Recent trends in 2014-15 in the IT field. Big shots from the major companies, including rumours of shift in focus to car manufacturing. Seamless integration between devices etc.
3. Unix / Mac OS /OS X
• Unix (all-caps UNIX for the trademark) is a
family of multitasking, multiuser computer
operating systems that derive from the
original AT&T Unix, developed in the 1970s
at the Bell Labs research centre by Ken
Thompson, Dennis Ritchie, and others
• Permission technology and also the user
groups sandboxing.
• Root / superuser sandboxing
• Virus adaptability better than its competitors.
4. Windows
• It is the most commonly
used OS world wide.
• It was developed by
Microsoft
• It uses DLL and registry
model.
• It uses a user access
control system.
5. Linux
• Linux is a Unix-like and mostly POSIX-
compliant computer operating system
assembled under the model of free and
open-source software development and
distribution. The defining component of Linux
is the Linux kernel,an operating system
kernel first released on 5 October 1991 by
Linus Torvalds.
• Almost all the security measures of that of
Unix.
• Ubuntu
• Mint
• Fedora
• Red hat
9. Password
• Its a simple mechanism to know whether the user is
genuine
• It may include letters numbers and may be in some cases
the special characters
• Password of the future may include the physical
verification
• extended security through 2 step verification.
• Password mangers to help you for password management
10. Precautions for password
• Different password for each and every website
• Avoid managers but too many passwords mean managers
• Use long passwords and avoid 123456, Password , Incorrect etc
• Avoid using meaningful words.
• use multilingual password
• Enable 2 step verification for the Gmail iCloud and available services
• Enable notification for Facebook and authenticators for generating a
2nd layer security.
11. • using passwords like these would ensure your computers are
safe but as said earlier MEMORY?
• Change the password in every 72-90 days
• Make sure you log out of the online services after use.
enable auto sign in the computers you have complete
control on.
• enable guest users for the computers and for mobiles .
• use incognito mode when ever you want your searches
traceless
• Clear the cookies and the history every 2 months.
• Avoid auto login saves time but your safety?
13. iOS
• iphone os - iOS
• Developed based on unix
• used by apple closed coded
• Benefits of sandboxing
• limitation slow roll out of features
• Fast updates
14. Android
• Freedom
• users mode
• customise the appearance
• easier access to the google services including the mail
the contacts the calendar system
• drawbacks too much resource allocation.
• Hacking prone
15. Windows Phone
• Better than windows mobile
• Fast growing
• Benefits of the existing users
• easier to learn for the majority of the users
• hugely inspired the windows 8/8.1 and the windows
10
16. • There are other Mobile OS available like ubuntu,
sailfish, Tizen and many more.
• But then why is it that they are not popular?
• Not well developed App stores - the hardware
companies want to go with the tried and tested
• the os will require a specific hardware and
• best is already used.
18. – Fred Durst
“If you wanna know how not secure you are,
just take a look around. Nothing's secure.
Nothing's safe. I don't hate technology, I don't
hate hackers, because that's just what comes
with it, without those hackers we wouldn't solve
the problems we need to solve, especially
security.”
19. Black Hat Hacker
• Dont follow rules
• Doesn't do hacking for approved reasons
• Malicious codes / virus
• Violates computer security
20. White Hat Hackers
• Computer Security
• Improves Security and Services
• Hacks with the permission of the user.
21. Hactivists
• The story of Anonymous
• The NSA
• The Digital Terrorism.
• Does Good / Bad
23. Virus
• A program that can replicate by itself and can
spread from one computer to another with out the
input from the creator
• Needs a host program
• The purpose for the virus can be different or it can
be used for any purpose eg kali linux payload
management
24. Computer Worms
• It is similiar to virus and can replicate through
network
• It is a self sustaining program doesn't need to be
attached with any of the programs
• Common symptoms include overall sluggishness in
the os and the slowness in the network due to
increase bandwith consumption.
25. Trojan Horse
• One of the most irritating programs in the computer
world.
• Inspiration from the TROY story
• Does something entirely different from what it is
suppose to do tricks the user. Started as a greeting card
virus.
• Commonly used to hack and steal information from the
users commonly used in keyloggers. Hence it is called
social engineering toolkit.
26. Types of hacking
• Password cracking : it can be done in 2 ways through
brute force or through dictionary guessing.
• Packet sniffing : all information through the internet
always passes through as packets and thus softwares like
wireshark can sniff the packet data and hence get the
information
• Phishing : My most favourite method of hacking
because requires very less work and then fool the
customers into giving their information. CLONING the
website.
27. Types of Hacking
• Rootkit: Software that can hid the unwanted process from seeing
in the windows task manger.
• Key loggers : if you have access to the computer installing a key
loggers can provide all that is typed in that computer. taps in to the
typing in the computer.
• Scareware/ransomware: Commonly disguise as an antivirus
making you pay for the security or for providing information.
Credit card informations !!!
• IP spoofing / MAC address cloning : use the id of some other
person and avoid being detected in the hacked network to avoid
the forensic detection.
28. Free advice
• Always protect your system with an antivirus !!!!!!!
and keep it updated.
• use cloud antivirus
• never use a cracked system or a cracked antivirus.
• it affects your motherboard and also your security.
30. Who wants 1 device ?
• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit
and apple watch.
• Google with chrome books chrome cast android and other
services like the google glass and even internet itself- project loom
android wear
• Windows with laptops, phones,xbox surface tabs and surface TV
and Zune players, Office.
• All want not one device but your complete home and the
complete ecosystem
• the maximum effects come with the maximum devices
34. • Wireless charging
• Hands free control
• 3D projectors
• 3D Printers - Guess what chicken of the future will
be printed.
• Robotic skeletons for army.
• Control the home from Anywhere in the world
through Home kit.
• Free and wireless payments through NFC.
36. Finger Print Scanner
• It is simple
• uses a unique design
• Much safer than the face recognition
• Partial and complete recognition of the finger print
• Safe place to store the data
• Can carry along where ever you go
• But not hack free
• Sensors inaccurate to detect a finger or differentiate from an animal
• Good for making authentication for the payments.
37.
38. USB Tokenisation
• A single usb key
• No passwords
• Connect the USB
• Incorruptible Data ROM storage.
• Best used in offices, for authentication.
39.
40. iris recognition system.
• the most secure in the world
• error rate is high
• requires very good sensors
• Used for very high security measures in the military
• mass usage still in testing
• Checking for the possibilities for the daily usage.
• inconvenient for almost daily usage.