SlideShare une entreprise Scribd logo
1  sur  19
1
Cyber Security Threads & Security in Web
Cloud Servers
Presentation on FDP
TRYLOGIC SOFT SOLUTIONS AP PVT LTD
Prepared By-
Vikalp Sharma
2
Cyber Security-Terms
2
In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use of an asset.
Cyber security is the state or process of protecting and recovering networks, devices and programs from any
type of cyber attack.
Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis,
documentation and preservation of digital evidence.
3
Latest News
3
04
4
Latest Incidents
2020
January
Ransomware Attack.
Greenville Water, a popular water utility company
that services nearly 500,000 residents
2019
January
2018
August
World Economical forum meet said : More than 1.1 billion
data of aadhar card is under breach.
Facebook Data & Adobe 2.9 million users data.
Cosmos Bank, Pune Branch , 94 Crores rupees wiped money
and transferred to Hong Kong based bank.
5
2014
Marriot Reported 500 million guest data
compromised & Also Russian hackers
revealed stolen data 1.2 billion login on
4,20,000 websites.
2018
July
2016
ATM systems hacked in Kolkata into Canara bank ATM,
wiped more than 20 lacks from different accounts.
Kaspersky lab report says: 758 million malicious attack
occurred & Ransom ware wannacry incident.
2015
Adultfriendfinder was attacked & data was publicly
published.
Local file inclusion breach was inducted.
6
Example Around Us
7
Hackers View: How Attacks are
possible
TOR
Google chrome
Hola
Email Spoofing
Emkei, m-k
SMS Spoofing
Smsgang.com
Spy
software
Steganography
8
AUTOMATION ACTIVITY
Food, living, corporates
Home automation
Smart traffic & digital
boards
Automation robots ,
automobile
9
Cyber Connected Devices
Smartphones are connected
with internet
Smart TV, Self Driving
Car, Watches
Appliances at home runs on
electricity, Home Automation
Everything around us will be
concerning internet
That’s what IOT is all about
10
BREACH POSSIBILITY
Changing the Digital message
and wrong message spread
all over
Damaging the Traffic
System & Home activity
Device control and physical
damage by terrorist
World Economical and
physical crisis, Blocking
Cart (e-commerce)
01
02
03
04
11
Spoofing
Phishing
Private information capture &
Users activity capture
Floating Wrong
information
Threats while using internet
SQL Injection
12
These statements control a database server behind a web application. Attackers
can use SQL Injection vulnerabilities to bypass application security measures.
This particular vulnerability uses malicious codes to attack
servers that store critical data for websites
only use stored procedures and
prepared statements.
validate all SQL data
inputs against a
whitelist
SQL INJECTION
SELECT * FROM `admin_credentials` WHERE username="" and password="" or 1=1
13
Attacks with Public Wi-Fi?
Man-in-the-Middle
Packet Analyzers,
Sniffers.
Ad-hoc Network,
Endpoint attack
Mishandled Wi-Fi Security
Set-Ups, Unencrypted
Network
Don’t:
Allow your Wi-Fi to auto-connect to
networks, Work with Sensitive
website, Leave Wi-Fi Open, login
unprotected network
14
Precautions are the Solutions
Secure Communication
Start to be safe
Safe
MAC filters
WPA2
Firewall
Mail filter and
site blocker
Antivirus
Locker or
Encrypted
Snort for DDOS
Two step
Authentication
Human
Risk
15
Research Topics in Cyber Security
1
Violence Analysis in Cyber Tweets and Cyber Recruitment
Plagiarism detection in articles and research ( Adapted by Many University by own tools)
Network Security and Malicious node Detection
Cloud Security with Data Storage and Cloud Authentication
Different password techniques for Authentication & Authorization
Privacy preserving to Medical Data in Application & Cloud
Temporal Cyber Security Big Data
Security Analysis of Intelligent Transportation Systems
Security in IOT Devices, Automation, VANET , Cloud , Mobile Devices……Block Chain?
16
Block-Chain: Just A Overview
Block chains leverage techniques from a field of mathematics and computer science, known as cryptography, to
sign every transaction (e.g. the transfer of assets from one person to another) with a unique digital signature
belonging to the user who initiated the transaction. These signatures are held privately but are verifiable
publicly.
17
18
Useful tips
1
Customize your account and settings
Selection of country for communication
Two factor authentication
Do not click any unwanted link
Block ads and identify ads in any platform
Do-not accept un-Authorized Access/ Do not install Un-trusted application
Keep Alert Settings with all your passwords, keep encryption usage at possible area.
19
https://www.facebook.com/trylogicddugky/Head Office : Bhuvana Towers, #201 & 202, 2nd FLOOR, SD Road,
Secunderabad, Telangana 500003
DDU GKY MP : DK3/26, DANISH KUNJ, KOLAR ROAD, BHOPAL
info@trylogic.in
vikalp@trylogic.in
+91 91092 85858
ADDRESS PHONE & EMAIL SOCIAL MEDIA
TRYLOGIC SOFT SOLUTIONS AP PVT LTD
VIKALP SHARMA
Whatsapp : +91 8770988973

Contenu connexe

Tendances

Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital VaultBlock Armour
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-onlyIvanti
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaAvinash Sinha
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 

Tendances (19)

Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
IoT
IoTIoT
IoT
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similaire à Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020

Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks TrendsCharles Mok
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxInfosectrain3
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
IoT and security
IoT and securityIoT and security
IoT and securityIET India
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 

Similaire à Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020 (20)

Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
IoT and security
IoT and securityIoT and security
IoT and security
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
itmsday2.pptx
itmsday2.pptxitmsday2.pptx
itmsday2.pptx
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 

Dernier

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Dernier (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020

  • 1. 1 Cyber Security Threads & Security in Web Cloud Servers Presentation on FDP TRYLOGIC SOFT SOLUTIONS AP PVT LTD Prepared By- Vikalp Sharma
  • 2. 2 Cyber Security-Terms 2 In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset. Cyber security is the state or process of protecting and recovering networks, devices and programs from any type of cyber attack. Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis, documentation and preservation of digital evidence.
  • 4. 4 Latest Incidents 2020 January Ransomware Attack. Greenville Water, a popular water utility company that services nearly 500,000 residents 2019 January 2018 August World Economical forum meet said : More than 1.1 billion data of aadhar card is under breach. Facebook Data & Adobe 2.9 million users data. Cosmos Bank, Pune Branch , 94 Crores rupees wiped money and transferred to Hong Kong based bank.
  • 5. 5 2014 Marriot Reported 500 million guest data compromised & Also Russian hackers revealed stolen data 1.2 billion login on 4,20,000 websites. 2018 July 2016 ATM systems hacked in Kolkata into Canara bank ATM, wiped more than 20 lacks from different accounts. Kaspersky lab report says: 758 million malicious attack occurred & Ransom ware wannacry incident. 2015 Adultfriendfinder was attacked & data was publicly published. Local file inclusion breach was inducted.
  • 7. 7 Hackers View: How Attacks are possible TOR Google chrome Hola Email Spoofing Emkei, m-k SMS Spoofing Smsgang.com Spy software Steganography
  • 8. 8 AUTOMATION ACTIVITY Food, living, corporates Home automation Smart traffic & digital boards Automation robots , automobile
  • 9. 9 Cyber Connected Devices Smartphones are connected with internet Smart TV, Self Driving Car, Watches Appliances at home runs on electricity, Home Automation Everything around us will be concerning internet That’s what IOT is all about
  • 10. 10 BREACH POSSIBILITY Changing the Digital message and wrong message spread all over Damaging the Traffic System & Home activity Device control and physical damage by terrorist World Economical and physical crisis, Blocking Cart (e-commerce) 01 02 03 04
  • 11. 11 Spoofing Phishing Private information capture & Users activity capture Floating Wrong information Threats while using internet SQL Injection
  • 12. 12 These statements control a database server behind a web application. Attackers can use SQL Injection vulnerabilities to bypass application security measures. This particular vulnerability uses malicious codes to attack servers that store critical data for websites only use stored procedures and prepared statements. validate all SQL data inputs against a whitelist SQL INJECTION SELECT * FROM `admin_credentials` WHERE username="" and password="" or 1=1
  • 13. 13 Attacks with Public Wi-Fi? Man-in-the-Middle Packet Analyzers, Sniffers. Ad-hoc Network, Endpoint attack Mishandled Wi-Fi Security Set-Ups, Unencrypted Network Don’t: Allow your Wi-Fi to auto-connect to networks, Work with Sensitive website, Leave Wi-Fi Open, login unprotected network
  • 14. 14 Precautions are the Solutions Secure Communication Start to be safe Safe MAC filters WPA2 Firewall Mail filter and site blocker Antivirus Locker or Encrypted Snort for DDOS Two step Authentication Human Risk
  • 15. 15 Research Topics in Cyber Security 1 Violence Analysis in Cyber Tweets and Cyber Recruitment Plagiarism detection in articles and research ( Adapted by Many University by own tools) Network Security and Malicious node Detection Cloud Security with Data Storage and Cloud Authentication Different password techniques for Authentication & Authorization Privacy preserving to Medical Data in Application & Cloud Temporal Cyber Security Big Data Security Analysis of Intelligent Transportation Systems Security in IOT Devices, Automation, VANET , Cloud , Mobile Devices……Block Chain?
  • 16. 16 Block-Chain: Just A Overview Block chains leverage techniques from a field of mathematics and computer science, known as cryptography, to sign every transaction (e.g. the transfer of assets from one person to another) with a unique digital signature belonging to the user who initiated the transaction. These signatures are held privately but are verifiable publicly.
  • 17. 17
  • 18. 18 Useful tips 1 Customize your account and settings Selection of country for communication Two factor authentication Do not click any unwanted link Block ads and identify ads in any platform Do-not accept un-Authorized Access/ Do not install Un-trusted application Keep Alert Settings with all your passwords, keep encryption usage at possible area.
  • 19. 19 https://www.facebook.com/trylogicddugky/Head Office : Bhuvana Towers, #201 & 202, 2nd FLOOR, SD Road, Secunderabad, Telangana 500003 DDU GKY MP : DK3/26, DANISH KUNJ, KOLAR ROAD, BHOPAL info@trylogic.in vikalp@trylogic.in +91 91092 85858 ADDRESS PHONE & EMAIL SOCIAL MEDIA TRYLOGIC SOFT SOLUTIONS AP PVT LTD VIKALP SHARMA Whatsapp : +91 8770988973