Web Security
Website: www.snipercorporation.com
What is web security?
Web Security, also known as “Cyber security”
involves protecting that information by
preventing, detecting, and responding to
attacks.
Website: www.snipercorporation.com
Web Security: Terminologies
• Hacker – people who seek to exploit
weaknesses in software and computer
systems for their own gain.
• Viruses - A piece of code has a detrimental
effect, such as corrupting the system or
destroying data.
Website: www.snipercorporation.com
Web Security: Terminologies
• Worms - Worms propagate without user
intervention. Once the victim computer has
been infected the worm will attempt to find
and infect other computers.
• Trojan horses - A Trojan horse program is
software that claims to be one thing while in
fact doing something different behind the
scenes.
Website: www.snipercorporation.com
Web Security: Terminologies
Ransomware
• A form of trojan that has been around since 1989 (as
the “PC CYBORG” trojan)
• It infects the target computer by encrypting the
owner's personal files.
• The victim is then contacted and offered a key to
decrypt the files in exchange for cash
Website: www.snipercorporation.com
Web Security: Terminologies
Firewalls:
Mechanism for content regulation and data filtering
• Blocking unwanted traffic from entering the sub-
network (inbound)
• Preventing subnet users' use of unauthorised
material/sites (outbound)
Website:: www.snipercorporation.com
Web Security Issues
• Malicious websites
• Email Viruses
• Phishing
• DDOS
Website: www.snipercorporation.com
Malicious websites
• Malicious Websites are those which contains Malwares, viruses, trojans
etc. and effects your System.
• More than 3 million Web pages on the Internet are malicious.
• According to Google, the percent is one in 1,000.
• The experts call these attacks "drive-by downloads"
Malicious websites
China - 67%
US - 15%
Russia - 4%
Malaysia - 2.2%
Korea - 2%
Website: www.snipercorporation.com
Malicious websites
Preventive measures
- Use latest browser software
- Internet Explorer version 9+
- Mozilla Firefox
- Opera
Internet Explorer 6 is the most vulnerable as well as
the most widely used browser.
It is highly recommended to upgrade from IE 6
Website: www.snipercorporation.com
Email Viruses
It is unsolicited e-mail on the Internet.
A virus that comes within an attached file
in an e-mail message. When that file is
opened, the virus does its damage.
Macro viruses can come in Microsoft
Word documents that are sent as e-
mail attachments.
Website: www.snipercorporation.com
Email Viruses
• It has the ability to scan the complete
address book in the email client program
and it is regular problem of outlook users.
• Once the virus enters your system, it
starts sending out emails to your friends
and colleagues or to the random list of
recipients and forward the same virus.
• Such emails are better known as No-reply
emails which pass a message where you
cannot send the message back to them.
Website: www.snipercorporation.com
Email Viruses
- Corporate employees are
reported to accrue a loss of
productivity of 3.1%. - Nucleus
Research Analysis
- To increase the effectiveness
of SPAM detection, always
report any SPAM mail to your
SPAM filter.
Website: www.snipercorporation.com
Phishing
This is a method of luring an unsuspecting user
into giving out their username and password
for a secure web resource, usually a bank,
credit card account, login information etc.
Website: www.snipercorporation.com
Phishing
• Usually achieved by creating a website identical to the secure
site
• User is sent email requesting them to log in, and providing a
link to the bogus site
• When user logs in, password is stored and used to access the
account by the attacker
• Difficult to guard against, particularly if using HTML email
Website: www.snipercorporation.com
Phishing
Phishing Email sample:
Subject: Verify your E-mail with Citibank
This email was sent by the Citibank server to verify your E-mail
address. You must complete this process by clicking on the link
below and entering in the small window your Citibank ATM/Debit
Card number and PIN that you use on ATM.
This is done for your protection - because some of our members
no longer have access to their email addresses and we must
verify it.
To verify your E-mail address and access your bank account,
click on the link below:
https://web.da-us.citibank.com/signin/citifi/scripts/email_verify.jsp
Thank you for using Citibank
Website: www.snipercorporation.com
Phishing
The link uses an anchor text, and the actual
website opens as,
http://citibusinessonline.da.us.citibank.com.citionline.ru/...
Instead of,
http://www.citibank.com/us/index.htm
Phishing
Landing Page
Website: www.snipercorporation.com
Phishing
- Unwitting users submit the data, and the data
is captured by scammers and all the money in
their account will be stolen immediately.
- This method is the main reason for loss of
email passwords also.
Website: www.snipercorporation.com
Denial of Service
It is an attack to make a computer resource
unavailable to its intended users.
Resources:
- Bandwidth & CPU
Website: www.snipercorporation.com
How it Works?
• One way to attack a company’s network or
website is to flood its systems with
information.
• Web and e-mail servers can only handle a
finite amount of traffic and an attacker
overloads the targeted system with packets of
data.
Website: www.snipercorporation.com
How to prevent?
• Simple special-purpose high-speed
firewalls being deployed in the core of
the Internet at inter-domain boundaries
to serve as a filter of sorts
• Gives Upstream access control to a server
under stress
Middle wall or Firewall
Website: www.snipercorporation.com
Take Action
If everyone keep their systems secure, such
threats can never happen.
Small gestures can avoid gigantic problems in
our context.
Website: www.snipercorporation.com
Action Plan
• Use Anti-virus
• Use Anti-Spyware
• Use Total Security Software
• Be aware not to fall for scams and phishing
attacks
• Report SPAM
Website: www.snipercorporation.com
Thank You
Website: www.snipercorporation.com

More Related Content

PPTX
Web security
PPTX
Network security
PPTX
Brute force attack
PPTX
Phishing attack
PPTX
Password cracking and brute force
PPTX
Web security
PPTX
Phishing attack seminar presentation
PPTX
Different Types of Phishing Attacks
Web security
Network security
Brute force attack
Phishing attack
Password cracking and brute force
Web security
Phishing attack seminar presentation
Different Types of Phishing Attacks

What's hot (20)

PPT
Phishing
PPTX
Email phishing and countermeasures
PPT
Web Application Security
PPTX
Email Security: The Threat Landscape
PPSX
Web security
PDF
Application Security - Your Success Depends on it
PPT
Phishing attacks ppt
PPT
Web Security
PPTX
Cybercrime and Security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Inetsecurity.in Ethical Hacking presentation
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
Network Security Presentation
PPTX
Computer security
PPT
Web security
PPT
Network Security Threats and Solutions
PPT
Phishing
PPTX
Security Awareness Training.pptx
PPTX
Chapter- I introduction
Phishing
Email phishing and countermeasures
Web Application Security
Email Security: The Threat Landscape
Web security
Application Security - Your Success Depends on it
Phishing attacks ppt
Web Security
Cybercrime and Security
Network security (vulnerabilities, threats, and attacks)
Cybersecurity Attack Vectors: How to Protect Your Organization
Inetsecurity.in Ethical Hacking presentation
Application Security | Application Security Tutorial | Cyber Security Certifi...
Network Security Presentation
Computer security
Web security
Network Security Threats and Solutions
Phishing
Security Awareness Training.pptx
Chapter- I introduction
Ad

Similar to Web security ppt sniper corporation (20)

PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PDF
web-security-1215757214755670-9.pdf
PPSX
Security Awareness Training
PPTX
Cybersecurity Training
PPTX
Cyber Security and prevention Presentation.pptx
PPTX
Computer Security Presentation
PPTX
Cyber crime and cyber security
PPTX
Ransomware and email security ver - 1.3
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PDF
NCERT Ransomeware and malware attacks.pdf
PPTX
Cyber crimes
PPTX
ch 3 Tools and methods used in Cybercrime.pptx
PDF
Sip 140208055023-phpapp02
PDF
Ethical Hacking and Cyber Security
PPT
Cyber Security-Foundation.ppt
PPTX
Cyber Crime and Social Media Security
PPTX
Cybersecurity Awareness Training for Employees.pptx
PPTX
Online access and computer security.pptx_S.Gautham
PPT
Cyber-Security-CIT good for 1st year engineering students
PPTX
Cyber crime & security
Phishing attack, with SSL Encryption and HTTPS Working
web-security-1215757214755670-9.pdf
Security Awareness Training
Cybersecurity Training
Cyber Security and prevention Presentation.pptx
Computer Security Presentation
Cyber crime and cyber security
Ransomware and email security ver - 1.3
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
NCERT Ransomeware and malware attacks.pdf
Cyber crimes
ch 3 Tools and methods used in Cybercrime.pptx
Sip 140208055023-phpapp02
Ethical Hacking and Cyber Security
Cyber Security-Foundation.ppt
Cyber Crime and Social Media Security
Cybersecurity Awareness Training for Employees.pptx
Online access and computer security.pptx_S.Gautham
Cyber-Security-CIT good for 1st year engineering students
Cyber crime & security
Ad

Recently uploaded (20)

PPTX
Monitoring Stack: Grafana, Loki & Promtail
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PPTX
Introduction to Windows Operating System
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
CNN LeNet5 Architecture: Neural Networks
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Visual explanation of Dijkstra's Algorithm using Python
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Cybersecurity: Protecting the Digital World
PDF
Designing Intelligence for the Shop Floor.pdf
Monitoring Stack: Grafana, Loki & Promtail
How to Use SharePoint as an ISO-Compliant Document Management System
Introduction to Windows Operating System
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
CNN LeNet5 Architecture: Neural Networks
CCleaner 6.39.11548 Crack 2025 License Key
Computer Software and OS of computer science of grade 11.pptx
Wondershare Recoverit Full Crack New Version (Latest 2025)
Salesforce Agentforce AI Implementation.pdf
Oracle Fusion HCM Cloud Demo for Beginners
Tech Workshop Escape Room Tech Workshop
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Visual explanation of Dijkstra's Algorithm using Python
Weekly report ppt - harsh dattuprasad patel.pptx
Cybersecurity: Protecting the Digital World
Designing Intelligence for the Shop Floor.pdf

Web security ppt sniper corporation

  • 2. What is web security? Web Security, also known as “Cyber security” involves protecting that information by preventing, detecting, and responding to attacks. Website: www.snipercorporation.com
  • 3. Web Security: Terminologies • Hacker – people who seek to exploit weaknesses in software and computer systems for their own gain. • Viruses - A piece of code has a detrimental effect, such as corrupting the system or destroying data. Website: www.snipercorporation.com
  • 4. Web Security: Terminologies • Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers. • Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. Website: www.snipercorporation.com
  • 5. Web Security: Terminologies Ransomware • A form of trojan that has been around since 1989 (as the “PC CYBORG” trojan) • It infects the target computer by encrypting the owner's personal files. • The victim is then contacted and offered a key to decrypt the files in exchange for cash Website: www.snipercorporation.com
  • 6. Web Security: Terminologies Firewalls: Mechanism for content regulation and data filtering • Blocking unwanted traffic from entering the sub- network (inbound) • Preventing subnet users' use of unauthorised material/sites (outbound) Website:: www.snipercorporation.com
  • 7. Web Security Issues • Malicious websites • Email Viruses • Phishing • DDOS Website: www.snipercorporation.com
  • 8. Malicious websites • Malicious Websites are those which contains Malwares, viruses, trojans etc. and effects your System. • More than 3 million Web pages on the Internet are malicious. • According to Google, the percent is one in 1,000. • The experts call these attacks "drive-by downloads" Malicious websites China - 67% US - 15% Russia - 4% Malaysia - 2.2% Korea - 2% Website: www.snipercorporation.com
  • 9. Malicious websites Preventive measures - Use latest browser software - Internet Explorer version 9+ - Mozilla Firefox - Opera Internet Explorer 6 is the most vulnerable as well as the most widely used browser. It is highly recommended to upgrade from IE 6 Website: www.snipercorporation.com
  • 10. Email Viruses It is unsolicited e-mail on the Internet. A virus that comes within an attached file in an e-mail message. When that file is opened, the virus does its damage. Macro viruses can come in Microsoft Word documents that are sent as e- mail attachments. Website: www.snipercorporation.com
  • 11. Email Viruses • It has the ability to scan the complete address book in the email client program and it is regular problem of outlook users. • Once the virus enters your system, it starts sending out emails to your friends and colleagues or to the random list of recipients and forward the same virus. • Such emails are better known as No-reply emails which pass a message where you cannot send the message back to them. Website: www.snipercorporation.com
  • 12. Email Viruses - Corporate employees are reported to accrue a loss of productivity of 3.1%. - Nucleus Research Analysis - To increase the effectiveness of SPAM detection, always report any SPAM mail to your SPAM filter. Website: www.snipercorporation.com
  • 13. Phishing This is a method of luring an unsuspecting user into giving out their username and password for a secure web resource, usually a bank, credit card account, login information etc. Website: www.snipercorporation.com
  • 14. Phishing • Usually achieved by creating a website identical to the secure site • User is sent email requesting them to log in, and providing a link to the bogus site • When user logs in, password is stored and used to access the account by the attacker • Difficult to guard against, particularly if using HTML email Website: www.snipercorporation.com
  • 15. Phishing Phishing Email sample: Subject: Verify your E-mail with Citibank This email was sent by the Citibank server to verify your E-mail address. You must complete this process by clicking on the link below and entering in the small window your Citibank ATM/Debit Card number and PIN that you use on ATM. This is done for your protection - because some of our members no longer have access to their email addresses and we must verify it. To verify your E-mail address and access your bank account, click on the link below: https://web.da-us.citibank.com/signin/citifi/scripts/email_verify.jsp Thank you for using Citibank Website: www.snipercorporation.com
  • 16. Phishing The link uses an anchor text, and the actual website opens as, http://citibusinessonline.da.us.citibank.com.citionline.ru/... Instead of, http://www.citibank.com/us/index.htm
  • 18. Phishing - Unwitting users submit the data, and the data is captured by scammers and all the money in their account will be stolen immediately. - This method is the main reason for loss of email passwords also. Website: www.snipercorporation.com
  • 19. Denial of Service It is an attack to make a computer resource unavailable to its intended users. Resources: - Bandwidth & CPU Website: www.snipercorporation.com
  • 20. How it Works? • One way to attack a company’s network or website is to flood its systems with information. • Web and e-mail servers can only handle a finite amount of traffic and an attacker overloads the targeted system with packets of data. Website: www.snipercorporation.com
  • 21. How to prevent? • Simple special-purpose high-speed firewalls being deployed in the core of the Internet at inter-domain boundaries to serve as a filter of sorts • Gives Upstream access control to a server under stress Middle wall or Firewall Website: www.snipercorporation.com
  • 22. Take Action If everyone keep their systems secure, such threats can never happen. Small gestures can avoid gigantic problems in our context. Website: www.snipercorporation.com
  • 23. Action Plan • Use Anti-virus • Use Anti-Spyware • Use Total Security Software • Be aware not to fall for scams and phishing attacks • Report SPAM Website: www.snipercorporation.com