Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Security
It
focuses on protecting
computers, networks, programs
and data from unauthorized
access and change.
12/31/15
12/31/15
Types of Hackers
White
Hat
Black
Hat
GREY
Hat
12/31/15
Of Service Attack
Virus Dissemination
Software Piracy
Pornography
Internet Relay Chat Crime
Credit Card Fraud
Phishing
Spoofing
Cyber Defamation
Cyber Stalking
Threatening
Salami Attack
Net Extortion
12/31/15
Script kiddies
Scammers
Hacker groups
Phishers
Political or religious or
commercial groups
Insiders
Advanced Persistent Threat
(APT) Agents
12/31/15
So what do we secure?
The
People
The
Technology
The
Process
12/31/15
Types of Attacks
Passive
Attacks
Message Contents
Traffic Analysis
Active
Attacks
10
12/31/15
11
How do I know I am
Hacked?
Emails
You
System
slows down
Passwords/wallpapers
are altered
Read
12/31/15
12
How To Secure?
For
12/31/15
13
12/31/15
14
Pshishing
Phishing is a fake login page designed by an
attacker to steal personal info of victim's.
Phishing page looks same as Original page of
any website or social networking website
12/31/15
15
Another Example
12/31/15
16
Android or iPhone?
33.5% To Steal Money
17
18
Thank You!
Remember Always
Cyber Crime is Silent Violence - Be Aware, Play Safe - Prevent Cyber Crimes!!!
- Code Named:TIGER
12/31/15
19