SlideShare a Scribd company logo
THE CYBER
WORLD
A Awarness seminar on
the topic Cyber Security
GUIDE NAME : MRS. SHABNA
(ASSISTANT PROFESSOR ,CSE DEPT,
MGM COLLEGE OF ENGINEERING AND
PHARMACEUTICAL SCIENCE
VALANCHERY)
PRESENTED BY: AJAY DAS K
(CCV19CS002)
02-01-2023 1
01
INTRODUCTION
Introduction about myself
OBJECTIVES
The aim of the seminar
LITERATURE SURVEY
The papers surveyed
02
03
04
05
06
MAIN OBJECTIVES
The main proposed system
THE FUTURE
The futere projects
CONCLUTION AND
REFERENCE
The help that taken for the
project
CONTENTS OF THESEMINAR
02-01-2023 2
"I’m a
Cyber Security Tester
Developer , Programmer , DJ
,Graphic Designer , Web
Developer and B-tech Student
Follow me on :
https://ajustechhub.000webhostap
p.com/
1.Who am I ?
02-01-2023 3
2.OBJECTIVES
To develop plan that can plan,
implement, and monitor cyber
security mechanisms to help ensure
the protection of information
technology assets.
SOLUTION
To prepare students with the
technical knowledge and skills
needed to protect and defend
computer systems and networks.
THE AWARNESS
02-01-2023 4
Cyber Crimes Analysis
02-01-2023 5
Cyber Crimes Analysis
02-01-2023 6
3.LITERATURE SURVEY
S1.
NO
PAPER NAME DETAILS METHODOLOGY ADVANTAGES DISADVANTAGE
1
Cyber Attack-COVID
Stress (Cyber
Higiene “Wash Your
Cyber Data
Regularly”)
International Journal
of Engineering
Research &
Technology (IJERT)
ISSN: 2278-0181
IJERTV10IS060103
Vol. 10 Issue 06,
June-2021
• Intrusion detection
• Situational
awareness
• Cyber–physical
• Cyber security
• Awareness about
cyber thraets
• Lack of
importance
amoung people
2
A comprehensive
review study of
cyber-attacks and
cyber security;
Emerging trends and
recent developments
Energy Reports 7
(2021) 8176–8186
ScienceDirect
• Information
technology
• Cyber-attacks Cyber
• security Emerging
trends Key
management
• Cyber space
threats
• Info about Cyber-
security
• Cyber-security
policy
• Individuals and
companies will
not be immune
to the harms of
these threats.
3
Ethical Hacking
Techniques with
Penetration Testing
International Journal of
Engineering Research
& Technology (IJERT)
ISSN: 2278-0181 -
2019
• Ethical Hacking,
• Hackers,
• Hacking Phases.
• Basic info about
hacking and its
phases
• Used older tech
4 Ethical Hacking
International Journal of
Engineering Research
& Technology (IJERT)
ISSN: 2278-0181
NSDMCC - 2015
• Ethical Hacking,
• Hackers,
• Hacking Phases
• Type of ethical
hackers
• Therotical
approch
02-01-2023 7
4.PROPOSED SYSTEM
Cyberspace refers to the virtual computer world,
and more specifically, an electronic medium that
is used to facilitate online communication.
Cyberspace allows users to share
● information,
● interact,
● swap ideas,
● play games,
● engage in discussions or social forums,
● conduct business and create intuitive media,
● among many other activities.
02-01-2023 8
Cyber space
What is cyber security ?
*Cybersecurity is the practice of
● protecting systems,
● Networks
● programs
from digital attacks.
*These cyberattacks are usually aimed at
● Accessing
● Changing
● destroying sensitive information
● extorting money from users
● interrupting normal business processes.
The cyber security
02-01-2023 9
Hackers
• Ethical Hackers or a Penetration Tester.
• White hat hackers are the good guys of
the hacker world.
White Hat
● Unethical Hacker or a Security Cracker.
● These people hack the system illegally to steal
money or to achieve their own illegal goals
Black Hat
● Gray hat Hackers are Hybrid between Black
hat Hackers and White hat hackers.
● They can hack any system even if they don't
have permission to test the security of the
system but they will never steal money or
damage the system.
Gray Hat
02-01-2023 10
Cyber security threats
strategy cyber attackers use
that relies heavily on human
interaction and often involves
tricking people into breaking
standard security practices.
Password Attacks
Malware is malicious software
such as spyware,
ransomware, viruses and
worms.
Malware
cyber attack that floods a
computer or network so it
can’t respond to requests.
DoS
The goal is to steal sensitive
data like credit card and login
information or to install
malware on the victim’s
machine
Phishing
(MITM) attack occurs when
hackers insert themselves
into a two-party transaction
Man in middle
injection is a type of cyber
attack that results from
inserting malicious code into
a server that uses SQL.
Sql injection
02-01-2023 11
Malware
As software designed to interfere with a computer's normal functioning, malware is a blanket term for
viruses, trojans, and other destructive computer programs threat actors use to infect systems and
networks in order to gain access to sensitive information.
 Provide remote control for an attacker to use an infected machine.
 Send spam from the infected machine to unsuspecting targets.
 Investigate the infected user’s local network.
 Steal sensitive data.
02-01-2023 12
Password Attacks
 Password attacks in cybersecurity require special techniques and software. If a hacker is close to you,
they may try guessing your password using a combination of names, hobbies, essential years, or
numbers.
 If that doesn’t work, they use specialized applications that scan through a list of words many people
use as passwords. Surprisingly, over 75% of the internet population set passwords consisting of the
first 500 words only.
 With this in mind, imagine how easy it is for malicious actors to gain access to your crucial
information!
 That’s why two-factor authentication has become a necessity, adding an extra layer of security.
02-01-2023 13
DoS
• The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine, resulting in
denial-of-service to additional requests. The multiple attack vectors of DoS attacks can be grouped by
their similarities.
DoS attacks typically fall in 2 categories:
• Buffer overflow attacks
• Flood attacks
02-01-2023 14
Man in middle
● The goal of an attack is to steal personal information, such as login credentials, account details and credit card
numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other
websites where logging in is required.
● Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund
transfers or an illicit password change.
● Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of
an advanced persistent threat (APT) assault.
● Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your
account details and then resealing the envelope and delivering it to your door
02-01-2023 15
Phishing
● Phishing victims are tricked into disclosing information they know should be kept private. Because
they trust the source of the information request and believe the party is acting with the best intentions,
phishing email victims typically respond without thinking twice.
02-01-2023 16
Sql injection
● SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries
that an application makes to its database. It generally allows an attacker to view data that they are not
normally able to retrieve. This might include data belonging to other users, or any other data that the
application itself is able to access. In many cases, an attacker can modify or delete this data, causing
persistent changes to the application's content or behavior.
02-01-2023 17
Phases of Hacking
Scanning
Phase 2
Reconnaissance
Phase 1
Maintaining
Access
Phase 4
Clearing
Track
Phase 5
Gaining Access
Phase 3
02-01-2023 18
Hacking Hardwares
Uber tooth
Hack RF Wifi monitor adapter
Proxmark Wifi Pineapple Ra pi
Rubber Ducky
USB Killer
Node MCU
02-01-2023 19
Hacking Tools
Kali Linux
Wire shark Burp Suite
Metasploit Nmap
Air Crack NG
Arduino ide
Proxy Chain Hydra
02-01-2023 20
• Train your self.
• Installing spam filters and anti-malware software
• Performing vulnerability assessments
• Conducting routine penetration testing
• Keep your software and systems fully up to date.
• Ensure Endpoint Protection.
• Install a Firewall.
• Backup your data.
• Control access to your systems.
• networkSecurity.
• Storng Password
Preventing cyber threats
02-01-2023 21
5.FUTURE WORKS
02-01-2023 22
• Automation enabling
• Need to be included in education system
• Awareness must be given when entering to
Cyber space
• Be beware about social engineering
6.CONCLUSION
• Cyber security can be described as the collective methods,
technologies, and processes to help protect the confidentiality,
integrity, and availability of computer systems,
networks and data, against cyber-attacks or
unauthorized access.
• Cyber Crime is a dangerous offense to
someone's privacy or any material.
Also, we can avoid Cyber Crime by
following some basic logical things and
using our common sense. Above all,
Cyber Crime is a violation of not only
law but of human rights too
02-01-2023 23
REFERENCE
• CEH Textbook
EC-Council
• Dark web
• Google
• Stack over flow
• Git hub
02-01-2023 24
THANKS!
Do you have any questions?
02-01-2023 25

More Related Content

PPT
Cyber security & Importance of Cyber Security
Mohammed Adam
 
PPTX
Cyber security
Siblu28
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PPTX
Endangered Species : Power Point Presentation
aiswaryab916
 
PPTX
Security Awareness Training.pptx
MohammedYaseen638128
 
PPTX
Cyber attack
Manjushree Mashal
 
PDF
Let’s get to know Snowflake
Knoldus Inc.
 
PPTX
wireless usb ppt
Chaithanya Adudodla
 
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Cyber security
Siblu28
 
Cyber security presentation
Bijay Bhandari
 
Endangered Species : Power Point Presentation
aiswaryab916
 
Security Awareness Training.pptx
MohammedYaseen638128
 
Cyber attack
Manjushree Mashal
 
Let’s get to know Snowflake
Knoldus Inc.
 
wireless usb ppt
Chaithanya Adudodla
 

What's hot (20)

PPTX
Cyber security presentation
sweetpeace1
 
PDF
Basics of Cyber Security
Nikunj Thakkar
 
PPTX
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
PPTX
Cyber crime and security
Sharath Raj
 
PPTX
CYBER SECURITY
Mohammad Shakirul islam
 
PPTX
Cyber security
Samsil Arefin
 
PPTX
CYBER SECURITY
Vaishak Chandran
 
PDF
Cyber security awareness for students
Kandarp Shah
 
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
PPTX
cyber security
BasineniUdaykumar
 
ODP
Cyber security awareness
Jason Murray
 
PPTX
Cyber security
Dr. Kishor Nikam
 
PPTX
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
PPTX
Cyber security ppt
CH Asim Zubair
 
PDF
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
PPTX
Social engineering presentation
pooja_doshi
 
PPTX
Security threats
Qamar Farooq
 
PPTX
cyber security presentation.pptx
kishore golla
 
PPTX
Cyber security
Manjushree Mashal
 
PPTX
Cyber security
Aman Pradhan
 
Cyber security presentation
sweetpeace1
 
Basics of Cyber Security
Nikunj Thakkar
 
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber crime and security
Sharath Raj
 
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber security
Samsil Arefin
 
CYBER SECURITY
Vaishak Chandran
 
Cyber security awareness for students
Kandarp Shah
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
cyber security
BasineniUdaykumar
 
Cyber security awareness
Jason Murray
 
Cyber security
Dr. Kishor Nikam
 
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Cyber security ppt
CH Asim Zubair
 
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Social engineering presentation
pooja_doshi
 
Security threats
Qamar Farooq
 
cyber security presentation.pptx
kishore golla
 
Cyber security
Manjushree Mashal
 
Cyber security
Aman Pradhan
 
Ad

Similar to CyberSecurity and Importance of cybersecurity (20)

PPTX
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 
PDF
IRJET- Cyber Attacks and its different Types
IRJET Journal
 
PDF
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
CyberPro Magazine
 
PDF
Module 3-cyber security
Sweta Kumari Barnwal
 
PDF
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PPTX
Security Operation Center Fundamental
Amir Hossein Zargaran
 
PPTX
Computer-Security.pptx
JoselitoJMebolos
 
PDF
Cybersecurity - Poland.pdf
PavelVtek3
 
PPTX
Cyber Security and its impact -17042025_ppt.pptx
preethigowda6363
 
PDF
Cyber Privacy & Password Protection
Nikhil D
 
PPTX
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
PDF
CyberSecurity.pdf
Suleiman55
 
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
newtonaseri
 
PPTX
Ethical Hacking justvamshi .pptx
vamshimatangi
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PDF
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 
PDF
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
PPTX
Chatter's cyber security position analysis
prathibhapalagiri
 
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 
IRJET- Cyber Attacks and its different Types
IRJET Journal
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
CyberPro Magazine
 
Module 3-cyber security
Sweta Kumari Barnwal
 
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Computer-Security.pptx
JoselitoJMebolos
 
Cybersecurity - Poland.pdf
PavelVtek3
 
Cyber Security and its impact -17042025_ppt.pptx
preethigowda6363
 
Cyber Privacy & Password Protection
Nikhil D
 
An An Exploration Into the Cyber Security
sivasakthin2022cse
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
CyberSecurity.pdf
Suleiman55
 
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
newtonaseri
 
Ethical Hacking justvamshi .pptx
vamshimatangi
 
Chapter 2 konsep dasar keamanan
newbie2019
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
Belayet Hossain
 
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
 
Chatter's cyber security position analysis
prathibhapalagiri
 
Ad

Recently uploaded (20)

PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
AbdullahSani29
 
Doc9.....................................
SofiaCollazos
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
AVTRON Technologies LLC
 
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
SMACT Works
 
Software Development Company | KodekX
KodekX
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Make GenAI investments go further with the Dell AI Factory - Infographic
Principled Technologies
 
madgavkar20181017ppt McKinsey Presentation.pdf
georgschmitzdoerner
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 

CyberSecurity and Importance of cybersecurity

  • 1. THE CYBER WORLD A Awarness seminar on the topic Cyber Security GUIDE NAME : MRS. SHABNA (ASSISTANT PROFESSOR ,CSE DEPT, MGM COLLEGE OF ENGINEERING AND PHARMACEUTICAL SCIENCE VALANCHERY) PRESENTED BY: AJAY DAS K (CCV19CS002) 02-01-2023 1
  • 2. 01 INTRODUCTION Introduction about myself OBJECTIVES The aim of the seminar LITERATURE SURVEY The papers surveyed 02 03 04 05 06 MAIN OBJECTIVES The main proposed system THE FUTURE The futere projects CONCLUTION AND REFERENCE The help that taken for the project CONTENTS OF THESEMINAR 02-01-2023 2
  • 3. "I’m a Cyber Security Tester Developer , Programmer , DJ ,Graphic Designer , Web Developer and B-tech Student Follow me on : https://ajustechhub.000webhostap p.com/ 1.Who am I ? 02-01-2023 3
  • 4. 2.OBJECTIVES To develop plan that can plan, implement, and monitor cyber security mechanisms to help ensure the protection of information technology assets. SOLUTION To prepare students with the technical knowledge and skills needed to protect and defend computer systems and networks. THE AWARNESS 02-01-2023 4
  • 7. 3.LITERATURE SURVEY S1. NO PAPER NAME DETAILS METHODOLOGY ADVANTAGES DISADVANTAGE 1 Cyber Attack-COVID Stress (Cyber Higiene “Wash Your Cyber Data Regularly”) International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTV10IS060103 Vol. 10 Issue 06, June-2021 • Intrusion detection • Situational awareness • Cyber–physical • Cyber security • Awareness about cyber thraets • Lack of importance amoung people 2 A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments Energy Reports 7 (2021) 8176–8186 ScienceDirect • Information technology • Cyber-attacks Cyber • security Emerging trends Key management • Cyber space threats • Info about Cyber- security • Cyber-security policy • Individuals and companies will not be immune to the harms of these threats. 3 Ethical Hacking Techniques with Penetration Testing International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 - 2019 • Ethical Hacking, • Hackers, • Hacking Phases. • Basic info about hacking and its phases • Used older tech 4 Ethical Hacking International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 NSDMCC - 2015 • Ethical Hacking, • Hackers, • Hacking Phases • Type of ethical hackers • Therotical approch 02-01-2023 7
  • 8. 4.PROPOSED SYSTEM Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace allows users to share ● information, ● interact, ● swap ideas, ● play games, ● engage in discussions or social forums, ● conduct business and create intuitive media, ● among many other activities. 02-01-2023 8 Cyber space
  • 9. What is cyber security ? *Cybersecurity is the practice of ● protecting systems, ● Networks ● programs from digital attacks. *These cyberattacks are usually aimed at ● Accessing ● Changing ● destroying sensitive information ● extorting money from users ● interrupting normal business processes. The cyber security 02-01-2023 9
  • 10. Hackers • Ethical Hackers or a Penetration Tester. • White hat hackers are the good guys of the hacker world. White Hat ● Unethical Hacker or a Security Cracker. ● These people hack the system illegally to steal money or to achieve their own illegal goals Black Hat ● Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. ● They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system. Gray Hat 02-01-2023 10
  • 11. Cyber security threats strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices. Password Attacks Malware is malicious software such as spyware, ransomware, viruses and worms. Malware cyber attack that floods a computer or network so it can’t respond to requests. DoS The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine Phishing (MITM) attack occurs when hackers insert themselves into a two-party transaction Man in middle injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. Sql injection 02-01-2023 11
  • 12. Malware As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.  Provide remote control for an attacker to use an infected machine.  Send spam from the infected machine to unsuspecting targets.  Investigate the infected user’s local network.  Steal sensitive data. 02-01-2023 12
  • 13. Password Attacks  Password attacks in cybersecurity require special techniques and software. If a hacker is close to you, they may try guessing your password using a combination of names, hobbies, essential years, or numbers.  If that doesn’t work, they use specialized applications that scan through a list of words many people use as passwords. Surprisingly, over 75% of the internet population set passwords consisting of the first 500 words only.  With this in mind, imagine how easy it is for malicious actors to gain access to your crucial information!  That’s why two-factor authentication has become a necessity, adding an extra layer of security. 02-01-2023 13
  • 14. DoS • The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine, resulting in denial-of-service to additional requests. The multiple attack vectors of DoS attacks can be grouped by their similarities. DoS attacks typically fall in 2 categories: • Buffer overflow attacks • Flood attacks 02-01-2023 14
  • 15. Man in middle ● The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required. ● Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change. ● Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault. ● Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door 02-01-2023 15
  • 16. Phishing ● Phishing victims are tricked into disclosing information they know should be kept private. Because they trust the source of the information request and believe the party is acting with the best intentions, phishing email victims typically respond without thinking twice. 02-01-2023 16
  • 17. Sql injection ● SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. 02-01-2023 17
  • 18. Phases of Hacking Scanning Phase 2 Reconnaissance Phase 1 Maintaining Access Phase 4 Clearing Track Phase 5 Gaining Access Phase 3 02-01-2023 18
  • 19. Hacking Hardwares Uber tooth Hack RF Wifi monitor adapter Proxmark Wifi Pineapple Ra pi Rubber Ducky USB Killer Node MCU 02-01-2023 19
  • 20. Hacking Tools Kali Linux Wire shark Burp Suite Metasploit Nmap Air Crack NG Arduino ide Proxy Chain Hydra 02-01-2023 20
  • 21. • Train your self. • Installing spam filters and anti-malware software • Performing vulnerability assessments • Conducting routine penetration testing • Keep your software and systems fully up to date. • Ensure Endpoint Protection. • Install a Firewall. • Backup your data. • Control access to your systems. • networkSecurity. • Storng Password Preventing cyber threats 02-01-2023 21
  • 22. 5.FUTURE WORKS 02-01-2023 22 • Automation enabling • Need to be included in education system • Awareness must be given when entering to Cyber space • Be beware about social engineering
  • 23. 6.CONCLUSION • Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. • Cyber Crime is a dangerous offense to someone's privacy or any material. Also, we can avoid Cyber Crime by following some basic logical things and using our common sense. Above all, Cyber Crime is a violation of not only law but of human rights too 02-01-2023 23
  • 24. REFERENCE • CEH Textbook EC-Council • Dark web • Google • Stack over flow • Git hub 02-01-2023 24
  • 25. THANKS! Do you have any questions? 02-01-2023 25