Mooc 4
Mooc 4
Mooc 4
Submitted by:-
Name: Sparsh Dhama
Section: R
Roll No: 70
Student ID: 21011318
Certificate of
Course and
other
certificates
achived:
Content
• Introduction
• Categories of Cyber crime
• Types of Cyber crime
• Types of Security tools
• Advantage of Cybersecurity
• Safety tips to Cyber crime
• References
Introduction
• The Internet in India is growing rapidly. There are two sides to a
coin. Internet also has it’s own disadvantages in cyber crime-
illegal activity committed on the Internet
• Crime committed using a computer and the internet to steal a
person’s identity or illegal imports or malicious programs. Cyber
crime is an activity done using computers and the internet.
• Cyber security refers to the technologies and processes designed
to protect computers, networks and data from unauthorized
access and attacks delivered via the internet by cyber criminals.
Through, cyber security is important for the network, data and
application security.
• The objective of cyber security is to establish rules and measure
to use against attacks over the internet.
WHAT IS CYBER SECURITY?
• Hacking
• Phishing
• Denial of Service
• Spam Email
• Spyware, Adware
• Malware(Trojan, Virus, Worms etc.)
• ATM skimming and Point of scale crimes
• Ransomware
Types of Security Tools
• Understanding CVE,CWE,CVSS,OWASP
Top 10,SANS Top 25.
• Wireshark demonstration
• Nmap demonstration
• Nessus-Vulnerability Assessment
scanning tool.
• Common Vulnerabilies and Exposures(CVE) is a
category of known security threats. The catalog is
sponsored by the United States Department of
Homeland Security(DHS), and threats are divided
into two categories: vulnerabilities and exposures.
What is • The Common Vulnerability Scoring System(CVSS) is
CVE,CWE,CVSS,OW a free and open industry standard for assessing the
ASP Top 10,SANS Top severity of computer system security vulnerabilities.
25? • Common Weakness Enumeration(CWE) is a list
ofsoftware weaknessess.
• CWE/SANS Top 25 most dangerous software errors
is a list of the most widespread and critical errors
that can lead to serious vulnerabilities in software.
• They are often easy to find, and easy to exploit.
• The OWASP TOP 10 is a powerful awareness document for web
application security.
• The OWASP Top 10 list consists of the 10 most seen application
vulnerabilities:
Injection
Broken Authentication
Sensitive data exposure
XML External Entities(XXE)
Broken Access control
Security misconfigurations
Cross Site Scripting(XSS)
Insecure Deserialization
Using Components with known vulnerabilities
Insufficient logging and monitoring
Wireshark
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets
and tries to display that packet data as detailed as possible.
You could think of a network packet analyzer as a measuring device used to examine what’s going on
inside a network cable, just like a voltmeter is used by an electrician to examine what’s going on inside an
electric cable(but at a higher level, of course).
In the past, such tools were either very expensive, proprietary, or both. However, with the advert of
Wireshark, all that has changed.
Wireshark is perhaps one of the best open source packet analyzers available today.
Nmap Network Mapper is a free and open source utility
for network discovery and security auditing.
IT WILL DEFEND US FROM INTERNET SECURITY PROCESS THE CYBER SECURITY WILL THE APPLICATION OF CYBER THE SECURITY DEVELOPERS
HACKS AND VIRUS, IT HELPS US ALL THE INCOMING AND DEFEND US FROM CRITICAL SECURITY USED IN OUR PC WILL UPDATE THEIR DATABASE
TO BROWSE THE SAFE OUTGOING DATA ON OUR ATTACKS. NEEDS UPDATE EVERY WEEK. EVERY WEEK ONCE. HENCE THE
WEBSITE. COMPUTER. NEW VIRUSES ALSO DETECTED.
Safety Tips to
Cyber Crime
• Use Antivirus software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Never give your full name or address to strangers
• Learn more about the internet privacy
• Online course from Coursera.org
• www.Wikipedia.org
Reference •
•
www.avtest.org
www.billmullins.blogspot.com
s • www.digit/forum.com
• www.antivirusnews.com
THANK YOU