SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Mohamed MALKI
Internet Security
Staying safe online
1
OutLine
 Introduction.
 Internet Security: What it is, and why we need it.
 Hackers: Who is he, Classes, Hacking Phases.
 Attacks exemples.
 What should I do to be safe online ?.
 Conclusion
2
Introduction:
 While the internet offers enormous advantages and opportunities, it also presents
various security risks.
 It’s where we access our banking records, credit card statements, tax returns and
other highly sensitive personal information.
 Banks take extensive steps to protect the information transmitted and processed
when banking online.
 But with all the good things the Internet offers us, it also opens the door to serious,
potentially devastating threats.
3
 Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection
of data sent via Internet Protocol.
 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that come
with Internet use  Safety
Internet Security:
What it is
4
Request
-Identifies your computer
-Where it is located
carries with it unwanted hidden software
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
The criminals use in accessing :
• your private information.
• stealing your identity or your money.
• It can also be used to highjack your
computer for illegal purposes.
Internet Security:
Why you need it.
Response
5
Hackers:
Who is a Hacker ?
Intelligent individuals
with excellent
computer skills with
the ability to create
and explore
computer’s software
and Hardware
For some
hackers,hacking is a
hobby to see how
many computers they
can compromise
Their intention can
either be to gain
knowledge or to poke
around to do illegal
things
6
Hackers
Hacker Classes :
Black Hats Grey Hats White Hats
Individuals with
extraordinary
computing skills,
Restoring to malicious
or destructive
activities and also
known as Crackers
Individuals professing
hacker skills and using
them for defensive
purposes and are also
known as Security
Analysts
Individuals who work
both offensively and
defensively at various
times
7
Hackers
Hacking Phases :
Reconnaissance Scanning
Gaining
Access
Maintaining
Access
Covering
Tracks
8
Attacks exemples.
Phishing
‘ ’ Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication ’ ’
9
Attacks exemples.
Phishing
10
Attacks exemples.
Pharming
Is another technique used
to steal confidential
access code. It works by
redirecting users to a
rogue server
11
Attacks exemples.
SQL injection
SQL injection is a technique
used to take advantage of
non validated input
vulnerabilities to pass SQL
commands through a web
application for execution by
a backend database
12
Attacks exemples.
SQL injection
13
What should I do to be safe online ?.
14
 Keep you
passwords private
and create ones
too strong that are
hard to “crack”
What should I do to be safe online ?.
 To protect your self
 If you have received
an Email encounters,
you may have been
the target of a
common scam called
‘phishing’.
15
 Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.
What should I do to be safe online ?.
 To protect your self
 If you make purchases
or do your banking
online, make sure you
protect your financial
information
 Use ‘https://’
16
What should I do to be safe online ?.
 To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software
so unknown people cannot
lurk on your computer and
potentially
steal your information
17
What should I do to be safe online ?.
 To protect your Computer
Keep Your Computer
Updated:
Install all security updates
as soon as they are
available Automatic
updates provide the best
protection Use a Firewall:
It is a placed at the
gateway between the two
networks which is usually a
private Network and a
public network such as the
internet
Firewall
WAN
LAN
18
Conclusion
 Whenever using internet or an online financial system, ensure that
your system is still under your control and not a spoofed puppet.
 Protecting your self from internet threats.
 Being aware of the dangers of the internet and taking the right steps
to avoid them means you can enjoy the internet safely.
19
Thank you for your attention !!!
20

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Was ist angesagt? (20)

presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Ähnlich wie Internet security

cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 

Ähnlich wie Internet security (20)

Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Internet Security.pptx
Internet Security.pptxInternet Security.pptx
Internet Security.pptx
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
techalpha07
techalpha07techalpha07
techalpha07
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
What is cybersecurity about?
What is cybersecurity about?What is cybersecurity about?
What is cybersecurity about?
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Kürzlich hochgeladen

VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 

Kürzlich hochgeladen (20)

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Internet security

  • 2. OutLine  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks exemples.  What should I do to be safe online ?.  Conclusion 2
  • 3. Introduction:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted and processed when banking online.  But with all the good things the Internet offers us, it also opens the door to serious, potentially devastating threats. 3
  • 4.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety Internet Security: What it is 4
  • 5. Request -Identifies your computer -Where it is located carries with it unwanted hidden software - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable The criminals use in accessing : • your private information. • stealing your identity or your money. • It can also be used to highjack your computer for illegal purposes. Internet Security: Why you need it. Response 5
  • 6. Hackers: Who is a Hacker ? Intelligent individuals with excellent computer skills with the ability to create and explore computer’s software and Hardware For some hackers,hacking is a hobby to see how many computers they can compromise Their intention can either be to gain knowledge or to poke around to do illegal things 6
  • 7. Hackers Hacker Classes : Black Hats Grey Hats White Hats Individuals with extraordinary computing skills, Restoring to malicious or destructive activities and also known as Crackers Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysts Individuals who work both offensively and defensively at various times 7
  • 8. Hackers Hacking Phases : Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks 8
  • 9. Attacks exemples. Phishing ‘ ’ Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication ’ ’ 9
  • 11. Attacks exemples. Pharming Is another technique used to steal confidential access code. It works by redirecting users to a rogue server 11
  • 12. Attacks exemples. SQL injection SQL injection is a technique used to take advantage of non validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database 12
  • 14. What should I do to be safe online ?. 14
  • 15.  Keep you passwords private and create ones too strong that are hard to “crack” What should I do to be safe online ?.  To protect your self  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 15
  • 16.  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name. What should I do to be safe online ?.  To protect your self  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 16
  • 17. What should I do to be safe online ?.  To protect your Computer Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially steal your information 17
  • 18. What should I do to be safe online ?.  To protect your Computer Keep Your Computer Updated: Install all security updates as soon as they are available Automatic updates provide the best protection Use a Firewall: It is a placed at the gateway between the two networks which is usually a private Network and a public network such as the internet Firewall WAN LAN 18
  • 19. Conclusion  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the right steps to avoid them means you can enjoy the internet safely. 19
  • 20. Thank you for your attention !!! 20

Hinweis der Redaktion

  1. A decade ago, the Internet was something only “techies” talked about. It was a new limitless source of information, with very few users. Today, the Internet has already become an essential part of our lives. It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information. By the end of this decade, over 2 billion people will be connected to the Internet—that’s about half the world’s current population.
  2. Reconnaissance: Reconnaissance is probably the longest phase, sometimes lasting weeks or months.  The black hat uses a variety of sources to learn as much as possible about the target business and how it operates, including Scanning: Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including Gaining Access: Gaining access to resources of victim and extract information of value to the hacker or use his network as a launch site for attacks against other targets. In either situation, the attacker must gain some level of access to one or more network devices. Maintaining Access : Having gained access, an attacker must maintain access long enough to accomplish his or her objectives. Covering Tracks : After achieving his or her objectives, the attacker typically takes steps to hide the intrusion and possible controls left behind for future visits.
  3. If you have received emails like these, you may have been the target of a common scam called ‘phishing’. These emails look as though they come from reputable organisations, such as banks, credit-card companies, online shops and IT companies, but they are actually from criminals.
  4. These emails look as though they come from reputable organisations, such as banks, credit-card companies, online shops and IT companies, but they are actually from criminals.
  5. Protecting your computer from malwares is simple, just follow the tips below.