Mooc 4

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Submitted To:-

Ms. Shruti Bhatla

Submitted by:-
Name: Sparsh Dhama
Section: R
Roll No: 70
Student ID: 21011318
Certificate of
Course and
other
certificates
achived:
Content
• Introduction
• Categories of Cyber crime
• Types of Cyber crime
• Types of Security tools
• Advantage of Cybersecurity
• Safety tips to Cyber crime
• References
Introduction
• The Internet in India is growing rapidly. There are two sides to a
coin. Internet also has it’s own disadvantages in cyber crime-
illegal activity committed on the Internet
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs. Cyber
crime is an activity done using computers and the internet.
• Cyber security refers to the technologies and processes designed
to protect computers, networks and data from unauthorized
access and attacks delivered via the internet by cyber criminals.
Through, cyber security is important for the network, data and
application security.
• The objective of cyber security is to establish rules and measure
to use against attacks over the internet.
WHAT IS CYBER SECURITY?

Cybersecurity is the protection of internet-connected systems, including


hardware, software and data, from cyberattacks.

In a computing context, security comprises cybersecurity and physical


security  both are used by enterprises to protect against unauthorized
access to data centers and other computerized systems.

Information security, which is designed to maintain the confidentiality,


integrity and availability of data, is a subset of cybersecurity.
Categories of Cyber Crime

We can categorize cyber crime in two


ways:-
• The computer as a target:Using a
computer to attacks other computer
e.g. Hacking, Viruses/Worms attacks,
Ddos and Dos attack etc.

• The computer as a weapon:Using a


computer to commit real world crime
Principle of Computer Security e.g. credit card fraud etc.
Types of Cyber Crime

• Hacking
• Phishing
• Denial of Service
• Spam Email
• Spyware, Adware
• Malware(Trojan, Virus, Worms etc.)
• ATM skimming and Point of scale crimes
• Ransomware
Types of Security Tools

• Understanding CVE,CWE,CVSS,OWASP
Top 10,SANS Top 25.
• Wireshark demonstration
• Nmap demonstration
• Nessus-Vulnerability Assessment
scanning tool.
• Common Vulnerabilies and Exposures(CVE) is a
category of known security threats. The catalog is
sponsored by the United States Department of
Homeland Security(DHS), and threats are divided
into two categories: vulnerabilities and exposures.
What is • The Common Vulnerability Scoring System(CVSS) is
CVE,CWE,CVSS,OW a free and open industry standard for assessing the
ASP Top 10,SANS Top severity of computer system security vulnerabilities.
25? • Common Weakness Enumeration(CWE) is a list
ofsoftware weaknessess.
• CWE/SANS Top 25 most dangerous software errors
is a list of the most widespread and critical errors
that can lead to serious vulnerabilities in software.
• They are often easy to find, and easy to exploit.
• The OWASP TOP 10 is a powerful awareness document for web
application security.
• The OWASP Top 10 list consists of the 10 most seen application
vulnerabilities:
 Injection
 Broken Authentication
 Sensitive data exposure
 XML External Entities(XXE)
 Broken Access control
 Security misconfigurations
 Cross Site Scripting(XSS)
 Insecure Deserialization
 Using Components with known vulnerabilities
 Insufficient logging and monitoring
Wireshark

Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets
and tries to display that packet data as detailed as possible.

You could think of a network packet analyzer as a measuring device used to examine what’s going on
inside a network cable, just like a voltmeter is used by an electrician to examine what’s going on inside an
electric cable(but at a higher level, of course).

In the past, such tools were either very expensive, proprietary, or both. However, with the advert of
Wireshark, all that has changed.

Wireshark is perhaps one of the best open source packet analyzers available today.
Nmap Network Mapper is a free and open source utility
for network discovery and security auditing.

Useful for tasks such as network inventory, managing service


upgrade schedules, and monitoring host or service uptime.

It was designed to rapidly scan large networks, it will work


N-Map against single host too.

Nmap runs on all major computer operating systems.

Developed by Gordon Lyon.


Nessus
Nessus is a remote security scanning tool, which scans a computer
and raises an alert if it discovers any vulnerabilities that malicious
hackers could use to gain access to any computer you have
connected to a network. It does this by running over 1200 checks
on a given computer, testing to see if any of these attacks could be
used to break into the computer or otherwise harm it.
Features:
• Reporting: Customize reports to sort by vulnerability or host. It
create an executive summary and compare scans results to
highlight changes.
• Monitoring: Targeted email notifications of scan results,
remediation recommendations and scan
configuration improvements.
• Scanning Capabilities: Vulnerability scanning (including
IPv4/IPv6/hybrid networks).
 Un-credentialed vulnerability discovery.
 Credentialed scanning for system hardening & missing patches.
Advantages Of Cyber Security

IT WILL DEFEND US FROM INTERNET SECURITY PROCESS THE CYBER SECURITY WILL THE APPLICATION OF CYBER THE SECURITY DEVELOPERS
HACKS AND VIRUS, IT HELPS US ALL THE INCOMING AND DEFEND US FROM CRITICAL SECURITY USED IN OUR PC WILL UPDATE THEIR DATABASE
TO BROWSE THE SAFE OUTGOING DATA ON OUR ATTACKS. NEEDS UPDATE EVERY WEEK. EVERY WEEK ONCE. HENCE THE
WEBSITE. COMPUTER. NEW VIRUSES ALSO DETECTED.
Safety Tips to
Cyber Crime
• Use Antivirus software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Never give your full name or address to strangers
• Learn more about the internet privacy
• Online course from Coursera.org
• www.Wikipedia.org

Reference •

www.avtest.org
www.billmullins.blogspot.com
s • www.digit/forum.com
• www.antivirusnews.com
THANK YOU

You might also like