SlideShare a Scribd company logo
1 of 25
Cyber Security & Network Attack ANALOG GROUP
Cyber Security The electronic medium in which online communication takes place.  Cyber space is virtual space in computer media. Security is the degree of protection against danger, damage, loss, and criminal activity. ANALOG GROUP
Element Of Security Confidentiality: Disclosure of information only to authorized entities  Integrity: Prevention of unauthorized changes to data  Authenticity: Confidence that a message was sent by a certain party and not an imposter  Availability: Guarantee of access to resources ANALOG GROUP
The Security , Functionality & Ease of Use Triangle Functionality Moving Ball Security Ease of Use ANALOG GROUP
What Does A malicious Hacker Do? 1 Foot printing  Scanning 2 5 Clearing Track gaining access 3 maintaining access 4 ANALOG GROUP
Network ANALOG GROUP
Network Attack Eavesdropping Snooping Interception Modification Attacks Repudiation Attacks Sniffing Port Scanning TCP Syn. or TCP ACK Attack TCP Sequence number attack TCP Hijacking ICMP Attacks Smurf Attacks ICMP Tunelling           Denial-of-service (DoS) Attacks Distributed denial-of-service (DDoS) Attacks Back door Attacks Spoofing Attacks Man-in-the-Middle Attacks Replay Attacks Password Guessing Attacks ANALOG GROUP
Eavesdropping --get MAC Address -- get IP Address -- get Base Station Address -- sniff clear text passwords and keys -- crack wep keys-- crack password   -- get SSIDs ANALOG GROUP
Snooping Same as Eavesdropping But it will work  all time not limited during  transmission  . Ex. Keyloger ANALOG GROUP
Port Scanning On computer and telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually with a socket and plug of some kind. In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.  ANALOG GROUP
Dos & Ddos Attack    Denial of Service is an attack through which a person can make a system unusable, or slow it down for legitimate users,by overloading its resources. ANALOG GROUP
MITM attack : man in the middle attack As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently ANALOG GROUP
Back door Attacks  This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks. ANALOG GROUP
SQL Injection  SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution The vulnerability is present when user input is either incorrectly filtered for string literalescape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed ANALOG GROUP
How To Protect? Install a Hardware Firewall/Router Secure Your WiFi Install a Web Filter/Proxy  Install a Spam Filter  Install and Maintain Antivirus Software Install Desktop Firewall Software Install Antispyware Software Install Encryption/Secure Deletion Software Install and Use a Backup System ANALOG GROUP
First protect your computer. 1: Protect computer by password. 2: use administrator & guest account to login. 3: Apply group policy. 4: Use a up to date antivirus  ANALOG GROUP
Now Network Security.      1. Install a Hardware Firewall/Router The hardware firewall/router is at the core of your system security. It is on the “front lines” when it comes to protecting your systems. It’s main security purpose is to let you get out to the Internet while keeping the Internet out of your computers. A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped.  ANALOG GROUP
Secure Your WiFi 1: Use preferred encryption methods in this order: WPA2, WPA (been cracked), WEP (been cracked). Only use WPA and WEP if you have no other choice 2: Change your SSID to something obscure 3: Don’t broadcast your SSID 4: Use MAC address authentication 5: Turn off your WiFi when not in use 6: Disable DHCP on entire network ANALOG GROUP
Web Filter/Proxy  In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. ANALOG GROUP
Antivirus Bit  Defender Antivirus 2011 Norton Antivirus 2011 F-Secure Antivirus 2011 ESET NOD32 Antivirus 4 Kasper sky Antivirus 2011 Trend Micro Titanium Security Panda Antivirus 2011 AVG Antivirus 2011 G Data Antivirus 2011 Zone Alarm Antivirus 2011 Vipre Antivirus 2011 McAfee Antivirus Plus 2011 CA Antivirus 2011 AvanquestSystemSuite 11 Professional AviraAntivir Premium 2011 Sophos Endpoint Security 2011 Comodo Antivirus 2011 PC Tools Spyware Doctor with Antivirus 2011 Quick Heal Antivirus 2011 Microsoft Security Essentials 2011 ANALOG GROUP
INDIA in cyber security Cyber law of India is weak and so is cyber security of India. In fact, cyber security of India is in poor state. We have no cyber security strategy of India and this is resulting in a weak and vulnerable cyber security of India. India is facing serious cyber threats and its cyberspace is not at all secure. Cyber terrorism against India is now a well known fact and cyber espionage against India is even admitted by Indian government. Even defence forces of India need to upgrade their cyber security capabilities. We also have negligible cyber forensics capabilities in India and cyber skills development in India is the need of the hour.  ANALOG GROUP
Cyber terrorism in India, cyber crimes and cyber attacks against India are increasing because we have no national security policy of India. Further, we also have no national security an ICT policy of India. Obviously national cyber security in India is not upto the mark in the absence of networks security in India. National Security Policy of India is urgently required and Cyber Security Policy of India must be an essential part of the same, says Praveen Dalal, managing partner of New Delhi based Law Firm Perry4Law and leading techno legal expert of India. Increasing Cyber Security Readiness with Adaptive Threat Management is need of the hour, suggests Dalal. Further, Measurement of ICT Resilience and Robustness on regular basis is also required, suggests Dalal.  ANALOG GROUP
Where are you? ANALOG GROUP
Any Problem? ANALOG GROUP
PRESENTED BY SHASHI SHNAKER SINGH COMPUTER SCIENCE  & ENGINEERING  ANAND ENGINEERING COLLEGE,AGRA ANALOG GROUP

More Related Content

What's hot

Data Network Security
Data Network SecurityData Network Security
Data Network Security
Atif Rehmat
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
Joe McCarthy
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
Umang Gupta
 

What's hot (20)

Security threats
Security threatsSecurity threats
Security threats
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Network security
 Network security Network security
Network security
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Network security
Network securityNetwork security
Network security
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 

Viewers also liked

Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
AfiqEfendy Zaen
 
Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
Bipin Jethwani
 
Friendship
FriendshipFriendship
Friendship
nva216
 

Viewers also liked (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Integrity
IntegrityIntegrity
Integrity
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
File Management
File ManagementFile Management
File Management
 
How to study well
How to study wellHow to study well
How to study well
 
Motivational Slides
Motivational SlidesMotivational Slides
Motivational Slides
 
Flip Flop
Flip FlopFlip Flop
Flip Flop
 
Memory and file system concepts
Memory and file system conceptsMemory and file system concepts
Memory and file system concepts
 
File system security
File system securityFile system security
File system security
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Basic Security Chapter 1
Basic Security Chapter 1Basic Security Chapter 1
Basic Security Chapter 1
 
Internet Security Basics
Internet Security BasicsInternet Security Basics
Internet Security Basics
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'Network Security Monitoring or How to mitigate a DDoS attack in 20'
Network Security Monitoring or How to mitigate a DDoS attack in 20'
 
Friendship
FriendshipFriendship
Friendship
 
Latches and flip flop
Latches and flip flopLatches and flip flop
Latches and flip flop
 
File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchy
 

Similar to Cyber security & network attack6

Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
healdkathaleen
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
Emmanuel Udeagha B.
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_as
Masood Shah
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
Komalah Nair
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
WilheminaRossi174
 

Similar to Cyber security & network attack6 (20)

Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Network Vulnerability and Patching
Network Vulnerability and PatchingNetwork Vulnerability and Patching
Network Vulnerability and Patching
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Application security
Application securityApplication security
Application security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Implementation_of_User_Authentication_as
Implementation_of_User_Authentication_asImplementation_of_User_Authentication_as
Implementation_of_User_Authentication_as
 
Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
 
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptxDomain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
 
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
Chapter 4Secure Design PrinciplesCopyright © 2014 by McGraw-
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Day4
Day4Day4
Day4
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Cyber security & network attack6

  • 1. Cyber Security & Network Attack ANALOG GROUP
  • 2. Cyber Security The electronic medium in which online communication takes place. Cyber space is virtual space in computer media. Security is the degree of protection against danger, damage, loss, and criminal activity. ANALOG GROUP
  • 3. Element Of Security Confidentiality: Disclosure of information only to authorized entities Integrity: Prevention of unauthorized changes to data Authenticity: Confidence that a message was sent by a certain party and not an imposter Availability: Guarantee of access to resources ANALOG GROUP
  • 4. The Security , Functionality & Ease of Use Triangle Functionality Moving Ball Security Ease of Use ANALOG GROUP
  • 5. What Does A malicious Hacker Do? 1 Foot printing Scanning 2 5 Clearing Track gaining access 3 maintaining access 4 ANALOG GROUP
  • 7. Network Attack Eavesdropping Snooping Interception Modification Attacks Repudiation Attacks Sniffing Port Scanning TCP Syn. or TCP ACK Attack TCP Sequence number attack TCP Hijacking ICMP Attacks Smurf Attacks ICMP Tunelling Denial-of-service (DoS) Attacks Distributed denial-of-service (DDoS) Attacks Back door Attacks Spoofing Attacks Man-in-the-Middle Attacks Replay Attacks Password Guessing Attacks ANALOG GROUP
  • 8. Eavesdropping --get MAC Address -- get IP Address -- get Base Station Address -- sniff clear text passwords and keys -- crack wep keys-- crack password -- get SSIDs ANALOG GROUP
  • 9. Snooping Same as Eavesdropping But it will work all time not limited during transmission . Ex. Keyloger ANALOG GROUP
  • 10. Port Scanning On computer and telecommunication devices, a port (noun) is generally a specific place for being physically connected to some other device, usually with a socket and plug of some kind. In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network. ANALOG GROUP
  • 11. Dos & Ddos Attack Denial of Service is an attack through which a person can make a system unusable, or slow it down for legitimate users,by overloading its resources. ANALOG GROUP
  • 12. MITM attack : man in the middle attack As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently ANALOG GROUP
  • 13. Back door Attacks This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks. ANALOG GROUP
  • 14. SQL Injection SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution The vulnerability is present when user input is either incorrectly filtered for string literalescape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed ANALOG GROUP
  • 15. How To Protect? Install a Hardware Firewall/Router Secure Your WiFi Install a Web Filter/Proxy Install a Spam Filter Install and Maintain Antivirus Software Install Desktop Firewall Software Install Antispyware Software Install Encryption/Secure Deletion Software Install and Use a Backup System ANALOG GROUP
  • 16. First protect your computer. 1: Protect computer by password. 2: use administrator & guest account to login. 3: Apply group policy. 4: Use a up to date antivirus ANALOG GROUP
  • 17. Now Network Security. 1. Install a Hardware Firewall/Router The hardware firewall/router is at the core of your system security. It is on the “front lines” when it comes to protecting your systems. It’s main security purpose is to let you get out to the Internet while keeping the Internet out of your computers. A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped. ANALOG GROUP
  • 18. Secure Your WiFi 1: Use preferred encryption methods in this order: WPA2, WPA (been cracked), WEP (been cracked). Only use WPA and WEP if you have no other choice 2: Change your SSID to something obscure 3: Don’t broadcast your SSID 4: Use MAC address authentication 5: Turn off your WiFi when not in use 6: Disable DHCP on entire network ANALOG GROUP
  • 19. Web Filter/Proxy In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. ANALOG GROUP
  • 20. Antivirus Bit Defender Antivirus 2011 Norton Antivirus 2011 F-Secure Antivirus 2011 ESET NOD32 Antivirus 4 Kasper sky Antivirus 2011 Trend Micro Titanium Security Panda Antivirus 2011 AVG Antivirus 2011 G Data Antivirus 2011 Zone Alarm Antivirus 2011 Vipre Antivirus 2011 McAfee Antivirus Plus 2011 CA Antivirus 2011 AvanquestSystemSuite 11 Professional AviraAntivir Premium 2011 Sophos Endpoint Security 2011 Comodo Antivirus 2011 PC Tools Spyware Doctor with Antivirus 2011 Quick Heal Antivirus 2011 Microsoft Security Essentials 2011 ANALOG GROUP
  • 21. INDIA in cyber security Cyber law of India is weak and so is cyber security of India. In fact, cyber security of India is in poor state. We have no cyber security strategy of India and this is resulting in a weak and vulnerable cyber security of India. India is facing serious cyber threats and its cyberspace is not at all secure. Cyber terrorism against India is now a well known fact and cyber espionage against India is even admitted by Indian government. Even defence forces of India need to upgrade their cyber security capabilities. We also have negligible cyber forensics capabilities in India and cyber skills development in India is the need of the hour. ANALOG GROUP
  • 22. Cyber terrorism in India, cyber crimes and cyber attacks against India are increasing because we have no national security policy of India. Further, we also have no national security an ICT policy of India. Obviously national cyber security in India is not upto the mark in the absence of networks security in India. National Security Policy of India is urgently required and Cyber Security Policy of India must be an essential part of the same, says Praveen Dalal, managing partner of New Delhi based Law Firm Perry4Law and leading techno legal expert of India. Increasing Cyber Security Readiness with Adaptive Threat Management is need of the hour, suggests Dalal. Further, Measurement of ICT Resilience and Robustness on regular basis is also required, suggests Dalal. ANALOG GROUP
  • 23. Where are you? ANALOG GROUP
  • 25. PRESENTED BY SHASHI SHNAKER SINGH COMPUTER SCIENCE & ENGINEERING ANAND ENGINEERING COLLEGE,AGRA ANALOG GROUP