SlideShare a Scribd company logo
System security and tools
Subtopics covered :
1. System Vulnerability and Abuse
2. Techs. And Tools for Protecting Info Resources

                Group members are:
              1. Karan Bhandari(39)
              2. Gurshawn Singh(35)
                3. Nishad Prabhu(3)
Introduction

As we all know, Technology has tremendously
affected us and our way of living.

Daily Mail is now Best as E-mail, Newspapers
are on Large screens, Communication is highly
globalized and storage is within the size range
of our fingers.

But, All this does come with its drawbacks…
Viruses ! Trojans !
Why Systems are Vulnerable ?

A set of things working together as parts of a mechanism or

an interconnecting network.

Due to storage of electronic data, Access points are Endless

The potential for unauthorized access, abuse or fraud is high
Access control
To gain access a user must be authorized and
authenticated – established by using passwords

Passwords have their disadvantages

New technologies like tokens, smart cards, and
biometric authentication
Malicious software:
Viruses, Worms, Trojan Horses and
            Spyware

Malicious software programs are referred to as
malware and include a variety of threats such as
computer viruses, worms and trojan horses.


COMPUTER VIRUS: a rogue software program.
viruses usually deliver a payload.
WORMS: are independent computer programs

TROJAN HORSE: appears to be benign but then does
something other than expected.

SPYWARE: install themselves on computer to monitor user
activities

KEYLOGGERS: record every keystroke made on a computer.
Basics of System Security and Tools
Hackers and Computer Crime


A HACKER is an individual who intends to gain
unauthorized access to a computer system.


Hacker vs. cracker


hacker activities include theft, damage and cyber
vandalism.
Spoofing and Sniffing


Hackers attempting to hide their true identities often
spoof, or misrepresent themselves


This is known as SPOOFING.


A SNIFFER is a type of eavesdropping program that
monitors information travelling over a network.
Basics of System Security and Tools
Denial of Service Attacks


In a DoS attack, hackers flood a network server or web
server with many thousands of false communications or
requests for services to crash the network


A Distributed denial-of-service (DDoS) attack uses
numerous computers from different launch points to
inundate and overwhelm the network.
Computer Crime


Computer crime is defined by the U.S. Department of
Justice as “any violations of criminal law that involve
a knowledge of computer technology for their
perpetrations, invesigation or prosecution.
Basics of System Security and Tools
Identity Theft


Identity Theft is a crime in which an imposter obtains key
pieces of personal information.



Popular tactic is a form of spoofing called PHISHING.



EVIL TWINS and PHARMING are harder to detect.
Basics of System Security and Tools
Click Fraud & Global Threat


CLICK FRAUD: occurs when an individual or computer
program fraudulently clicks on an online ad without any
intention of learning more about the advertiser or making
a purchase.


GLOBAL THREAT: Involves Cyber terrorism and cyber
warfare.
Internet Threats: Employees


Malicious intruders seeking system access sometimes
trick employees into revealing their passwords and
other information.



This practice is called SOCIAL ENGINEERING.
Software Vulnerability


Software poses a constant threat to information systems,
causing untold losses in productivity.


There may be presence of hidden Bugs or Program Code
Defects.


Zero defects cannot be achieved in larger programs
Technologies and tools for
protecting information resources

 • Securing systems

 • Ensuring system availability

 • Ensuring software quality
Firewalls


Combination of hardware and software that controls traffic

Acts as a gatekeeper

There are a no. of firewall screening technologies like

  -Static packet filtering

  -Stateful inspection

  -Network address translation(NAT)

  -Application proxy filtering
Intrusion detection systems

Placed at the hotspots

Generates a alarm if it finds a suspicious or anomalous
event

Looks for known methods of computer attacks

Detects removal or modification of files

Examines events as they are happening
Anti-Virus and Anti-spyware

Checks for presence of viruses



Most softwares are effective only against known viruses



Available widely
Encryption

Transforming plain text or data into cipher , using an encryption key

Two methods to encrypt network traffic

 - Secure socket layer

 - Secure hypertext transfer protocol

Two alternate methods to encrypt

 -Symmetric key encryption

 -Public key encryption
Ensuring system availability


Ensuring system and application availability is a must
for companies eg. Airline service
Fault tolerant systems use special software to detect
harware failures and automatically switch to backup
Should not be confused with high availability
computing
Basics of System Security and Tools
Ad

More Related Content

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
Umang Gupta
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
Nicholas Davis
 
Network management and security
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
It
ItIt
It
Volkswagen Thane
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
 
Attack types
Attack typesAttack types
Attack types
S.M. Towhidul Islam
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
Nicholas Davis
 
Network management and security
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Network security
Network securityNetwork security
Network security
fatimasaham
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 

Similar to Basics of System Security and Tools (20)

Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Malware, Hacker Techniques, and Wireshark.pptx
Malware, Hacker Techniques, and Wireshark.pptxMalware, Hacker Techniques, and Wireshark.pptx
Malware, Hacker Techniques, and Wireshark.pptx
fovoni
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
Kak Yong
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 
Cyber security
Cyber security Cyber security
Cyber security
ankit yadav
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Information security
Information securityInformation security
Information security
IshaRana14
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Internet security
Internet securityInternet security
Internet security
محمد عدنان أبو ورد
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
InsecureLab
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 
Malware, Hacker Techniques, and Wireshark.pptx
Malware, Hacker Techniques, and Wireshark.pptxMalware, Hacker Techniques, and Wireshark.pptx
Malware, Hacker Techniques, and Wireshark.pptx
fovoni
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
Kak Yong
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
muskaangoel15
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
nazar60
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Information security
Information securityInformation security
Information security
IshaRana14
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
Ad

Basics of System Security and Tools

  • 1. System security and tools Subtopics covered : 1. System Vulnerability and Abuse 2. Techs. And Tools for Protecting Info Resources Group members are: 1. Karan Bhandari(39) 2. Gurshawn Singh(35) 3. Nishad Prabhu(3)
  • 2. Introduction As we all know, Technology has tremendously affected us and our way of living. Daily Mail is now Best as E-mail, Newspapers are on Large screens, Communication is highly globalized and storage is within the size range of our fingers. But, All this does come with its drawbacks… Viruses ! Trojans !
  • 3. Why Systems are Vulnerable ? A set of things working together as parts of a mechanism or an interconnecting network. Due to storage of electronic data, Access points are Endless The potential for unauthorized access, abuse or fraud is high
  • 4. Access control To gain access a user must be authorized and authenticated – established by using passwords Passwords have their disadvantages New technologies like tokens, smart cards, and biometric authentication
  • 5. Malicious software: Viruses, Worms, Trojan Horses and Spyware Malicious software programs are referred to as malware and include a variety of threats such as computer viruses, worms and trojan horses. COMPUTER VIRUS: a rogue software program. viruses usually deliver a payload.
  • 6. WORMS: are independent computer programs TROJAN HORSE: appears to be benign but then does something other than expected. SPYWARE: install themselves on computer to monitor user activities KEYLOGGERS: record every keystroke made on a computer.
  • 8. Hackers and Computer Crime A HACKER is an individual who intends to gain unauthorized access to a computer system. Hacker vs. cracker hacker activities include theft, damage and cyber vandalism.
  • 9. Spoofing and Sniffing Hackers attempting to hide their true identities often spoof, or misrepresent themselves This is known as SPOOFING. A SNIFFER is a type of eavesdropping program that monitors information travelling over a network.
  • 11. Denial of Service Attacks In a DoS attack, hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network A Distributed denial-of-service (DDoS) attack uses numerous computers from different launch points to inundate and overwhelm the network.
  • 12. Computer Crime Computer crime is defined by the U.S. Department of Justice as “any violations of criminal law that involve a knowledge of computer technology for their perpetrations, invesigation or prosecution.
  • 14. Identity Theft Identity Theft is a crime in which an imposter obtains key pieces of personal information. Popular tactic is a form of spoofing called PHISHING. EVIL TWINS and PHARMING are harder to detect.
  • 16. Click Fraud & Global Threat CLICK FRAUD: occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. GLOBAL THREAT: Involves Cyber terrorism and cyber warfare.
  • 17. Internet Threats: Employees Malicious intruders seeking system access sometimes trick employees into revealing their passwords and other information. This practice is called SOCIAL ENGINEERING.
  • 18. Software Vulnerability Software poses a constant threat to information systems, causing untold losses in productivity. There may be presence of hidden Bugs or Program Code Defects. Zero defects cannot be achieved in larger programs
  • 19. Technologies and tools for protecting information resources • Securing systems • Ensuring system availability • Ensuring software quality
  • 20. Firewalls Combination of hardware and software that controls traffic Acts as a gatekeeper There are a no. of firewall screening technologies like -Static packet filtering -Stateful inspection -Network address translation(NAT) -Application proxy filtering
  • 21. Intrusion detection systems Placed at the hotspots Generates a alarm if it finds a suspicious or anomalous event Looks for known methods of computer attacks Detects removal or modification of files Examines events as they are happening
  • 22. Anti-Virus and Anti-spyware Checks for presence of viruses Most softwares are effective only against known viruses Available widely
  • 23. Encryption Transforming plain text or data into cipher , using an encryption key Two methods to encrypt network traffic - Secure socket layer - Secure hypertext transfer protocol Two alternate methods to encrypt -Symmetric key encryption -Public key encryption
  • 24. Ensuring system availability Ensuring system and application availability is a must for companies eg. Airline service Fault tolerant systems use special software to detect harware failures and automatically switch to backup Should not be confused with high availability computing
  翻译: