0% found this document useful (0 votes)
8 views16 pages

Internetsecutity

Uploaded by

Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views16 pages

Internetsecutity

Uploaded by

Harini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

1

OutLine
 Introduction.

 Internet Security: What it is, and why we need it.

 Hackers: Who is he, Classes, Hacking Phases.

 Attacks examples.

 What should I do to be safe online ?.

 Conclusion
Introduction: 2

 While the internet offers enormous advantages and opportunities, it also


presents various security risks.

 It’s where we access our banking records, credit card statements, tax returns
and other highly sensitive personal information.

 Banks take extensive steps to protect the information transmitted and


processed when banking online.

 But with all the good things the Internet offers us, it also opens the door to
serious, potentially devastating threats.
Internet Security:
3
What it is

 Generally, Internet security include browser security, the security of


data entered through a Web form, and overall authentication and
protection of data sent via Internet Protocol.

 We must secure our computers with technology in the same way that we
secure the doors to our offices  Security
 We must act in ways that protect us against the risks and threats that
come with Internet use  Safety
Internet Security:
4
Why you need it.

-Identifies your computer


-Where it is located

Request

Response
carries with it unwanted hidden
- Installed in your computer. software
- watches and records
everything you do online.
- leaving your passwords.
The criminals use in accessing :
- and other personal and • your private information.
sensitive information • stealing your identity or your money.
vulnerable • It can also be used to highjack your
computer for illegal purposes.
Hackers:
5
Who is a Hacker ?

Intelligent individuals
with excellent For some
computer skills with hackers,hacking is a
the ability to create hobby to see how
and explore many computers they
computer’s software can compromise
and Hardware

Their intention can


either be to gain
knowledge or to poke
around to do illegal
things
Hackers
6
Hacker Classes :

Black Hats Grey Hats White Hats

Individuals with Individuals who work Individuals professing


extraordinary both offensively and hacker skills and using
computing skills, defensively at various them for defensive
Restoring to malicious times purposes and are also
or destructive known as Security
activities and also Analysts
known as Crackers
Hackers
7
Hacking Phases :

Gaining Maintainin Covering


Reconnaissance Scanning
Access g Access Tracks
Attacks exemples. 8

Phishi
ng
‘ ’ Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy
entity in an electronic communication ’ ’
Attacks exemples. 9

Phishi
ng
Attacks exemples. 10

Pharmi
ng
Is another technique
used to steal confidential
access code. It works by
redirecting users to a
rogue server
11
What should I do to be safe
online ?.
What should I do to be safe 12
online ?.
 To protect your
self
 Keep you
passwords
private and
create ones too
strong that are
hard to “crack”
 If you have received
an Email encounters,
you may have been
the target of a
common scam called
‘phishing’.
What should I do to be safe 13
online ?.
 To protect your n g
ki
self a n
b
 n d
Be wary of publishing a
g
any information that n
o pi
identifies you, such as sh
your phone number, e
lin
photos of your home, n
O
your address, date of  If you make purchases
birth or full name. or do your banking
online, make sure you
protect your financial
networking information
 Use ‘https://’
What should I do to be safe 14
online ?.
 To protect your
Computer
Use Anti-virus Use Anti-spyware
Software: Software:
Anti-virus software can Use anti-spyware software
detect and destroy so unknown people cannot
computer viruses lurk on your computer and
before potentially
they cause damage steal your information
What should I do to be safe 15
online ?.
 To protect your Firewall
Computer
Keep Your Computer LAN
Updated:
Install all security updates
as soon as they are WAN
available Automatic
updates provide the best
protection Use a Firewall:
It is a placed at the
gateway between the two
networks which is usually
a private Network and a
public network such as
the internet
Conclusion 16

 Whenever using internet or an online financial system, ensure


that your system is still under your control and not a spoofed
puppet.

 Protecting your self from internet threats.

 Being aware of the dangers of the internet and taking the right
steps to avoid them means you can enjoy the internet safely.

You might also like