SlideShare uma empresa Scribd logo
1 de 42
Baixar para ler offline
RECENT TRENDS IN
TECHNOLOGY & INTERNET
SECURITY
Introduction
• Operating System
• Websites
• Passwords
• Hackers
• Mobile Platform
• Virus & Worms
• Recent Trends
• Bio metrics
Unix / Mac OS /OS X
• Unix (all-caps UNIX for the trademark) is a
family of multitasking, multiuser computer
operating systems that derive from the
original AT&T Unix, developed in the 1970s
at the Bell Labs research centre by Ken
Thompson, Dennis Ritchie, and others
• Permission technology and also the user
groups sandboxing.
• Root / superuser sandboxing
• Virus adaptability better than its competitors.
Windows
• It is the most commonly
used OS world wide.
• It was developed by
Microsoft
• It uses DLL and registry
model.
• It uses a user access
control system.
Linux
• Linux is a Unix-like and mostly POSIX-
compliant computer operating system
assembled under the model of free and
open-source software development and
distribution. The defining component of Linux
is the Linux kernel,an operating system
kernel first released on 5 October 1991 by
Linus Torvalds.
• Almost all the security measures of that of
Unix.
• Ubuntu
• Mint
• Fedora
• Red hat
WEBSITES
HTTP VS HTTPS
PASSWORD
Password
• Its a simple mechanism to know whether the user is
genuine
• It may include letters numbers and may be in some cases
the special characters
• Password of the future may include the physical
verification
• extended security through 2 step verification.
• Password mangers to help you for password management
Precautions for password
• Different password for each and every website
• Avoid managers but too many passwords mean managers
• Use long passwords and avoid 123456, Password , Incorrect etc
• Avoid using meaningful words.
• use multilingual password
• Enable 2 step verification for the Gmail iCloud and available services
• Enable notification for Facebook and authenticators for generating a
2nd layer security.
• using passwords like these would ensure your computers are
safe but as said earlier MEMORY?
• Change the password in every 72-90 days
• Make sure you log out of the online services after use.
enable auto sign in the computers you have complete
control on.
• enable guest users for the computers and for mobiles .
• use incognito mode when ever you want your searches
traceless
• Clear the cookies and the history every 2 months.
• Avoid auto login saves time but your safety?
MOBILE PLATFORM
iOS
• iphone os - iOS
• Developed based on unix
• used by apple closed coded
• Benefits of sandboxing
• limitation slow roll out of features
• Fast updates
Android
• Freedom
• users mode
• customise the appearance
• easier access to the google services including the mail
the contacts the calendar system
• drawbacks too much resource allocation.
• Hacking prone
Windows Phone
• Better than windows mobile
• Fast growing
• Benefits of the existing users
• easier to learn for the majority of the users
• hugely inspired the windows 8/8.1 and the windows
10
• There are other Mobile OS available like ubuntu,
sailfish, Tizen and many more.
• But then why is it that they are not popular?
• Not well developed App stores - the hardware
companies want to go with the tried and tested
• the os will require a specific hardware and
• best is already used.
HACKERS
– Fred Durst
“If you wanna know how not secure you are,
just take a look around. Nothing's secure.
Nothing's safe. I don't hate technology, I don't
hate hackers, because that's just what comes
with it, without those hackers we wouldn't solve
the problems we need to solve, especially
security.”
Black Hat Hacker
• Dont follow rules
• Doesn't do hacking for approved reasons
• Malicious codes / virus
• Violates computer security
White Hat Hackers
• Computer Security
• Improves Security and Services
• Hacks with the permission of the user.
Hactivists
• The story of Anonymous
• The NSA
• The Digital Terrorism.
• Does Good / Bad
VIRUS & WORMS
Virus
• A program that can replicate by itself and can
spread from one computer to another with out the
input from the creator
• Needs a host program
• The purpose for the virus can be different or it can
be used for any purpose eg kali linux payload
management
Computer Worms
• It is similiar to virus and can replicate through
network
• It is a self sustaining program doesn't need to be
attached with any of the programs
• Common symptoms include overall sluggishness in
the os and the slowness in the network due to
increase bandwith consumption.
Trojan Horse
• One of the most irritating programs in the computer
world.
• Inspiration from the TROY story
• Does something entirely different from what it is
suppose to do tricks the user. Started as a greeting card
virus.
• Commonly used to hack and steal information from the
users commonly used in keyloggers. Hence it is called
social engineering toolkit.
Types of hacking
• Password cracking : it can be done in 2 ways through
brute force or through dictionary guessing.
• Packet sniffing : all information through the internet
always passes through as packets and thus softwares like
wireshark can sniff the packet data and hence get the
information
• Phishing : My most favourite method of hacking
because requires very less work and then fool the
customers into giving their information. CLONING the
website.
Types of Hacking
• Rootkit: Software that can hid the unwanted process from seeing
in the windows task manger.
• Key loggers : if you have access to the computer installing a key
loggers can provide all that is typed in that computer. taps in to the
typing in the computer.
• Scareware/ransomware: Commonly disguise as an antivirus
making you pay for the security or for providing information.
Credit card informations !!!
• IP spoofing / MAC address cloning : use the id of some other
person and avoid being detected in the hacked network to avoid
the forensic detection.
Free advice
• Always protect your system with an antivirus !!!!!!!
and keep it updated.
• use cloud antivirus
• never use a cracked system or a cracked antivirus.
• it affects your motherboard and also your security.
RECENT TRENDS IN THE
TECHNOLOGICAL FIRMS
Who wants 1 device ?
• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit
and apple watch.
• Google with chrome books chrome cast android and other
services like the google glass and even internet itself- project loom
android wear
• Windows with laptops, phones,xbox surface tabs and surface TV
and Zune players, Office.
• All want not one device but your complete home and the
complete ecosystem
• the maximum effects come with the maximum devices
Continuum - Windows 10
Continuity- Apple
Self driving cars of the future. - Benz
• Wireless charging
• Hands free control
• 3D projectors
• 3D Printers - Guess what chicken of the future will
be printed.
• Robotic skeletons for army.
• Control the home from Anywhere in the world
through Home kit.
• Free and wireless payments through NFC.
BIO METRICS
Finger Print Scanner
• It is simple
• uses a unique design
• Much safer than the face recognition
• Partial and complete recognition of the finger print
• Safe place to store the data
• Can carry along where ever you go
• But not hack free
• Sensors inaccurate to detect a finger or differentiate from an animal
• Good for making authentication for the payments.
USB Tokenisation
• A single usb key
• No passwords
• Connect the USB
• Incorruptible Data ROM storage.
• Best used in offices, for authentication.
iris recognition system.
• the most secure in the world
• error rate is high
• requires very good sensors
• Used for very high security measures in the military
• mass usage still in testing
• Checking for the possibilities for the daily usage.
• inconvenient for almost daily usage.
THANK YOU!

Mais conteúdo relacionado

Mais procurados

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 

Mais procurados (18)

Personal security
Personal securityPersonal security
Personal security
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Let's Hack a House
Let's Hack a HouseLet's Hack a House
Let's Hack a House
 
System failure
System  failureSystem  failure
System failure
 
Mobile device security using transient authentication
Mobile device security using transient authenticationMobile device security using transient authentication
Mobile device security using transient authentication
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 

Semelhante a Internet security

Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
NIRMAL RAJ
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
Harsimran Walia
 

Semelhante a Internet security (20)

Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Senior Education
Senior EducationSenior Education
Senior Education
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 

Último

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Último (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

Internet security

  • 1. RECENT TRENDS IN TECHNOLOGY & INTERNET SECURITY
  • 2. Introduction • Operating System • Websites • Passwords • Hackers • Mobile Platform • Virus & Worms • Recent Trends • Bio metrics
  • 3. Unix / Mac OS /OS X • Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others • Permission technology and also the user groups sandboxing. • Root / superuser sandboxing • Virus adaptability better than its competitors.
  • 4. Windows • It is the most commonly used OS world wide. • It was developed by Microsoft • It uses DLL and registry model. • It uses a user access control system.
  • 5. Linux • Linux is a Unix-like and mostly POSIX- compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel,an operating system kernel first released on 5 October 1991 by Linus Torvalds. • Almost all the security measures of that of Unix. • Ubuntu • Mint • Fedora • Red hat
  • 9. Password • Its a simple mechanism to know whether the user is genuine • It may include letters numbers and may be in some cases the special characters • Password of the future may include the physical verification • extended security through 2 step verification. • Password mangers to help you for password management
  • 10. Precautions for password • Different password for each and every website • Avoid managers but too many passwords mean managers • Use long passwords and avoid 123456, Password , Incorrect etc • Avoid using meaningful words. • use multilingual password • Enable 2 step verification for the Gmail iCloud and available services • Enable notification for Facebook and authenticators for generating a 2nd layer security.
  • 11. • using passwords like these would ensure your computers are safe but as said earlier MEMORY? • Change the password in every 72-90 days • Make sure you log out of the online services after use. enable auto sign in the computers you have complete control on. • enable guest users for the computers and for mobiles . • use incognito mode when ever you want your searches traceless • Clear the cookies and the history every 2 months. • Avoid auto login saves time but your safety?
  • 13. iOS • iphone os - iOS • Developed based on unix • used by apple closed coded • Benefits of sandboxing • limitation slow roll out of features • Fast updates
  • 14. Android • Freedom • users mode • customise the appearance • easier access to the google services including the mail the contacts the calendar system • drawbacks too much resource allocation. • Hacking prone
  • 15. Windows Phone • Better than windows mobile • Fast growing • Benefits of the existing users • easier to learn for the majority of the users • hugely inspired the windows 8/8.1 and the windows 10
  • 16. • There are other Mobile OS available like ubuntu, sailfish, Tizen and many more. • But then why is it that they are not popular? • Not well developed App stores - the hardware companies want to go with the tried and tested • the os will require a specific hardware and • best is already used.
  • 18. – Fred Durst “If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.”
  • 19. Black Hat Hacker • Dont follow rules • Doesn't do hacking for approved reasons • Malicious codes / virus • Violates computer security
  • 20. White Hat Hackers • Computer Security • Improves Security and Services • Hacks with the permission of the user.
  • 21. Hactivists • The story of Anonymous • The NSA • The Digital Terrorism. • Does Good / Bad
  • 23. Virus • A program that can replicate by itself and can spread from one computer to another with out the input from the creator • Needs a host program • The purpose for the virus can be different or it can be used for any purpose eg kali linux payload management
  • 24. Computer Worms • It is similiar to virus and can replicate through network • It is a self sustaining program doesn't need to be attached with any of the programs • Common symptoms include overall sluggishness in the os and the slowness in the network due to increase bandwith consumption.
  • 25. Trojan Horse • One of the most irritating programs in the computer world. • Inspiration from the TROY story • Does something entirely different from what it is suppose to do tricks the user. Started as a greeting card virus. • Commonly used to hack and steal information from the users commonly used in keyloggers. Hence it is called social engineering toolkit.
  • 26. Types of hacking • Password cracking : it can be done in 2 ways through brute force or through dictionary guessing. • Packet sniffing : all information through the internet always passes through as packets and thus softwares like wireshark can sniff the packet data and hence get the information • Phishing : My most favourite method of hacking because requires very less work and then fool the customers into giving their information. CLONING the website.
  • 27. Types of Hacking • Rootkit: Software that can hid the unwanted process from seeing in the windows task manger. • Key loggers : if you have access to the computer installing a key loggers can provide all that is typed in that computer. taps in to the typing in the computer. • Scareware/ransomware: Commonly disguise as an antivirus making you pay for the security or for providing information. Credit card informations !!! • IP spoofing / MAC address cloning : use the id of some other person and avoid being detected in the hacked network to avoid the forensic detection.
  • 28. Free advice • Always protect your system with an antivirus !!!!!!! and keep it updated. • use cloud antivirus • never use a cracked system or a cracked antivirus. • it affects your motherboard and also your security.
  • 29. RECENT TRENDS IN THE TECHNOLOGICAL FIRMS
  • 30. Who wants 1 device ? • Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit and apple watch. • Google with chrome books chrome cast android and other services like the google glass and even internet itself- project loom android wear • Windows with laptops, phones,xbox surface tabs and surface TV and Zune players, Office. • All want not one device but your complete home and the complete ecosystem • the maximum effects come with the maximum devices
  • 33. Self driving cars of the future. - Benz
  • 34. • Wireless charging • Hands free control • 3D projectors • 3D Printers - Guess what chicken of the future will be printed. • Robotic skeletons for army. • Control the home from Anywhere in the world through Home kit. • Free and wireless payments through NFC.
  • 36. Finger Print Scanner • It is simple • uses a unique design • Much safer than the face recognition • Partial and complete recognition of the finger print • Safe place to store the data • Can carry along where ever you go • But not hack free • Sensors inaccurate to detect a finger or differentiate from an animal • Good for making authentication for the payments.
  • 37.
  • 38. USB Tokenisation • A single usb key • No passwords • Connect the USB • Incorruptible Data ROM storage. • Best used in offices, for authentication.
  • 39.
  • 40. iris recognition system. • the most secure in the world • error rate is high • requires very good sensors • Used for very high security measures in the military • mass usage still in testing • Checking for the possibilities for the daily usage. • inconvenient for almost daily usage.
  • 41.