SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Know your Attacker
Submitted by: Arun Velayudhan
What is cyber security ?
Cyber security practice is to provide solution to protect any
enterprise information systems to make it secure and hack
free.
To provide best practices which addresses secure
interoperability, usability and privacy continues to be need of
the hour.
www.learnfact.in
Type of Attacks
• Malware
– A malicious code that damages/disables and steals information from the computer
– Botnets, Viruses, Trojan horses, backdoor, spyware and adware are some examples
of malwares
• Phishing
– Disclosing confidential information or downloading malware by clicking on a hyperlink
in the message.
• Spear Phishing
– Same as phishing but more targeted where the attacker learns about the victim and
impersonates someone he or she knows and trusts.
• Man in the middle attack
– Attacker establishes a position between the sender and recipient of electronic
messages and interrupt them.
• Denial of service attack
• SQL injection
• Zero day exploit
– A zero-day vulnerability is a software security flaw but doesn’t have a patch in place to
fix the flaw.
• DNS tunneling
www.learnfact.in
Type of Attacks
• Non technical attacks
– Physical attacks like entering your secured building etc.
• Network attacks
– Unsecured Wireless access point
– Exploiting via ports
– Installing network analyzer and capturing the packet
• Operating System attacks
– Missing patches
– Cracking password and weak security implementation
• Application attacks
– Mobile App attacks
– Web Application
www.learnfact.in
Attack Carriers
• File Transfer Apps
• Instant messaging Apps
• Webmail
• Social Media platforms
• Micro blogging
• Collaboration Apps
www.learnfact.in
Common Attack
• SQL injection attack
– SQL Injection is a type of cyber-attack that targets databases through SQL
statements
– executed via a website interface
– Poorly coded are prone to SQL injection attacks
• Distributed Denial-of-Service (DDoS)
– Acts like a traffic jam
– Flooding the network traffic
• Cross-site scripting (XSS) attacks
– Data enters a Web application through an untrusted source, most frequently
a web request.
• Weak security practices and undisclosed vulnerabilities
www.learnfact.in
Hackers
• Black hat hackers
– External unauthorized users try to compromise your environment
• White hat hackers
– White-hat hackers are often referred to as ethical hackers
• Grey hat hackers
– Grey hats exploit networks and computer systems in the way that black hats
do, but do so without any malicious intent, disclosing all loopholes and
vulnerabilities to law enforcement agencies or intelligence agencies.
www.learnfact.in
Common Hacking Tools
• Rootkits
– Rootkit is 2 different words. Root and Kit.
– Rootkit is a set of tools that enables root- or administrator-level access on a
computer system
– Allows hackers to gain remote access via backdoor
• Key loggers
– records every key pressed on a system
– key loggers arrive as malware that allows cybercriminals to steal sensitive
data.
– Key loggers can capture credit card numbers, personal messages, mobile
numbers etc.
www.learnfact.in
Attack lifecycle
• Infection
– Luring users to click on a bad link
– Infect the target system with malware
• Persistence
– Rootkits and bootkits are installed on compromised systems
• Communication
– Communicating with other infected systems
• Command and Control
– Capture the infected systems and enable command and control over the
infected systems to extract stolen data
www.learnfact.in
Common Defense mechanism
• Firewall
• Intrusion prevention
• Antivirus
• Content Filtering
• Web Application Firewall
www.learnfact.in
Common safety tips
• Keep updated your security patches regularly
• Avoid easy and dictionary password. Use strong
passwords.
• Avoid opening attachments from unknown sender or
recipient
www.learnfact.in
Protection Strategy
• Design best security policy
• Application controls
• User controls
• Network controls
• End Point controls
• Enforce drive-by-download protection
• Track unknown and unclassified URLs
www.learnfact.in
Security Methods & Models
• OWASP ( www.owasp.org)
• SecureITree (https://www.amenaza.com)
• OpenGroup (https://www.opengroup.org)
www.learnfact.in
Mail: info@learnfact.in
Mail: arun.velayudhan@tutelage.co.in
Web: www.learnfact.in
Web: www.cybkey.com
Thank You
Contact us for:
Cyber security managed services
Cyber Security Training

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityS.M. Towhidul Islam
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationhamzakareem2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingBugRaptors
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 

Was ist angesagt? (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Software Security
Software SecuritySoftware Security
Software Security
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Attack types
Attack typesAttack types
Attack types
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Hacking
HackingHacking
Hacking
 

Ähnlich wie Cyber security slideshare_oct_2020

Ähnlich wie Cyber security slideshare_oct_2020 (20)

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Venture name Basics
Venture name BasicsVenture name Basics
Venture name Basics
 
Regression
RegressionRegression
Regression
 
Sangeetha Venture
Sangeetha VentureSangeetha Venture
Sangeetha Venture
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Cyber security slideshare_oct_2020

  • 1. Know your Attacker Submitted by: Arun Velayudhan
  • 2. What is cyber security ? Cyber security practice is to provide solution to protect any enterprise information systems to make it secure and hack free. To provide best practices which addresses secure interoperability, usability and privacy continues to be need of the hour. www.learnfact.in
  • 3. Type of Attacks • Malware – A malicious code that damages/disables and steals information from the computer – Botnets, Viruses, Trojan horses, backdoor, spyware and adware are some examples of malwares • Phishing – Disclosing confidential information or downloading malware by clicking on a hyperlink in the message. • Spear Phishing – Same as phishing but more targeted where the attacker learns about the victim and impersonates someone he or she knows and trusts. • Man in the middle attack – Attacker establishes a position between the sender and recipient of electronic messages and interrupt them. • Denial of service attack • SQL injection • Zero day exploit – A zero-day vulnerability is a software security flaw but doesn’t have a patch in place to fix the flaw. • DNS tunneling www.learnfact.in
  • 4. Type of Attacks • Non technical attacks – Physical attacks like entering your secured building etc. • Network attacks – Unsecured Wireless access point – Exploiting via ports – Installing network analyzer and capturing the packet • Operating System attacks – Missing patches – Cracking password and weak security implementation • Application attacks – Mobile App attacks – Web Application www.learnfact.in
  • 5. Attack Carriers • File Transfer Apps • Instant messaging Apps • Webmail • Social Media platforms • Micro blogging • Collaboration Apps www.learnfact.in
  • 6. Common Attack • SQL injection attack – SQL Injection is a type of cyber-attack that targets databases through SQL statements – executed via a website interface – Poorly coded are prone to SQL injection attacks • Distributed Denial-of-Service (DDoS) – Acts like a traffic jam – Flooding the network traffic • Cross-site scripting (XSS) attacks – Data enters a Web application through an untrusted source, most frequently a web request. • Weak security practices and undisclosed vulnerabilities www.learnfact.in
  • 7. Hackers • Black hat hackers – External unauthorized users try to compromise your environment • White hat hackers – White-hat hackers are often referred to as ethical hackers • Grey hat hackers – Grey hats exploit networks and computer systems in the way that black hats do, but do so without any malicious intent, disclosing all loopholes and vulnerabilities to law enforcement agencies or intelligence agencies. www.learnfact.in
  • 8. Common Hacking Tools • Rootkits – Rootkit is 2 different words. Root and Kit. – Rootkit is a set of tools that enables root- or administrator-level access on a computer system – Allows hackers to gain remote access via backdoor • Key loggers – records every key pressed on a system – key loggers arrive as malware that allows cybercriminals to steal sensitive data. – Key loggers can capture credit card numbers, personal messages, mobile numbers etc. www.learnfact.in
  • 9. Attack lifecycle • Infection – Luring users to click on a bad link – Infect the target system with malware • Persistence – Rootkits and bootkits are installed on compromised systems • Communication – Communicating with other infected systems • Command and Control – Capture the infected systems and enable command and control over the infected systems to extract stolen data www.learnfact.in
  • 10. Common Defense mechanism • Firewall • Intrusion prevention • Antivirus • Content Filtering • Web Application Firewall www.learnfact.in
  • 11. Common safety tips • Keep updated your security patches regularly • Avoid easy and dictionary password. Use strong passwords. • Avoid opening attachments from unknown sender or recipient www.learnfact.in
  • 12. Protection Strategy • Design best security policy • Application controls • User controls • Network controls • End Point controls • Enforce drive-by-download protection • Track unknown and unclassified URLs www.learnfact.in
  • 13. Security Methods & Models • OWASP ( www.owasp.org) • SecureITree (https://www.amenaza.com) • OpenGroup (https://www.opengroup.org) www.learnfact.in
  • 14. Mail: info@learnfact.in Mail: arun.velayudhan@tutelage.co.in Web: www.learnfact.in Web: www.cybkey.com Thank You Contact us for: Cyber security managed services Cyber Security Training