Loading documents preview...
CYBER SECURITY & Ethical Hacking Hope Your Firewall Is Not Screwed Up
CONCEPTS CONCEPT Modules
AIM
STEPS Steps How Hackers Gains Access
HOW TO BE SECURED
Over-View Previously Held Attacks
TOPICS
Footprinting and Scanning Networks
Introduction to Ethical Hacking
1
2
Social Engineering
Malware Threats
System Hacking
3
4
Evading IDS, Firewalls and Honeypots
5
6
TOPICS Denial of Service And SQL Injection
7
Hacking Wireless Networks
8
Hacking Wireless Networks
Cryptography
9
10
WORK CYCLE 03
GAINING ACCESS
01
05
CLEARING TRACKS
INFORMATION GATHERING
02
SCANNING
04
MAINTAING ACCESS
ATTACKS TYPES VIRUSES
Application Attacks
Worms, Trojan Horses, Add Wares, Etc
Contains the scripts behind the software applications that malfunctions your devices
MITM Attack
DDOS
Transfers the HTTPS links towards HTTP; Most likely to happen in Online Bank Transactions
multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a attack.
BOT NETS
Back Doors
a number of Internet-connected devices, used to perform distributed DDoS attack, steal data, send spam, and allows the attacker to access the device and its connection.
to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
MONTHLY ATTACKS 160
120 80 40
0 JAN
MAR
2017
MAY
JUL
SEP
2016
NOV
MOSTLY ATTACKED COUNTERIES RUSSIA Russian hackers are famous worldwide and have a knack for cracking the most secure of networks. A total of 5.14% of cyber attacks are initiated by the Russians.
USA As US accounts for nearly 10% of the world’s malicious digital traffic. It is home to many famous and infamous hackers.
TURKEY
BRAZIL Brazil has the highest cyber attack traffic not only in SouthAmerica but the entire southern hemisphere
CHINA The purpose of these attacks is to mostly hack the networks of US government and its allies. As per a research, 27.24% of cyber attacks are initiated by China
BIGGEST SOURCES OF CYBER ATTACKS
55% DATA IN PUBLIC CLOUD
43% CLOUD INFRASTRUCTURE
75%
95%
MOBILE DEVICES
SOCIAL ENGINEERING
TIMELINE Storm Warm
2004
Skywipe And Flamer
2010 2009
MyDoom
2012 2011
StuxNet
Ransomware
HOW TO BE PROTECTIVE
05
Cyber Security Insurance
Modern Firewall
06
Move To Trusted DNS Source Only
03
Spam Filters
07
Two Factor Authentication For Remote User
04
Backup, Disaster Recovery
08
Inspect Wireless Networks
01 02
Anti-virus, AntiMalwares
THANKS FOR WATCHING