SlideShare a Scribd company logo
PROTECTION FROM HACKING
ATTACKS
By Sugirtha Jasmine M (ME Cyber Security)
Information Security Analyst
1.MALWARES
• Malware is a collective term for any
malicious software which enters
system without authorization of user
of the system.
• The term is created from merging
the words malicious and softwares
Types of Malwares
• VIRUS (VITAL INFORMATION RESOURCES
UNDER SEIZE)
• A Virus is computer program that executes
when an infected program is executed.
• On MS-DOS system, these files usually have
the extensions .exe, .com, .bat, .sys
• Virus always needs a trigger to execute itself
and after execution itself and after execution
they leave the memory part.
• Types of Virus
Boot sector Virus
File infecting Viruses
Polymorphic viruses
Stealth Viruses
Multi Partite Viruses
• Boot sector Viruses
Boot sector viruses are those that
infect the boot sector on a computer
system
• File infecting Viruses
are unsurprisingly viruses that infect
files. Sometime these viruses are
memory resident
• Polymorphic Viruses
it change their appearance with each
infection. Such encryption viruses are usually
difficult to detect because they are better at
hiding themselves from antivirus software.
• Stealth Viruses
it attempt to hide from both the operating
system and anti-virus software.
• Multi partite viruses
it infects both boot sector files and
executable files.
HOW VIRUSES SPREAD?
WORMS
• Worms are constructed to infiltrate
legitimate data processing programs
and alter or destroy the data.
• It do not replicate themselves
TROJAN HORSES
• A trojan horse is a destructive
program that has been concealed
in an innocuous piece of software
• It is not viruses because they do
not reproduce themselves and
spread as viruses do.
LOGIC BOMBS
• Writing a logic bomb program is
similar to trojan horses.
• It depends on time and date
BOTS AND BOTNETS
• A bot is a program that operates
automatically as an agent for a user or
another program
• Hackers forward bots to the victim
system
• It also used for mass spam mailings,
installing key logging software that can
steal victims password and data.
VULNERABILITY TO MALWARE
• Use of the same operating system
• Software bugs
• Over privileged users
• Unconfirmed code
ANTI-MALWARE STRATERGIES
• Anti viruses and Anti malware
software
• Website Security Scans
• Eliminating Over Privileged Scan
MALWARE DETECTION TECHNIQUES
• Signature based malware detection
techniques
• Specification based detection
• Behavior based detection
COUNTER MEASURES
• Vaccine Software and Keep it Up-to-date
• Email attachment File Should be scanned
• Downloaded file should be scanned
• For application utilize security functions
• Security patches should be applied
• Symptoms of Virus infection must be
Overlooked
• Incase of emergency data should be Backed
up
NETWORK INTRUSION
• Computer Networks that are
currently to the internet are
vulnerable to a variety of exploits
that can compromise their intended
operations.
TYPES OF INTRUSION
• Non Technical
Social Engineering attack
Pretexting
Phishing
Smishing
Vishing
Tabnabbing
• Technical Intrusion
DOS
Input Validation
Keyloggers
Sniffing
Non Technical Intrusion
• Social Engineering Intrusion
As humans we are bound by both nature
and nurture to the social contract which, like
many contracts, might be twisted to our
disadvantage. Such twisting is called Social
Engineering.
• Common types of social Engineering
Human Based
Impersonation
Important User
Dumpster Diving
Shoulder Surfing
• Computer Based
Popup Windows
Mail Attachments
Spam
Websites
• Pretexting
Pretexting is an act of creating and using
an invented scenario to obtain information
from the target, usually over the telephone.
• Phishing
it uses both social engineering and
technical activities to to steals consumers
personal identity data and financial account
credentials.
• Smishing
Smishing is the cell phone equivalent to
“Phishing” , text messages that lead you to a
counterfeit web site trying to get your
personal information using SMS.
• Vishing
VoIP Phishing is an electronic fraud tactic
in which individuals are tricked in to revealing
critical financial or personal information to
unauthorized entities
TECHNICAL INTRUSION
• DOS
To make service unavailable.
Types
Ping of Death
LAND attack
Tear drop attack
SYN flood attack
ICMP flood attack
Smurf attack
• Ping of Death
An attacker sends an ICMP echo request
packet that is larger than the maximum packet
size.Since the received ICMP echo packet is
larger than the normal IP packet size. The
target cant reassemble the packets. So the OS
crashes or reboot
• LAND Attack
When the attacker initiates a SYN
Flood attack using the IP address of the
victim as source and destination IP
address, then it is said that the attacker
has launched a LAND ATTACK.
• Tear Drop Attack
This type of attack deals with
fragmentation and reassembly of IP Packets.
The IP header contains the necessary fields to
handle fragmentation issues
• SYN Flood Attack
An attacker could deliberately flood the
server with TCP SYN segments without
acknowledging back the server SYN response.
• ICMP Flood Attack
Similar to the SYN flood attack, an ICMP
flood attack takes place when an attacker
overloads its victim with huge number of
ICMP echo request with spoofed source IP
address.
Smurf attack
it is a type of network level DOS attack
using ICMP echo replies from computer in the
same broadcast network by sending forged
ICMP echo request
• DDOS Attack
the attacks come from multiple host or
system
• Input Validation
Input Validation Attacks are where an
attacker intentionally sends unusual input in
the hopes of confusing the application.
SQL Injection
SQL injection is an attack in which
malicious code is inserted in to strings that are
later passed to an instance of SQL Server.
Manual or Using Tools
• Blind SQL Injection
It is used when a web application is
vulnerable to an SQL injection but the results
of the injection are not visible to the attacker.
• XSS Cross site scripting
is generally believed to be one of the most
common application layer hacking techniques.
In general cross site scripting refers to that
hacking techniques that leverages
vulnerabilities in the code of the web
application to allow an attacker to send
malicious content from an end user and
collect some type of data from the victim
• BUFFER OVERFLOW
– An Buffer overflow occurs when a progress or
program running on your computer system uses
more memory than it was allocated and has to
store the extra data in the temporary location
called a buffer overflow
• KEY LOGGER
This is the one of the simplest method for
hacking the computer. A keylogger is a piece
of hardware or software that logs everything
someone types.
• SNIFFING
Sniffing is observing packets passing by on the
network. It is a popular way to steal data from the
network, usually in form of passwords, ID Names,
etc
• SESSION HIJACKING
– It is the exploitation of a valid computer session ,
sometimes called a session key. To gain
unauthorized access to information or services in
a computer system
PASSWORD INTRUSION
• Any attack designed to allow an unauthorized
user access to an authorized password
Types of password attacks
Default password
Dictionary Password
Bruteforce Password
BACKDOOR
• A secret or underhand means of access (to a
place or a position) or an undocumented way
to get access to a computer system
ROOTKITS
• A rootkits is a collection of programs that
enable administrator-level access to a
computer or computer network.
MONITORING TOOLS
• The term monitoring or network monitoring
describes the use of a system that constantly
monitors a computer network for slow or
failing components and that notifies the
network administrator.
ART OF GOOGLING
• Google search or Google web search is a web
search engine owned by Google.
• And it is the most used search engine on the
web.
• Google receives several hundred million
queries each day through its various services.
• Biggest database
• GOOGLE SEARCH
• I’M FEELING LUCKING
• ADVANCED SEARCH
• PREFERENCES
• LANGUAGE TOOL
• GOOGLE AS A PROXY SERVER
SEARCHING TECHNIQUES
• Basic Search Technique
• Advance search Technique
BASIC SEARCH TECHNIQUES
• Basic Keyword Search
• Phrase Search “jbbub”
• Operator Search + or –
• Range Search eg: jdk 1.3.1.6
ADVANCE SEARCHING TECHNIQUES
• Site Operator .gov .com
• InTitle Operator intitle: index of master name
• Inurl operator inurl:etc/passwd
• File type Operator
• Link Operator
• Cache operator
• Phonebook Operator
THANK YOU

More Related Content

What's hot (20)

Hacking
HackingHacking
Hacking
LutfulM
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
S Sai Karthik
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
Institute of Information Security (IIS)
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Hacking
HackingHacking
Hacking
VipinYadav257
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Aryan Saxena
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Internet Security
Internet SecurityInternet Security
Internet Security
Mitesh Gupta
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
MissStevenson1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
Edureka!
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
Ren Tuazon
 
Hacking and Ethical Hacking
Hacking and Ethical HackingHacking and Ethical Hacking
Hacking and Ethical Hacking
Masih Karimi
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
Cmano Kar
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Viewers also liked (20)

Imre kertesz
Imre kerteszImre kertesz
Imre kertesz
Dammar Singh Saud
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
Dragnoz -
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
jobandesther
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
 
Hacking
HackingHacking
Hacking
j naga sai
 
Hacking and Anti Hacking
Hacking and Anti HackingHacking and Anti Hacking
Hacking and Anti Hacking
International Islamic University
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
Social media privacy
Social media privacySocial media privacy
Social media privacy
Mulligan Management Group, LLC
 
Mossad
MossadMossad
Mossad
ashishmakhija86
 
Privacy and Social Media
Privacy and Social MediaPrivacy and Social Media
Privacy and Social Media
Victoria Herring
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Cryptography
CryptographyCryptography
Cryptography
ankit dubey
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
JOSE LUIS
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
electrical machines
electrical machineselectrical machines
electrical machines
olgamezhenina
 
Компас от простого к сложному
Компас от простого к сложному Компас от простого к сложному
Компас от простого к сложному
School 242
 
Presentationdesignsuperhero 160427111843
Presentationdesignsuperhero 160427111843Presentationdesignsuperhero 160427111843
Presentationdesignsuperhero 160427111843
Vera Kovaleva
 
1С:Медицина. Стоматологическая клиника
1С:Медицина. Стоматологическая клиника1С:Медицина. Стоматологическая клиника
1С:Медицина. Стоматологическая клиника
Katarina22
 
Инноград
ИнноградИнноград
Инноград
guest2061c9
 
Unblocking the brain so you can think creatively
Unblocking the brain so you can think creativelyUnblocking the brain so you can think creatively
Unblocking the brain so you can think creatively
Dragnoz -
 
Hackers vs Hackers
Hackers vs HackersHackers vs Hackers
Hackers vs Hackers
jobandesther
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
Tauhidul islam
 
Spies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuelaSpies and secret codes gisela palenzuela
Spies and secret codes gisela palenzuela
JOSE LUIS
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Компас от простого к сложному
Компас от простого к сложному Компас от простого к сложному
Компас от простого к сложному
School 242
 
Presentationdesignsuperhero 160427111843
Presentationdesignsuperhero 160427111843Presentationdesignsuperhero 160427111843
Presentationdesignsuperhero 160427111843
Vera Kovaleva
 
1С:Медицина. Стоматологическая клиника
1С:Медицина. Стоматологическая клиника1С:Медицина. Стоматологическая клиника
1С:Медицина. Стоматологическая клиника
Katarina22
 
Инноград
ИнноградИнноград
Инноград
guest2061c9
 

Similar to Protection from hacking attacks (20)

Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
Thrivikram Lycan
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 
3-types of attacks_Types of attacks.pptx
3-types of attacks_Types of attacks.pptx3-types of attacks_Types of attacks.pptx
3-types of attacks_Types of attacks.pptx
AmandeepSohal4
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdfUnit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
KanchanPatil34
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
Rabail khan
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
preethajoseph5
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
BOTNET
BOTNETBOTNET
BOTNET
SOHITGOBINDAMSHAW
 
Cyber security and its defence (updated)
Cyber security and its defence (updated)Cyber security and its defence (updated)
Cyber security and its defence (updated)
Parshu Ram
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 
3-types of attacks_Types of attacks.pptx
3-types of attacks_Types of attacks.pptx3-types of attacks_Types of attacks.pptx
3-types of attacks_Types of attacks.pptx
AmandeepSohal4
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Geevarghese Titus
 
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdfUnit 6_keylogger_Spywares_virus_worms.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
KanchanPatil34
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
Rabail khan
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Cyber security and its defence (updated)
Cyber security and its defence (updated)Cyber security and its defence (updated)
Cyber security and its defence (updated)
Parshu Ram
 

Recently uploaded (20)

DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
new ppt artificial intelligence historyyy
new ppt artificial intelligence historyyynew ppt artificial intelligence historyyy
new ppt artificial intelligence historyyy
PianoPianist
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 

Protection from hacking attacks

  • 1. PROTECTION FROM HACKING ATTACKS By Sugirtha Jasmine M (ME Cyber Security) Information Security Analyst
  • 2. 1.MALWARES • Malware is a collective term for any malicious software which enters system without authorization of user of the system. • The term is created from merging the words malicious and softwares
  • 3. Types of Malwares • VIRUS (VITAL INFORMATION RESOURCES UNDER SEIZE) • A Virus is computer program that executes when an infected program is executed. • On MS-DOS system, these files usually have the extensions .exe, .com, .bat, .sys • Virus always needs a trigger to execute itself and after execution itself and after execution they leave the memory part.
  • 4. • Types of Virus Boot sector Virus File infecting Viruses Polymorphic viruses Stealth Viruses Multi Partite Viruses
  • 5. • Boot sector Viruses Boot sector viruses are those that infect the boot sector on a computer system • File infecting Viruses are unsurprisingly viruses that infect files. Sometime these viruses are memory resident
  • 6. • Polymorphic Viruses it change their appearance with each infection. Such encryption viruses are usually difficult to detect because they are better at hiding themselves from antivirus software. • Stealth Viruses it attempt to hide from both the operating system and anti-virus software. • Multi partite viruses it infects both boot sector files and executable files.
  • 8. WORMS • Worms are constructed to infiltrate legitimate data processing programs and alter or destroy the data. • It do not replicate themselves
  • 9. TROJAN HORSES • A trojan horse is a destructive program that has been concealed in an innocuous piece of software • It is not viruses because they do not reproduce themselves and spread as viruses do.
  • 10. LOGIC BOMBS • Writing a logic bomb program is similar to trojan horses. • It depends on time and date
  • 11. BOTS AND BOTNETS • A bot is a program that operates automatically as an agent for a user or another program • Hackers forward bots to the victim system • It also used for mass spam mailings, installing key logging software that can steal victims password and data.
  • 12. VULNERABILITY TO MALWARE • Use of the same operating system • Software bugs • Over privileged users • Unconfirmed code
  • 13. ANTI-MALWARE STRATERGIES • Anti viruses and Anti malware software • Website Security Scans • Eliminating Over Privileged Scan
  • 14. MALWARE DETECTION TECHNIQUES • Signature based malware detection techniques • Specification based detection • Behavior based detection
  • 15. COUNTER MEASURES • Vaccine Software and Keep it Up-to-date • Email attachment File Should be scanned • Downloaded file should be scanned • For application utilize security functions • Security patches should be applied • Symptoms of Virus infection must be Overlooked • Incase of emergency data should be Backed up
  • 16. NETWORK INTRUSION • Computer Networks that are currently to the internet are vulnerable to a variety of exploits that can compromise their intended operations.
  • 17. TYPES OF INTRUSION • Non Technical Social Engineering attack Pretexting Phishing Smishing Vishing Tabnabbing
  • 18. • Technical Intrusion DOS Input Validation Keyloggers Sniffing
  • 19. Non Technical Intrusion • Social Engineering Intrusion As humans we are bound by both nature and nurture to the social contract which, like many contracts, might be twisted to our disadvantage. Such twisting is called Social Engineering.
  • 20. • Common types of social Engineering Human Based Impersonation Important User Dumpster Diving Shoulder Surfing
  • 21. • Computer Based Popup Windows Mail Attachments Spam Websites
  • 22. • Pretexting Pretexting is an act of creating and using an invented scenario to obtain information from the target, usually over the telephone.
  • 23. • Phishing it uses both social engineering and technical activities to to steals consumers personal identity data and financial account credentials.
  • 24. • Smishing Smishing is the cell phone equivalent to “Phishing” , text messages that lead you to a counterfeit web site trying to get your personal information using SMS.
  • 25. • Vishing VoIP Phishing is an electronic fraud tactic in which individuals are tricked in to revealing critical financial or personal information to unauthorized entities
  • 26. TECHNICAL INTRUSION • DOS To make service unavailable. Types Ping of Death LAND attack Tear drop attack SYN flood attack ICMP flood attack Smurf attack
  • 27. • Ping of Death An attacker sends an ICMP echo request packet that is larger than the maximum packet size.Since the received ICMP echo packet is larger than the normal IP packet size. The target cant reassemble the packets. So the OS crashes or reboot
  • 28. • LAND Attack When the attacker initiates a SYN Flood attack using the IP address of the victim as source and destination IP address, then it is said that the attacker has launched a LAND ATTACK.
  • 29. • Tear Drop Attack This type of attack deals with fragmentation and reassembly of IP Packets. The IP header contains the necessary fields to handle fragmentation issues
  • 30. • SYN Flood Attack An attacker could deliberately flood the server with TCP SYN segments without acknowledging back the server SYN response.
  • 31. • ICMP Flood Attack Similar to the SYN flood attack, an ICMP flood attack takes place when an attacker overloads its victim with huge number of ICMP echo request with spoofed source IP address.
  • 32. Smurf attack it is a type of network level DOS attack using ICMP echo replies from computer in the same broadcast network by sending forged ICMP echo request
  • 33. • DDOS Attack the attacks come from multiple host or system
  • 34. • Input Validation Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application. SQL Injection SQL injection is an attack in which malicious code is inserted in to strings that are later passed to an instance of SQL Server. Manual or Using Tools
  • 35. • Blind SQL Injection It is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker.
  • 36. • XSS Cross site scripting is generally believed to be one of the most common application layer hacking techniques. In general cross site scripting refers to that hacking techniques that leverages vulnerabilities in the code of the web application to allow an attacker to send malicious content from an end user and collect some type of data from the victim
  • 37. • BUFFER OVERFLOW – An Buffer overflow occurs when a progress or program running on your computer system uses more memory than it was allocated and has to store the extra data in the temporary location called a buffer overflow
  • 38. • KEY LOGGER This is the one of the simplest method for hacking the computer. A keylogger is a piece of hardware or software that logs everything someone types.
  • 39. • SNIFFING Sniffing is observing packets passing by on the network. It is a popular way to steal data from the network, usually in form of passwords, ID Names, etc
  • 40. • SESSION HIJACKING – It is the exploitation of a valid computer session , sometimes called a session key. To gain unauthorized access to information or services in a computer system
  • 41. PASSWORD INTRUSION • Any attack designed to allow an unauthorized user access to an authorized password Types of password attacks Default password Dictionary Password Bruteforce Password
  • 42. BACKDOOR • A secret or underhand means of access (to a place or a position) or an undocumented way to get access to a computer system
  • 43. ROOTKITS • A rootkits is a collection of programs that enable administrator-level access to a computer or computer network.
  • 44. MONITORING TOOLS • The term monitoring or network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator.
  • 45. ART OF GOOGLING • Google search or Google web search is a web search engine owned by Google. • And it is the most used search engine on the web. • Google receives several hundred million queries each day through its various services. • Biggest database
  • 46. • GOOGLE SEARCH • I’M FEELING LUCKING • ADVANCED SEARCH • PREFERENCES • LANGUAGE TOOL • GOOGLE AS A PROXY SERVER
  • 47. SEARCHING TECHNIQUES • Basic Search Technique • Advance search Technique
  • 48. BASIC SEARCH TECHNIQUES • Basic Keyword Search • Phrase Search “jbbub” • Operator Search + or – • Range Search eg: jdk 1.3.1.6
  • 49. ADVANCE SEARCHING TECHNIQUES • Site Operator .gov .com • InTitle Operator intitle: index of master name • Inurl operator inurl:etc/passwd • File type Operator • Link Operator • Cache operator • Phonebook Operator