SlideShare a Scribd company logo
Cybersecurity
Techniques & Practices
Network Forensics for Hacker Trackers
By Camper: Sal, Lauren, Aiden, Skyler, and Molly
Mentors: Prof. Prasad Calyam,
Roshan Neupane (Graduate Student)
Department of Electrical Engineering & Computer Science,
University of Missouri
July 2017
Why are there Cyber-Attacks?
• Basic reasons include:
• Entertainment
• Pure joy and fun for the hacker
• Fortune or Fame
• Gains popularity in the hacker community
• Fraud
• Identity theft or credit card number
• Earning Money
• Threatening or Bribing for personal gain
Main attacks on the target
•Loss of Confidentiality
•Loss of Integrity
•Loss of Availability
Protection of the Victim through the Cloud:
**Moving target defense**
• The Cloud is another computer, or a
network of computers
• Stores information and resources virtually
in someone else's database. Not your own.
• What Moving Target Defense does:
Copies and moves data, packets, and
information from a server that's being
attacked, to a new server.
• This creates a server that's NO LONGER
being attacked!
The Balance Between Safety and Accessibility
• When everything is based around safety and defense, It can be
difficult to manage.
• BUT, when everything is easy and accessible to you, that makes it
that much more accessible to anyone else, including attackers.
• Take any and all considerations of becoming a victim to cyber-
attacks when creating online accounts.
Resources and
information
SSH Key: Used as a
more secure and
convenient way of
distributing access to
the cloud
OS
User Mistakes and How to Avoid Them
• Problems in an entire online infrastructure can be caused by the
user's error. The service they are using may not be at fault.
• Try to create stronger passwords, check on your accounts, and
have a better mentality of how it can only take one account to have
access to a plethora of resources that can be used against you.
Extra Info
•The first virus was created in 1986 by Basit and
Amjad Alvi in Pakistan
•8 new viruses are released every second
•250,000 new viruses are released every day!!
Time for our video demo!
1
2
4
3

More Related Content

PPTX
Network security threats and solutions
PPTX
Seminar (network security)
PPT
Network security presentation
PPTX
Network security (syed azam)
PPTX
IT Security for Small Business
PPTX
Cyber attack
PPTX
Presentation on Cyber Security
PDF
Presentation on Network Security
Network security threats and solutions
Seminar (network security)
Network security presentation
Network security (syed azam)
IT Security for Small Business
Cyber attack
Presentation on Cyber Security
Presentation on Network Security

What's hot (20)

PDF
Cyber Security & Information Warfare : A global security issue
PPTX
Dos attack
PDF
Cyber Attack Analysis
PPT
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Basics of Network Security
PPTX
Ethical hacking ppt
PPT
Cyber ppt
PPTX
Network Security
PPTX
Cyber Security 03
PPT
Cybercrime and security
PPTX
Network basic security
DOCX
Network security
PDF
What is Network Security?
PPTX
Introduction to information security
PPTX
Types of Cyber Attacks
PDF
Cyber attacks
PDF
Internet Security
PPTX
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Security & Information Warfare : A global security issue
Dos attack
Cyber Attack Analysis
Network security (vulnerabilities, threats, and attacks)
Basics of Network Security
Ethical hacking ppt
Cyber ppt
Network Security
Cyber Security 03
Cybercrime and security
Network basic security
Network security
What is Network Security?
Introduction to information security
Types of Cyber Attacks
Cyber attacks
Internet Security
Cyber Space Operation- Offensive Cyber Space Operation

Similar to Summers@Mizzou 2017 Hacker Tracker Talk (20)

PDF
Cybersecurity - Webinar Session
PPTX
STAY SAFE ONLINE GUIDE TO CYBERSECURITY
PPTX
Cyber security
PPTX
Training on Cyber Security & Awareness for employees
PPTX
What is Cyber & information security.pptx
PDF
Cyber Security Matters a book by Hama David Bundo
PDF
Do You Know About Cyber Security? | Secninjaz Technologies LLP
PDF
Presentation 10 (1).pdf
PPTX
Lecture 3.pptx
PDF
8.Information Security
PPTX
Cyber Security
PPTX
Cybersecurity
PPTX
CYBERSECURITY | Why it is important?
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Shubham IT Project on cyber security & awareness
PDF
Iscsp apt
PPTX
Introduction to cyber security
PPT
Cyber security & Importance of Cyber Security
PPT
cyber terrorism
PPT
cyber terrorism
Cybersecurity - Webinar Session
STAY SAFE ONLINE GUIDE TO CYBERSECURITY
Cyber security
Training on Cyber Security & Awareness for employees
What is Cyber & information security.pptx
Cyber Security Matters a book by Hama David Bundo
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Presentation 10 (1).pdf
Lecture 3.pptx
8.Information Security
Cyber Security
Cybersecurity
CYBERSECURITY | Why it is important?
Cyber Security and Data Privacy in Information Systems.pptx
Shubham IT Project on cyber security & awareness
Iscsp apt
Introduction to cyber security
Cyber security & Importance of Cyber Security
cyber terrorism
cyber terrorism

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Unlocking AI with Model Context Protocol (MCP)

Summers@Mizzou 2017 Hacker Tracker Talk

  • 1. Cybersecurity Techniques & Practices Network Forensics for Hacker Trackers By Camper: Sal, Lauren, Aiden, Skyler, and Molly Mentors: Prof. Prasad Calyam, Roshan Neupane (Graduate Student) Department of Electrical Engineering & Computer Science, University of Missouri July 2017
  • 2. Why are there Cyber-Attacks? • Basic reasons include: • Entertainment • Pure joy and fun for the hacker • Fortune or Fame • Gains popularity in the hacker community • Fraud • Identity theft or credit card number • Earning Money • Threatening or Bribing for personal gain
  • 3. Main attacks on the target •Loss of Confidentiality •Loss of Integrity •Loss of Availability
  • 4. Protection of the Victim through the Cloud: **Moving target defense** • The Cloud is another computer, or a network of computers • Stores information and resources virtually in someone else's database. Not your own. • What Moving Target Defense does: Copies and moves data, packets, and information from a server that's being attacked, to a new server. • This creates a server that's NO LONGER being attacked!
  • 5. The Balance Between Safety and Accessibility • When everything is based around safety and defense, It can be difficult to manage. • BUT, when everything is easy and accessible to you, that makes it that much more accessible to anyone else, including attackers. • Take any and all considerations of becoming a victim to cyber- attacks when creating online accounts.
  • 6. Resources and information SSH Key: Used as a more secure and convenient way of distributing access to the cloud OS
  • 7. User Mistakes and How to Avoid Them • Problems in an entire online infrastructure can be caused by the user's error. The service they are using may not be at fault. • Try to create stronger passwords, check on your accounts, and have a better mentality of how it can only take one account to have access to a plethora of resources that can be used against you.
  • 8. Extra Info •The first virus was created in 1986 by Basit and Amjad Alvi in Pakistan •8 new viruses are released every second •250,000 new viruses are released every day!!
  • 9. Time for our video demo! 1 2 4 3