anti-spyware tool.
Adware
Adware
• Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that
could potentially be
could potentially be
dangerous for your device.
• The best way to remove
adware is to use an adware
removal tool.
Hacking
Hacking
• Hacking in simple terms
means an illegal intrusion into
a computer system and/or
network.
• Hacker is a person who
• Hacker is a person who
breaks into computers, usually
by gaining access to
administrative controls.
Types of Hackers
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
White Hat Hacker
White Hat Hacker
• Individual professing hacker
skills and using them for
defensive purposes and also
known as Security analyst
Black Hat Hacker
Black Hat Hacker
• Individuals with extraordinary
computing skills, restoring to
malicious or destructive
activist.
Gray Hat Hacker
Gray Hat Hacker
• Individuals who work both
offensively and defensively
at various times
How to prevent hacking
How to prevent hacking
• It may be impossible to
prevent computer hacking,
however effective security
controls including strong
passwords, and the use of
passwords, and the use of
firewalls can helps.
Phishing
Phishing
• Phishing is a fraudulent attempt, usually made through email,
to steal your personal and sensitive information such as
username, password and credit card details.
• A common online phishing scam starts with an email message
that appears to come from a trusted source(legitimate site)
that appears to come from a trusted source(legitimate site)
but actually directs recipients to provide information to a
fraudulent web site.
Phishing
Phishing
Trojan Horses
Trojan Horses
• Trojan is a type of malware that pretends
to be something useful, helpful, or fun
while actually causing harm or stealing
data.
• Trojans are often silently downloading
• Trojans are often silently downloading
other malware (e.g. spyware, adware,
ransomware) on an infected device as
well.
How to avoid Trojan Horses
How to avoid Trojan Horses
• Security suites, such as Avast,
McAfee Internet Security, will
prevent you from downloading
Trojan Horses.
Denial of Service
Denial of Service
• This is an act by the criminals who floods the Bandwidth of
the victims network.
• In the DoS attack, a hacker uses internet connection to flood
a target with fake request-usually in an attempt to exhaust
server resources or until the target cannot respond or simply
server resources or until the target cannot respond or simply
crashes.
• On the other hand, DDoS attacks are launched from multiple
connected devices that are distributed across the internet.
Denial of Service
Denial of Service
• DoS :When a single host
attacks.
• DDoS :When multiple
hosts attack simultaneously
and continuously
and continuously
Spam Email
Spam Email
• Spamming is the use of electronic messaging systems to
send unsolicited messages (spam), especially advertising, as
well as sending messages repeatedly from the same site.
• Spam is a serious security
concern as it can be used
concern as it can be used
to deliverTrojan horses,
viruses, worms, spyware,
and targeted phishing attacks.
Ransomware
Ransomware
• Hackers use this technique to lock you out of your devices and
demand a ransom money in return for access.
• The most dangerous ransomware attacks are caused by
Wannacry, Petya,Cerber and Locky ransomware.
Keylogger
Keylogger
• Keylogger also known as a keystroke logger or system monitor.
It can be a program or a hardware installed in the system,
which log each key strokes and map it to a text file and send it
to the creator.
ATM Skimming and Point of Sale Crimes
ATM Skimming and Point of Sale Crimes
• It is a technique of compromising the ATM machine by
installing a skimming device, at top of the machine keypad to
appear as a genuine keypad or a device made to be affixed to
the card reader to look like a part of the machine.
• Successful implementation of skimmers cause in ATM
• Successful implementation of skimmers cause in ATM
machine to collect card numbers and personal identification
number that are later replicated to carry out fraudulent
transaction.
Password Cracking
Password Cracking
• Password attacks are attacks
by hackers that are able to
determine passwords or find
passwords to different
protected electronic areas and
protected electronic areas and
social network sites.
Securing Password
Securing Password
• Use always Strong password.
• Never use same password for
two different sites.
Cyber Security Facts and Stats
Cyber Security Facts and Stats
• There is a hacker attack every 39 seconds
• 95% of breached records came from only three industries in
2016
• 43% of cyber attacks target small business
• The average cost of a data breach in 2020 will exceed $150
• The average cost of a data breach in 2020 will exceed $150
million
• Over 75% of healthcare industry has been infected with
malware over last year
Cyber Security Facts and Stats
Cyber Security Facts and Stats
• Large-scale DDoS attacks increase in size by 500%
• Approximately $6 trillion is expected to be spent globally on
cyber security by 2021
• More than 77% of organizations do not have a Cyber Security
• More than 77% of organizations do not have a Cyber Security
Incident Response plan
• Share prices fall 7.27% on average after a breach
What is Cyber Crime?
What is Cyber Crime?
• Any criminal act done with the help of computer or any
electronic devices through internet is Cyber Crime.
• Unlawful act wherein the computer is either a tool or target
or both.
Cyber Crimes includes
Cyber Crimes includes
• Illegal access
• Illegal Interception
• System Interference
• Data Interference
• Data Interference
• Misuse of devices
• Fraud
History of Cyber Crime
History of Cyber Crime
• The first cyber crime was recorded in the year1820.
• The first spam email took place in 1978 when it was sent over
the ARPANet.
• On January 18, 1994, the first large scale spam hit the USENET.
• On January 18, 1994, the first large scale spam hit the USENET.
“Global Alert for All: Jesus is Coming Soon” was cross-
posted to every available newsgroup by a student.
• The firstVirus, Elk Cloner was installed on an Apple Computer
in 1982 written by Rich Skrenta.
Advantages of Cyber Security
Advantages of Cyber Security
• It will defend from hacks and viruses.
• It helps us to browse the safe website.
• Internet Security processes all the incoming and outgoing data
on our computer.
The cyber security will defend us from critical attacks.
• The cyber security will defend us from critical attacks.
• Protection for data and network
• Prevention of unauthorized users
• Protection to end users
Safety Tips
Safety Tips
• Read Privacy policy carefully when you submit the data through
internet.
• Encryption: lots of website uses SSL (secure socket layer)to
encrypt a data.
• Disable remote connectivity.
• Disable remote connectivity.
• The application of cyber security used in our PC needs update
every week.
• The security developers update their database every week . Hence
the new virus also deleted.
Safety Tips
Safety Tips
• Monitor for any changes in Configuration of ‘High risk’ devices
• Monitor Failed Login Attempts, Unusual Traffic, Changes to the
Firewall,Access Grants to Firewall
• Keep OS Updated
• Install Security Patches for OS
• Install Security Patches for OS
• Harden OS by turning off unnecessary Services and features
• Do not Install Programs of unknown origin
• Take precautions while using emails
Mobile Phone security
Mobile Phone security
• Use a strong password, Pattern lock
• Face and Finger print detection is
better
• Screen Lock/ App Lock
• Never store username/password in
• Never store username/password in
mobile
• Software Updates
• VPN
Banking Security
Banking Security
• Change Password and PIN (in a period of around 3 months)
• Do not use your same email password
• Always use HTTPS server while online transactions
• Use osk instead of our physical keyboard to login to banking sites.
• Go for the OTP instead of security password.
Do not share OTP to some other parties
Go for the OTP instead of security password.
• Do not share OTP to some other parties
• Never Response to anonymous call asking for your Account No,
Credit Card No,Transaction OTP etc.
• Use MPIN in UPI Transactions
• E-wallet Security
Real Time Cyber Security
Real Time Cyber Security
Question & Solution
Question & Solution
How do I know if an App is safe?
How do I know if an App is safe?
• Download apps from official app stores like App Store or
Google's Play Store only.
• Read the user reviews.
• Check out the developer. Rovio Entertainment makes Angry
• Check out the developer. Rovio Entertainment makes Angry
Birds Space; if you're downloading the game from other
developer, you're probably going to regret it.
• Install a mobile security app.
If an app is safe, is there anything to
If an app is safe, is there anything to
worry about it?
worry about it?
• Most free apps stay free by displaying messages from third-
party ad networks.
• Since the ad code comes from remote servers, it could
• Since the ad code comes from remote servers, it could
contain all kinds of bad things, including "root" apps that can
snatch complete control of your phone.
Is it safe to check my bank account on
Is it safe to check my bank account on
my phone?
my phone?
• "Short answer, 'Yes with an if,’ long answer, 'No with a but.’"
• Basically, we're pretty safe if we play it smart and have some
antispyware and malware protection in place.
Is every internet connection safe?
Is every internet connection safe?
• Cellular carrier's 3G or 4G network should be relatively secure.
• Wi-Fi hotspots can be a hacking honeypot
• Use only SecureWi-Fi (encrypted withWPA2 )
Use only the secure websites for sensitive operations.
• Use only the secure websites for sensitive operations.
• Turn-off the Wi-Fi once work is done.
I am using an unsecuredWi
I am using an unsecuredWi-
-Fi from my
Fi from my
neighbor. Is it possible for them to get
neighbor. Is it possible for them to get
access to my login ID and password?
access to my login ID and password?
• Yes, it is possible to access my IP address, passwords, GPS
tracking, and others information.
tracking, and others information.
• There is every chance that the connection could be used to
hack the device, gain access to the system, or attribute the
unwanted browsing history to me.
Tools used in Cyber Security
Tools used in Cyber Security
• Professional Look at Net
• F-RAT
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
Professional Look at Net
F
F-
-RAT
RAT
F
F-
-RAT
RAT
F
F-
-RAT
RAT
F
F-
-RAT
RAT
Conclusion
Conclusion
• The only system which is truly secure is one which is switched
off and unplugged.
• So , only way to be safe is Pay attention and Act smart.
References
References
• https://en.wikipedia.org
• http://www.howstuffworks.com
• https://www.eccouncil.org
• https://www.slideshare.net
• https://techterms.com
• https://www.safetydetectives.com
• https://www.safetydetectives.com
• https://www.free-power-point-templates.com
• https://www.edureka.co/
• https://www.guru99.com
• https://www.webroot.com
• https://wikipedia.org
Any Question?
Any Question?
ThankYou
ThankYou

Más contenido relacionado

La actualidad más candente

Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat ManagementLokesh Sharma
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 

La actualidad más candente (20)

Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
UTM Unified Threat Management
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Phishing
PhishingPhishing
Phishing
 
Network security
Network security Network security
Network security
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Malware
MalwareMalware
Malware
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 

Similar a Information & cyber security, Winter training ,bsnl. online

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 

Similar a Information & cyber security, Winter training ,bsnl. online (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 

Más de SumanPramanik7

ER Model dbms er diagrams
ER Model dbms er diagrams ER Model dbms er diagrams
ER Model dbms er diagrams SumanPramanik7
 
Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,SumanPramanik7
 
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...SumanPramanik7
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training SumanPramanik7
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
dmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe confdmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe confSumanPramanik7
 
Broadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineeringBroadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineeringSumanPramanik7
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial TrainingSumanPramanik7
 

Más de SumanPramanik7 (10)

ER Model dbms er diagrams
ER Model dbms er diagrams ER Model dbms er diagrams
ER Model dbms er diagrams
 
Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,Gsm global system for mobile, bsnl training , india, telecommunication,
Gsm global system for mobile, bsnl training , india, telecommunication,
 
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...Switching and signalling ovt, Winter training .bsnl .swesome  knowledge ,tele...
Switching and signalling ovt, Winter training .bsnl .swesome knowledge ,tele...
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
dmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe confdmt modulation cpe security in wifi Dsl adsl cpe conf
dmt modulation cpe security in wifi Dsl adsl cpe conf
 
Broadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineeringBroadband network overview bsnl industrial training engineering
Broadband network overview bsnl industrial training engineering
 
5g architecture, Industrial Training
5g architecture, Industrial Training5g architecture, Industrial Training
5g architecture, Industrial Training
 
5g TECHNOLOY
5g TECHNOLOY5g TECHNOLOY
5g TECHNOLOY
 

Último

Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 

Último (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Information & cyber security, Winter training ,bsnl. online

  • 1. Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Information & Cyber Security Presented By: Presented By: Pintu Pintu Basak Basak JTO/NSCBTTC/ JTO/NSCBTTC/Kalyani Kalyani
  • 2. Contents Contents • What is Cyber Security? • Why Cyber Security? • Indication of Infections • Major Security Problems • Cyber Security Facts and Stats • What is Cyber Crime? Advantages of Cyber Security What is Cyber Crime? • Advantages of Cyber Security • SafetyTips • Mobile Phone Security • Banking Security • Cyber Security Question • Tools used in Cyber Security • Conclusion • Reference
  • 3. What is Cyber Security? What is Cyber Security? • Cyber security refers to the technologies and processes designed to protect computers, networks and data from attacks, vulnerabilities, damages and unauthorized access. • Cyber security standards are security standards which enable organizations or individuals to practice safe security enable organizations or individuals to practice safe security techniquesto minimize the number of successful cyber security attacks. • Cyber security is very important for network, data and applications.
  • 4. Why Cyber Security? Why Cyber Security? • Confidentiality, Integrity and Availability have served as the standard for computer Security since the time of Security since the time of first mainframes.
  • 5. Confidentiality Confidentiality Protecting information from Example: Criminal steals customers’ usernames, passwords, or credit card information information from unauthorized access and disclosure
  • 6. Integrity Integrity Protecting information from Example: Someone alters payroll information or a proposed product design. information from unauthorized modification design.
  • 7. Availability Availability Preventing Example: Your customers are unable to access your online services Preventing disruption in how information is accessed
  • 8. Indication of Infections Indication of Infections • Poor System Performance • Delayed network speed • Crashing of Applications • Abnormal System Behavior • Unknown Services are running • System Not Shutting Down • Hard Disk is Busy • Random error codes popping up • Pop ups ads, warnings, and other unwanted material • Browser pages redirecting to a • Unknown Services are running • Change in file extension or contents • Automatic shutdown of System • Browser pages redirecting to a website you’ve never interacted with • Password locked out of important files or the system itself
  • 9. System vulnerabilities to attack System vulnerabilities to attack • Use of Default User Accounts and Password • Remote Access Not Disabled /Allowing Remote Access • No proper Access Controls on Files • Non Availability of Updated Antivirus and Firewall • Non Availability of Updated Antivirus and Firewall • Un-necessary Services running
  • 10. Major Security Problems Major Security Problems • Virus and worms • Malware • Spyware • Adware • Denial of Service • Spam Email • Ransomware • Key Logger • Adware • Hacking • Phishing • Trojan horses • Key Logger • ATM Skimming and Point of Sale • Password Cracking crimes
  • 11. Viruses and Worms Viruses and Worms • AVirus is a “program that is loaded onto your computer without your knowledge and runs against your wishes. runs against your wishes. • Viruses Attach themselves to a file. • Worms don’t need to attach themselves.
  • 12. Solution Solution • Install a security suite that protects the computer against threats such as viruses and worms.
  • 13. Malware Malware • The word "malware" comes from the term "MALicious softWARE. “ Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
  • 14. How to stop Malware How to stop Malware • Download an anti-malware program that also helps prevent infections. • Activate Network Threat • Activate Network Threat Protection, Firewall,Antivirus.
  • 15. Spyware Spyware • Spyware is a type of malware that hackers use to spy on you in order to gain access to your personal information, banking information, banking details, or online activity. • We should protect ourselves by installing an anti-spyware tool.
  • 16. Adware Adware • Adware is a type of malware that bombards you with endless ads and pop-up windows that could potentially be could potentially be dangerous for your device. • The best way to remove adware is to use an adware removal tool.
  • 17. Hacking Hacking • Hacking in simple terms means an illegal intrusion into a computer system and/or network. • Hacker is a person who • Hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers Types of Hackers • White Hat Hacker • Grey Hat Hacker • Black Hat Hacker
  • 19. White Hat Hacker White Hat Hacker • Individual professing hacker skills and using them for defensive purposes and also known as Security analyst
  • 20. Black Hat Hacker Black Hat Hacker • Individuals with extraordinary computing skills, restoring to malicious or destructive activist.
  • 21. Gray Hat Hacker Gray Hat Hacker • Individuals who work both offensively and defensively at various times
  • 22. How to prevent hacking How to prevent hacking • It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of passwords, and the use of firewalls can helps.
  • 23. Phishing Phishing • Phishing is a fraudulent attempt, usually made through email, to steal your personal and sensitive information such as username, password and credit card details. • A common online phishing scam starts with an email message that appears to come from a trusted source(legitimate site) that appears to come from a trusted source(legitimate site) but actually directs recipients to provide information to a fraudulent web site.
  • 25. Trojan Horses Trojan Horses • Trojan is a type of malware that pretends to be something useful, helpful, or fun while actually causing harm or stealing data. • Trojans are often silently downloading • Trojans are often silently downloading other malware (e.g. spyware, adware, ransomware) on an infected device as well.
  • 26. How to avoid Trojan Horses How to avoid Trojan Horses • Security suites, such as Avast, McAfee Internet Security, will prevent you from downloading Trojan Horses.
  • 27. Denial of Service Denial of Service • This is an act by the criminals who floods the Bandwidth of the victims network. • In the DoS attack, a hacker uses internet connection to flood a target with fake request-usually in an attempt to exhaust server resources or until the target cannot respond or simply server resources or until the target cannot respond or simply crashes. • On the other hand, DDoS attacks are launched from multiple connected devices that are distributed across the internet.
  • 28. Denial of Service Denial of Service • DoS :When a single host attacks. • DDoS :When multiple hosts attack simultaneously and continuously and continuously
  • 29. Spam Email Spam Email • Spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly from the same site. • Spam is a serious security concern as it can be used concern as it can be used to deliverTrojan horses, viruses, worms, spyware, and targeted phishing attacks.
  • 30. Ransomware Ransomware • Hackers use this technique to lock you out of your devices and demand a ransom money in return for access. • The most dangerous ransomware attacks are caused by Wannacry, Petya,Cerber and Locky ransomware.
  • 31. Keylogger Keylogger • Keylogger also known as a keystroke logger or system monitor. It can be a program or a hardware installed in the system, which log each key strokes and map it to a text file and send it to the creator.
  • 32. ATM Skimming and Point of Sale Crimes ATM Skimming and Point of Sale Crimes • It is a technique of compromising the ATM machine by installing a skimming device, at top of the machine keypad to appear as a genuine keypad or a device made to be affixed to the card reader to look like a part of the machine. • Successful implementation of skimmers cause in ATM • Successful implementation of skimmers cause in ATM machine to collect card numbers and personal identification number that are later replicated to carry out fraudulent transaction.
  • 33.
  • 34. Password Cracking Password Cracking • Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and protected electronic areas and social network sites.
  • 35. Securing Password Securing Password • Use always Strong password. • Never use same password for two different sites.
  • 36. Cyber Security Facts and Stats Cyber Security Facts and Stats • There is a hacker attack every 39 seconds • 95% of breached records came from only three industries in 2016 • 43% of cyber attacks target small business • The average cost of a data breach in 2020 will exceed $150 • The average cost of a data breach in 2020 will exceed $150 million • Over 75% of healthcare industry has been infected with malware over last year
  • 37. Cyber Security Facts and Stats Cyber Security Facts and Stats • Large-scale DDoS attacks increase in size by 500% • Approximately $6 trillion is expected to be spent globally on cyber security by 2021 • More than 77% of organizations do not have a Cyber Security • More than 77% of organizations do not have a Cyber Security Incident Response plan • Share prices fall 7.27% on average after a breach
  • 38. What is Cyber Crime? What is Cyber Crime? • Any criminal act done with the help of computer or any electronic devices through internet is Cyber Crime. • Unlawful act wherein the computer is either a tool or target or both.
  • 39. Cyber Crimes includes Cyber Crimes includes • Illegal access • Illegal Interception • System Interference • Data Interference • Data Interference • Misuse of devices • Fraud
  • 40. History of Cyber Crime History of Cyber Crime • The first cyber crime was recorded in the year1820. • The first spam email took place in 1978 when it was sent over the ARPANet. • On January 18, 1994, the first large scale spam hit the USENET. • On January 18, 1994, the first large scale spam hit the USENET. “Global Alert for All: Jesus is Coming Soon” was cross- posted to every available newsgroup by a student. • The firstVirus, Elk Cloner was installed on an Apple Computer in 1982 written by Rich Skrenta.
  • 41. Advantages of Cyber Security Advantages of Cyber Security • It will defend from hacks and viruses. • It helps us to browse the safe website. • Internet Security processes all the incoming and outgoing data on our computer. The cyber security will defend us from critical attacks. • The cyber security will defend us from critical attacks. • Protection for data and network • Prevention of unauthorized users • Protection to end users
  • 42. Safety Tips Safety Tips • Read Privacy policy carefully when you submit the data through internet. • Encryption: lots of website uses SSL (secure socket layer)to encrypt a data. • Disable remote connectivity. • Disable remote connectivity. • The application of cyber security used in our PC needs update every week. • The security developers update their database every week . Hence the new virus also deleted.
  • 43. Safety Tips Safety Tips • Monitor for any changes in Configuration of ‘High risk’ devices • Monitor Failed Login Attempts, Unusual Traffic, Changes to the Firewall,Access Grants to Firewall • Keep OS Updated • Install Security Patches for OS • Install Security Patches for OS • Harden OS by turning off unnecessary Services and features • Do not Install Programs of unknown origin • Take precautions while using emails
  • 44. Mobile Phone security Mobile Phone security • Use a strong password, Pattern lock • Face and Finger print detection is better • Screen Lock/ App Lock • Never store username/password in • Never store username/password in mobile • Software Updates • VPN
  • 45. Banking Security Banking Security • Change Password and PIN (in a period of around 3 months) • Do not use your same email password • Always use HTTPS server while online transactions • Use osk instead of our physical keyboard to login to banking sites. • Go for the OTP instead of security password. Do not share OTP to some other parties Go for the OTP instead of security password. • Do not share OTP to some other parties • Never Response to anonymous call asking for your Account No, Credit Card No,Transaction OTP etc. • Use MPIN in UPI Transactions • E-wallet Security
  • 46. Real Time Cyber Security Real Time Cyber Security Question & Solution Question & Solution
  • 47. How do I know if an App is safe? How do I know if an App is safe? • Download apps from official app stores like App Store or Google's Play Store only. • Read the user reviews. • Check out the developer. Rovio Entertainment makes Angry • Check out the developer. Rovio Entertainment makes Angry Birds Space; if you're downloading the game from other developer, you're probably going to regret it. • Install a mobile security app.
  • 48. If an app is safe, is there anything to If an app is safe, is there anything to worry about it? worry about it? • Most free apps stay free by displaying messages from third- party ad networks. • Since the ad code comes from remote servers, it could • Since the ad code comes from remote servers, it could contain all kinds of bad things, including "root" apps that can snatch complete control of your phone.
  • 49. Is it safe to check my bank account on Is it safe to check my bank account on my phone? my phone? • "Short answer, 'Yes with an if,’ long answer, 'No with a but.’" • Basically, we're pretty safe if we play it smart and have some antispyware and malware protection in place.
  • 50. Is every internet connection safe? Is every internet connection safe? • Cellular carrier's 3G or 4G network should be relatively secure. • Wi-Fi hotspots can be a hacking honeypot • Use only SecureWi-Fi (encrypted withWPA2 ) Use only the secure websites for sensitive operations. • Use only the secure websites for sensitive operations. • Turn-off the Wi-Fi once work is done.
  • 51. I am using an unsecuredWi I am using an unsecuredWi- -Fi from my Fi from my neighbor. Is it possible for them to get neighbor. Is it possible for them to get access to my login ID and password? access to my login ID and password? • Yes, it is possible to access my IP address, passwords, GPS tracking, and others information. tracking, and others information. • There is every chance that the connection could be used to hack the device, gain access to the system, or attribute the unwanted browsing history to me.
  • 52. Tools used in Cyber Security Tools used in Cyber Security • Professional Look at Net • F-RAT
  • 53. Professional Look at Net Professional Look at Net
  • 54. Professional Look at Net Professional Look at Net
  • 55. Professional Look at Net Professional Look at Net
  • 56. Professional Look at Net Professional Look at Net
  • 61. Conclusion Conclusion • The only system which is truly secure is one which is switched off and unplugged. • So , only way to be safe is Pay attention and Act smart.
  • 62. References References • https://en.wikipedia.org • http://www.howstuffworks.com • https://www.eccouncil.org • https://www.slideshare.net • https://techterms.com • https://www.safetydetectives.com • https://www.safetydetectives.com • https://www.free-power-point-templates.com • https://www.edureka.co/ • https://www.guru99.com • https://www.webroot.com • https://wikipedia.org