Sardar Patel Memorial Society’s (Trust) RAJIV GANDHI COLLEGE OF ENGINEERING, RESEARCH AND TECHNOLOGY, CHANDRAPUR Department of Computer Science and Engineering SEMESTER-V SESSION- 2021-22 A SEMINAR ON CYBER SECURITY Under the guidance of Prof.Dr.Nitin Janwe AND SEMINAR IN-CHARGE Prof. Madhavi Sadu Presented By- SHRUTIKA ATUL SAKARKAR[CSEB503]
CONTENTS:- -Introduction -What is cyber security? -Types of cyber security -Cyber attacks / Cyber crime -Why do cyber attacks happen? -Types of cyber attacks -Hackers and attackers -Types of hackers -Why is cyber security important? -Advantages and Disadvantages -Cyber security tips -Conclusion -References
INTRODUCTION:- -Cyber attacks are increasing day by day so to protect the system and data from this attacks some cyber security measures are taken. -The need of cyber security was felt when cyber attacks were increasing and people were getting problem from it. -The multinational companies and industries having a great amount of possessive data, so there protection is important as well as the details of clients and there contracts are very sensitive so that every company needs cyber security. -When the data is protected by means of technical security we can say it cyber security.
WHAT IS CYBER SECURITY? -Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. -It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies. -It is also known as information tech security or network information security in common. -The main purpose of cyber security is to protect all organizational assets from both external and internal threats as well as disruptions caused due to natural disasters.
TYPES OF CYBER SECURITY:- Network security Application security Information security Operational security
1]NETWORK SECURITY:- -It is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. -It includes both hardware and software technologies. -It targets a variety of threats. -It stops them from entering or spreading on your network. -Effective network security manages access to the network.
2]APPLICATION SECURITY:- -Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. -Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. -This is becoming more important as hackers increasingly target applications with their attacks.
3]INFORMATION SECURITY:- -Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. -The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property. -Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability).
4]OPERATIONAL SECURITY:- -Operational security (OPSEC) is a security and risk management process that prevents sensitive information from getting into the wrong hands. -Things that fall under the OPSEC umbrella include monitoring behaviors and habits on social media sites as well as discouraging employees from sharing login credentials via email or text message. -Operational security forces managers to dive deeply into their operations and figure out where their information can be easily breached.
CYBER ATTACKS/CYBER CRIME:- -A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. -It aims to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. -It can be launched from anywhere by any individual or group using one or more various attack strategies.
WHY DO CYBER ATTACKS HAPPEN? Cyber attacks are designed to cause damage. They can have various objectives, including the following : 1]Financial gain 2]Disruption and revenge 3]Cyber warfare
TYPES OF CYBER ATTACKS:-
TYPES OF CYBER ATTACKS:- 1. Injection attacks- It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information. Example- SQL Injection, code Injection, log Injection, XML Injection etc. 2. DNS Spoofing- DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues. 3. Session Hijacking- It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data. 4. Phishing - Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
5. Brute force- It is a type of attack which uses a trial and error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal identification number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test an organization's network security. 6. Denial of Service- It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server. 7. Dictionary attacks- This type of attack stored the list of a commonly used password and validated them to get original password. 8. URL Interpretation- It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages for which he is not authorized to browse.
9. File Inclusion attacks- It is a type of attack that allows an attacker to access unauthorized or essential files which is available on the web server or to execute malicious files on the web server by making use of the include functionality. 10 . Man in the middle attacks- It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.
Hackers and attackers:- “Hacker” is another name for an ethical researcher. It refers to someone who proactively explores, identifies and alerts organizations to vulnerabilities that an attacker could use for malicious purposes. They seek to disclose in good faith by alerting organizations that may or may not have vulnerability disclosure policies. An “attacker,” on the other hand, is just that. It’s someone who gains unauthorized access to someone else’s network and computers for malicious purposes. An attacker probes for vulnerabilities, but unlike a hacker, the attacker exploits them without permission or without warning the organization
TYPES OF HACKERS:- 1. Black Hat Hacker- Black-hat Hackers are also known as an Unethical Hacker or a Security Cracker. These people hack the system illegally to steal money or to achieve their own illegal goals. 2. White Hat Hacker- White hat Hackers are also known as Ethical Hackers or a Penetration Tester. White hat hackers are the good guys of the hacker world. 3. Gray Hat Hacker- Gray hat Hackers are Hybrid between Black hat Hackers and White hat hackers. They can hack any system even if they don't have permission to test the security of the system but they will never steal money or damage the system.
WHY IS CYBER SECURITY IMPORTANT:- -The importance of cyber security comes down with the desire to keep information, data, and devices private and safe. In today’s world, people store vast quantities of data on computers and other internet-connected devices. - By implementing security, businesses and individuals can protect themselves against the full range of cyber security threats outlined below, as well as the numerous others that exist. -In the case of public services or governmental organizations, cyber security helps ensure that the community can continue to rely on their services. -With cyber security, companies do not have to worry about unauthorized users accessing their network or data. It helps them protect both their end users and their employees.
ADVANTAGES AND DISADVANTAGES OF CYBER SECURITY:- Advantages:- Protects system against viruses, worms, spyware and other unwanted programs. Protection against data from theft. Protects the computer from being hacked. Minimizes computer freezing and crashes. Gives privacy to users Disadvantages:- Firewalls can be difficult to configure correctly. Incorrectly configured firewalls may block users from performing certain actions on the Internet, until the firewall configured correctly. Makes the system slower than before. Need to keep updating the new software in order to keep security up to date. Could be costly for average user.
CYBER SECURITY TIPS:- Install a firewall Set up an Access Control List Change the default passwords for the company's point of sale system Establish security roles and responsibilities Establish policies for Internet and social media usage Use a Web-filtering system Use Internet security programs on each computer Be aware of peer-to-peer sites Keep the most critical data offline Get cybercrime insurance
CONCLUSION:- Cyber security was introduced to reduce cyber crimes. This crimes will affect the loss of revenue , waste of valuable time , damage reputation and reduce productivity. As an IT user , we should have to be aware of some of the cyber laws in the country. Hopefully, we can be more careful and never involve in any cyber crime.