OutLine
Introduction.
Internet Security: What it is, and why we need it.
Hackers: Who is he, Classes, Hacking Phases.
Attacks exemples.
What should I do to be safe online ?
Conclusion
2
Introduction:
While the internet offers enormous advantages and opportunities, it also presents
various security risks.
It’s where we access our banking records, credit card statements, tax returns and other
highly sensitive personal information.
Banks take extensive steps to protect the information transmitted andprocessed
when banking online.
But with all the good things the Internet offers us, it also opens the door toserious,
potentially devastating threats.
3
Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection of data
sent via Internet Protocol.
We must secure our computers with technology in the same way that we
secure the doors to our offices Security
We must act in ways that protect us against the risks and threats that come with
Internet use Safety
Internet Security:
What it is
4
- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
Internet Security:
Why you need it.
-Identifies your computer
-Where it is located
Request
Response
carries with it unwanted hidden software
5
Hackers:
Who is a Hacker ?
A hacker is an
individual who uses
computer.
The term hacker
may refer to
anyone with.
technical skills, but
it often refers to a
person who uses
his or her abilities
to gain
unauthorized
access
to systems or
networks in order to
commit crimes
6
Hackers
Hacker Classes :
Black Hats BLACK HATS BLACK HATS
The term “black hat”
originated from Western
movies, where the bad guys
wore black hats and the good
guys wore white hats.[1]
They try to inflict damage by
compromising security
systems, altering functions of
websites and networks, or
shutting down systems. They
often do so to steal or gain
access to passwords,
financial information, and
other personal data.
A black-hat hacker is an
individual who attempts to
gain unauthorized entry into
a system or network to
exploit them for malicious
reasons. The black-hat
hacker does not have any
permission or authority to
compromise their targets.
7
Hackers
Hacker Classes :
Grey Hats Grey Hats Grey Hats
A grey hat hacker is
someone who may
violate ethical
standards or
principles, but
without the
malicious intent
If issues are found,
they will report them
to the owner,
sometimes
requesting a small
fee to fix the issue.
grey hat
hackers will look
for vulnerabilities in
a system without
the owner's
permission or
knowledge.
8
Hackers
Hacker Classes :
White Hats White Hats White Hats
A white hat hacker
is a computer
security specialist
white hat hackers
have permission to
employ them
against the
organization that
has hired them.
who breaks into
protected systems
and networks to
test and asses their
security.
9
Attacks exemples.
Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit card
numbers.
10
What should I do to be safe online ?.
To protect your self
Keep you
passwords private
and create ones
too strong that are
hard to “crack”
If you have received an
Email encounters, you
may have been the
target of a common
scam called ‘phishing’.
13
What should I do to be safe online ?.
To protect your self
Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name. If you make purchases
or do your banking
online, make sure you
protect your financial
information
Use ‘https://’
14
What should I do to be safe online ?.
To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software so
unknown people cannot
lurk on your computer and
potentially
steal your information
15
Conclusion
Whenever using internet or an online financial system, ensure that your
system is still under your control and not a spoofed puppet.
Protecting your self from internet threats.
Being aware of the dangers of the internet and taking the rightsteps to
avoid them means you can enjoy the internet safely.
16