2. OutLine
Introduction.
Internet Security: What it is, and why we need it.
Hackers: Who is he, Classes, Hacking Phases.
Attacks exemples.
What should I do to be safe online ?.
Conclusion
2
3. Introduction:
While the internet offers enormous advantages and opportunities, it also presents
various security risks.
It’s where we access our banking records, credit card statements, tax returns and
other highly sensitive personal information.
Banks take extensive steps to protect the information transmitted and processed
when banking online.
But with all the good things the Internet offers us, it also opens the door to serious,
potentially devastating threats.
3
4. Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection
of data sent via Internet Protocol.
We must secure our computers with technology in the same way that we
secure the doors to our offices Security
We must act in ways that protect us against the risks and threats that come
with Internet use Safety
Internet Security:
What it is
4
5. Request
-Identifies your computer
-Where it is located
carries with it unwanted hidden software
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
The criminals use in accessing :
• your private information.
• stealing your identity or your money.
• It can also be used to highjack your
computer for illegal purposes.
Internet Security:
Why you need it.
Response
5
6. Hackers:
Who is a Hacker ?
Intelligent individuals
with excellent
computer skills with
the ability to create
and explore
computer’s software
and Hardware
For some
hackers,hacking is a
hobby to see how
many computers they
can compromise
Their intention can
either be to gain
knowledge or to poke
around to do illegal
things
6
7. Hackers
Hacker Classes :
Black Hats Grey Hats White Hats
Individuals with
extraordinary
computing skills,
Restoring to malicious
or destructive
activities and also
known as Crackers
Individuals professing
hacker skills and using
them for defensive
purposes and are also
known as Security
Analysts
Individuals who work
both offensively and
defensively at various
times
7
9. Attacks exemples.
Phishing
‘ ’ Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication ’ ’
9
12. Attacks exemples.
SQL injection
SQL injection is a technique
used to take advantage of
non validated input
vulnerabilities to pass SQL
commands through a web
application for execution by
a backend database
12
15. Keep you
passwords private
and create ones
too strong that are
hard to “crack”
What should I do to be safe online ?.
To protect your self
If you have received
an Email encounters,
you may have been
the target of a
common scam called
‘phishing’.
15
16. Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.
What should I do to be safe online ?.
To protect your self
If you make purchases
or do your banking
online, make sure you
protect your financial
information
Use ‘https://’
16
17. What should I do to be safe online ?.
To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software
so unknown people cannot
lurk on your computer and
potentially
steal your information
17
18. What should I do to be safe online ?.
To protect your Computer
Keep Your Computer
Updated:
Install all security updates
as soon as they are
available Automatic
updates provide the best
protection Use a Firewall:
It is a placed at the
gateway between the two
networks which is usually a
private Network and a
public network such as the
internet
Firewall
WAN
LAN
18
19. Conclusion
Whenever using internet or an online financial system, ensure that
your system is still under your control and not a spoofed puppet.
Protecting your self from internet threats.
Being aware of the dangers of the internet and taking the right steps
to avoid them means you can enjoy the internet safely.
19
A decade ago, the Internet was something only “techies” talked about. It was a new limitless source
of information, with very few users. Today, the Internet has already become an essential part of our
lives. It’s where we access our banking records, credit card statements, tax returns and other highly
sensitive personal information. By the end of this decade, over 2 billion people will be connected to
the Internet—that’s about half the world’s current population.
Reconnaissance:
Reconnaissance is probably the longest phase, sometimes lasting weeks or months. The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including
Scanning:
Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including
Gaining Access:
Gaining access to resources of victim and extract information of value to the hacker or use his network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices.
Maintaining Access :
Having gained access, an attacker must maintain access long enough to accomplish his or her objectives.
Covering Tracks :
After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits.
If you have received emails like these, you may have been the target of a common scam called ‘phishing’.
These emails look as though they come from reputable organisations, such as banks, credit-card companies, online shops and IT companies, but they are
actually from criminals.
These emails look as though they come
from reputable organisations, such as banks, credit-card
companies, online shops and IT companies, but they are
actually from criminals.
Protecting your computer from malwares is simple, just follow the tips below.