You are on page 1of 8

TOPIC : NEED FOR SECURITY

Subject Name : Cryptography & Network Security

Subject Code  : PEC-CS801B 

Semester  : 8th

Continuous Assessment 1 (CA1)        

Student Name : Ayan roy

Stream : Computer Science & Engineering

Roll no.-45

University Roll  : 17600119055  

Subject Teacher: Sandeep Bhowmik, Sirshendu Hore


SECURITY IMPORTANCE
IMORTANCE OF SECURITY
 Algerian ministry of defense subjected to 3500 attempt daily.
 Hacking on UAV in South Korea.

 Hacking on Boshahr Nuclear reactor in Iran.

 Electric failure in USA due to cyber attack

 Thieving of subscriber data of ashley madison, AT&T, T mobile US.

 Thieving of 55000 username/password from Twitter.

 Nasa Hacking.

HACKING SCOPE

Planted Medical Devices Hacking.

Automobiles Hacking .

Computer Hacking.

Network Device Hacking.

UAV Hacking.

Industrial Devices Hacking.


WHY CYBER ATTACKS?

For money

 For revenge

For testing skills or taking advantage of knowledge

For fun

RESULTS

 Financial loss

 Identity theft

 Loss of trust

 Data loss/theft

 Misuse of computer resources


HOW ATTACKER STEAL IDENTITY?

o Stealing(computer, mobile,wallets )
o Social Engineering (People trust)
o Skimming : steal credit no. by special storage

LEVEL OF SECURITY

 User Security
Application Security
System Security
Network Security
Physical Security

MOBILE DEVICE SECURITY

 Mobile malware : conversation listener, wipe-out info. , monitor your actions.


 Application vulnerabilities
 Lost or stolen devices
GUIDELINES FOR WINDOWS

•Strong password
•Lock the system when not in use
•Apply software
•Use windows firewall
•Hide files/folders
•Disable unnecessary services
•Implement malware protection

NETWORK SECURITY TYPES

 Network sniffers
 Denial of service(DOS)
 DNS poisoning(DNS spoofing)
 Wireless security
 Man-in-the-middle attack
 SQL injection
SOCIAL ENGINEERING

 Art of convincing people to reveal confidential information from people


 Human based method:
 Laying
 Eavesdropping
 Shoulder surfing
 Dumpster diving

SOCIAL NETWORKING SECURITY

• Cyber bullying : spreading rumors, threating, harassments.


• Be careful about what is posted on internet
• ignore the bully
• Document all conversations
• Contact local authorities
AVOID MOBILE DEVICE THEFT

 Avoid lending mobile phone


 Do not talk while walking/driving
 Do not lave mobile in a car
 Turn off ringer
 Record IMEI
 Us anti-theft s/w to remotely wipe the data & make the device unusable
 Cancel SIM

MEASURE PROCEDURES FOR SECURITY

 Patching mobile plateforms and applications


 Use power-on authentication
 Backup
 Use mobile phone anti-virus
 Encrypt your data
 Secure Bluetooth
 Complex password
 Disable auto login
 Not post sensitive/personal information
 Be careful clicking links in messages(fake sites)
REFERENCES

“Cryptography and
Network Security” by V.K.
Jain, Khanna Publishing
House

“Cryptography and Network


Security” , William
Stallings,2nd Edition, Pearson
Education Asia

Thank You……

You might also like