SlideShare a Scribd company logo
By Sanjay Kumar ( B.Tech - 2ndYear, CSE )
Introduction
 Types of viruses and worms
 Ethical Hacking & Black Hat Hacking
 Types of Hacking/DataTheft
 Examples of Attacks
 Skills Required to Prevent Attacks
 Measures to Prevent Attacks
Malware and Viruses
• Malicious Software.
• Used by an attacker to steal data, disrupt
operations or access a private network.
• Used to describe many different types of
software including viruses, worms, Trojans,
key loggers, spyware and others.
Computer Virus
•Any computer program that can replicate itself
and spread from one computer to another
without input from its creator.
•Needs to attach itself to an existing program in
order for it to work.
•They are used to deliver many different
payloads.
Computer Worm
•Unlike a virus a worm does not need to be attached to
an existing program in order to function.
•Always cause harm to the network, even if it is just
increased bandwidth consumption, whereas a virus will
always corrupt and/or modify files on a computer.
•A program similar to a virus; it can replicate itself and
spread from one computer to another.
Trojan Horse
•A program that pretends to do one thing, but in
reality does something else.
•Used to record keystrokes input by a user
•Can be used to steal usernames, passwords,
credit card information, personal details and so
on.
•Usually employ a form of social engineering.
Social Engineering
• Social engineering is the art of manipulating
people into divulging personal and
confidential information.
• Requires very little technical skill.
• Relies heavily on human interaction to get
results.
• Most often used in tandem with other exploits.
Who is a Hacker and what can
they do ?
 Someone who bypasses the systems and
Passwords.
 Taking advantage of weaknesses left in the
system by developers.
 This person knows computer programming
 Can be a Hacker Subculture
 Access confidential information
 Broadcast confidential documents e.g. Name,
address, etc.
Types of Hacking/Data Theft
 Password Cracking-Attempting to guess a
password using a program.
• Brute Forcing-A program that guesses a password by
inputting as many randomly generated passwords
using the computer’s processing power.
• Dictionary Hack-A program that guesses passwords
based on words in a dictionary or the program’s
vocabulary.
 Packet Sniffing-Sniffing packets sent over the
internet to gain security details over unsecured
connections.
 Phishing-Legitimate looking sites designed to
farm information inputted by the user.
Types of Hacking/Data Theft
 Rootkit-Stealth software which inhibits use of
programs executed by the user and hides (usually
malicious) processes.
 Keyloggers-records keystrokes and can be
software or hardware.
 Scareware-A form of software designed to scare
the user into divulging information (such as credit
card information) much like social engineering.
 IP Spoofing-Masks the IP address of a hacker and
prevents them from being found
Methods of Hacking
Over the internet
Over Lan
Locally
Offline
Theft
Ip Addresses
Telephone
Email
Black Hat Cracker
 Malicious Hackers
 Villain
 Violates Computer Security
White Hat Hacker
 Computer Security
 A Computer Hacker intending to
improve security.
 The Hero (Legal_Hacker)
List of Hackers
 Black Hat Hackers (The bad guyViolates computers)
 White Hat Hackers (The Hero Breaks security for good
reasons)
 Blue Hat Hacker (consults firms, system tested before
launch)
 Grey Hacker(Mixture of white & Black offers their service to
improve for a small fee)
 Hacktivist (UtilizesTechnology)
 Script Kiddie (Skiddie)Kid-Child lacking knowledge,
Immature
 Elite Hacker (The most skilled Hacker)(Masters of
deception)
 Ethical Hacker(employee and authorised Hacker)
 Bots ( software tools the hackers use )
Statistics
 Attacks on the increase
 In 2010 431 million adults worldwide were
victims of cyber crime
 Costs 114 billion pounds worldwide
 Costs U.K 27 billion pounds a year
 10.5% of the worlds hackers are from the U.K
Statistics
 In Brazil 83% of the population have suffered
from internet crime.
 America is not far behind with 73% falling
victim to internet crime.
 Cyber crime can be down to anyone from
professional criminals to teenagers
Skills to prevent cyber
crime
 Spam blocker
 AntiVirus software
 Firewall protection
 Encryption software
 Caution in providing personal information
 Secure Shopping
 Avoidance of scans
 Monitoring of your child’s computer activities
Firewalls
•Program used to monitor network traffic.
•Have a set of rules that they use to filter
packets trying to enter the network.
•Usually placed between a trusted network and
one that is less trusted.
Antivirus Software
•Used to prevent access to computer systems by
unwanted programs.
•Utilizes many different methods to protect the
computer.
•Often search for signs of viruses on every
website that is visited and do regular scans of
the computer to check for infections.
Conclusion
Any Questions?

More Related Content

PDF
An Introduction to Ethical Hacking
PPTX
Ethical hacking
PPTX
Introduction ethical hacking
PPTX
Protection from hacking attacks
PPTX
Ethical Hacking
PPT
Ethical hacking
PPTX
Introduction To Ethical Hacking
PPT
Hacking
An Introduction to Ethical Hacking
Ethical hacking
Introduction ethical hacking
Protection from hacking attacks
Ethical Hacking
Ethical hacking
Introduction To Ethical Hacking
Hacking

What's hot (20)

PPTX
Internet security powerpoint
PPT
Ethical hacking
PPT
Internet Security
PPT
Hacking Kishor
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Internet Security in Web 2.0
PPTX
National information security education & awareness program
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPTX
Introduction to Ethical Hacking (Basics)
PPTX
Cyper security & Ethical hacking
PPTX
Ethical Hacking PPT (CEH)
PPTX
Ethical Hacking
PPTX
Penetration testing
 
PPT
NewIinternet security
PPT
Ethical hacking
PPTX
Ethical hacking ppt
PPTX
Hacking
PPTX
Introduction To Ethical Hacking
PPT
Ethical hacking
PPTX
Cse ethical hacking ppt
Internet security powerpoint
Ethical hacking
Internet Security
Hacking Kishor
Ethical hacking introduction to ethical hacking
Internet Security in Web 2.0
National information security education & awareness program
Hacktrikz - Introduction to Information Security & Ethical Hacking
Introduction to Ethical Hacking (Basics)
Cyper security & Ethical hacking
Ethical Hacking PPT (CEH)
Ethical Hacking
Penetration testing
 
NewIinternet security
Ethical hacking
Ethical hacking ppt
Hacking
Introduction To Ethical Hacking
Ethical hacking
Cse ethical hacking ppt
Ad

Similar to Internetsecuritypowerpoint 130404101055-phpapp02 (20)

PPTX
Internet security powerpoint
PPTX
Hacking and Hackers
PPTX
HACKING presentation by Team Shivam.pptx
PPT
Computer security: hackers and Viruses
PPT
All about Hacking
PDF
Introduction of hacking and cracking
PPTX
Ethical hacking ppt
PPTX
Dhams hacking
PPTX
hacking basics
PPT
Introduction to hackers
PPT
PPT
How to become Hackers .
PPTX
Introduction to Cyber Security
PDF
Information cyber security
PDF
Information & cyber security, Winter training ,bsnl. online
PPTX
SECURING INFORMATION SYSTEM 1.pptx
PPTX
Ethical hacking 2016
PPTX
Ethical hacking
PPTX
Ethical hacking
Internet security powerpoint
Hacking and Hackers
HACKING presentation by Team Shivam.pptx
Computer security: hackers and Viruses
All about Hacking
Introduction of hacking and cracking
Ethical hacking ppt
Dhams hacking
hacking basics
Introduction to hackers
How to become Hackers .
Introduction to Cyber Security
Information cyber security
Information & cyber security, Winter training ,bsnl. online
SECURING INFORMATION SYSTEM 1.pptx
Ethical hacking 2016
Ethical hacking
Ethical hacking
Ad

Recently uploaded (20)

PPT
Project quality management in manufacturing
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
737-MAX_SRG.pdf student reference guides
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Sustainable Sites - Green Building Construction
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Internet of Things (IOT) - A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
UNIT 4 Total Quality Management .pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
737-MAX_SRG.pdf student reference guides
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Construction Project Organization Group 2.pptx
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Operating System & Kernel Study Guide-1 - converted.pdf
Fundamentals of safety and accident prevention -final (1).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT

Internetsecuritypowerpoint 130404101055-phpapp02

  • 1. By Sanjay Kumar ( B.Tech - 2ndYear, CSE )
  • 2. Introduction  Types of viruses and worms  Ethical Hacking & Black Hat Hacking  Types of Hacking/DataTheft  Examples of Attacks  Skills Required to Prevent Attacks  Measures to Prevent Attacks
  • 3. Malware and Viruses • Malicious Software. • Used by an attacker to steal data, disrupt operations or access a private network. • Used to describe many different types of software including viruses, worms, Trojans, key loggers, spyware and others.
  • 4. Computer Virus •Any computer program that can replicate itself and spread from one computer to another without input from its creator. •Needs to attach itself to an existing program in order for it to work. •They are used to deliver many different payloads.
  • 5. Computer Worm •Unlike a virus a worm does not need to be attached to an existing program in order to function. •Always cause harm to the network, even if it is just increased bandwidth consumption, whereas a virus will always corrupt and/or modify files on a computer. •A program similar to a virus; it can replicate itself and spread from one computer to another.
  • 6. Trojan Horse •A program that pretends to do one thing, but in reality does something else. •Used to record keystrokes input by a user •Can be used to steal usernames, passwords, credit card information, personal details and so on. •Usually employ a form of social engineering.
  • 7. Social Engineering • Social engineering is the art of manipulating people into divulging personal and confidential information. • Requires very little technical skill. • Relies heavily on human interaction to get results. • Most often used in tandem with other exploits.
  • 8. Who is a Hacker and what can they do ?  Someone who bypasses the systems and Passwords.  Taking advantage of weaknesses left in the system by developers.  This person knows computer programming  Can be a Hacker Subculture  Access confidential information  Broadcast confidential documents e.g. Name, address, etc.
  • 9. Types of Hacking/Data Theft  Password Cracking-Attempting to guess a password using a program. • Brute Forcing-A program that guesses a password by inputting as many randomly generated passwords using the computer’s processing power. • Dictionary Hack-A program that guesses passwords based on words in a dictionary or the program’s vocabulary.  Packet Sniffing-Sniffing packets sent over the internet to gain security details over unsecured connections.  Phishing-Legitimate looking sites designed to farm information inputted by the user.
  • 10. Types of Hacking/Data Theft  Rootkit-Stealth software which inhibits use of programs executed by the user and hides (usually malicious) processes.  Keyloggers-records keystrokes and can be software or hardware.  Scareware-A form of software designed to scare the user into divulging information (such as credit card information) much like social engineering.  IP Spoofing-Masks the IP address of a hacker and prevents them from being found
  • 11. Methods of Hacking Over the internet Over Lan Locally Offline Theft Ip Addresses Telephone Email
  • 12. Black Hat Cracker  Malicious Hackers  Villain  Violates Computer Security
  • 13. White Hat Hacker  Computer Security  A Computer Hacker intending to improve security.  The Hero (Legal_Hacker)
  • 14. List of Hackers  Black Hat Hackers (The bad guyViolates computers)  White Hat Hackers (The Hero Breaks security for good reasons)  Blue Hat Hacker (consults firms, system tested before launch)  Grey Hacker(Mixture of white & Black offers their service to improve for a small fee)  Hacktivist (UtilizesTechnology)  Script Kiddie (Skiddie)Kid-Child lacking knowledge, Immature  Elite Hacker (The most skilled Hacker)(Masters of deception)  Ethical Hacker(employee and authorised Hacker)  Bots ( software tools the hackers use )
  • 15. Statistics  Attacks on the increase  In 2010 431 million adults worldwide were victims of cyber crime  Costs 114 billion pounds worldwide  Costs U.K 27 billion pounds a year  10.5% of the worlds hackers are from the U.K
  • 16. Statistics  In Brazil 83% of the population have suffered from internet crime.  America is not far behind with 73% falling victim to internet crime.  Cyber crime can be down to anyone from professional criminals to teenagers
  • 17. Skills to prevent cyber crime  Spam blocker  AntiVirus software  Firewall protection  Encryption software  Caution in providing personal information  Secure Shopping  Avoidance of scans  Monitoring of your child’s computer activities
  • 18. Firewalls •Program used to monitor network traffic. •Have a set of rules that they use to filter packets trying to enter the network. •Usually placed between a trusted network and one that is less trusted.
  • 19. Antivirus Software •Used to prevent access to computer systems by unwanted programs. •Utilizes many different methods to protect the computer. •Often search for signs of viruses on every website that is visited and do regular scans of the computer to check for infections.