21
Presented By X

Who is Using Your PC

Embed Size (px)

Citation preview

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 1/21

PresentedBy

X

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 2/21

Who are hackers?

Why they do hacking?

How it affects the society?

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 3/21

•Phishing •Malware

•DOS •Trojan Horses

•Worms •Virus

•Botnet

Spyware

•Spam

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 4/21

Black Hat

White Hat

oGray Hat

oBlue Hat

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 5/21

Terror Organization

Smugglers

Online Thief 

Mafia

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 6/21

Al-Qaida /Taliban

For Terrorist Activities

Main Weapon – Viruses

 Join Task Force-Global Network Operations

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 7/21

Stacey Davida 

Credit card and, Shippingand Billing Address

3asfh.net

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 8/21

Financed 2002 explosion

Killed more than 200 people

“Learn to Hack”-Imam Samudra

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 9/21

Celebrity Phone hacking (2010)

Sony Hacking Case (2009)-PlayStation network

shut down

Phone Hacking case (2011)- News of the world

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 10/21

T.J. Maxx theft- 45.7 million credit/ debit

card user at risk

Pentagon hacking case- Gary McKinnon

(biggest military computer hack of all time)

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 11/21

Targeting

Research and Information Gathering

Code program

Break code

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 12/21

 PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPD KBXBJYUXJ LBJOOKCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL, QBOP KBO BXV OPVOV LBOLXRO CI SX'XJMI, KBO JCKO XPV EYKKOV LBO DJCMPV ZOICJO BYS,KXUYPD: “DJOXL EYPD, ICJ X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP 

 JOACMPLYPD LC UCM LBO IXZROK CI FXKL XDOK XPV LBO RODOPVK CIXPAYOPL EYPDK. SXU Y SXEO KC ZCRV XK LC AJXNO X IXNCMJ CI UCMJSXGOKLU?” OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 13/21

We identify the most common characters, diagrams and trigrams in

the cipher text

PCQ VMJYPD LBYK LYSO KBXBJXWXV BXV ZCJPO EYPDKBXBJYUXJ LBJOO KCPK. CP LBO LBCMKXPV XPV IYJKL PYDBL,QBOP KBO BXV OPVOV LBO LXRO CI SX'XJMI, KBO JCKO XPVEYKKOV LBO DJCMPV ZOICJO BYS, KXUYPD: “DJOXL EYPD, ICJ 

X LBCMKXPV XPV CPO PYDBLK Y BXNO ZOOP JOACMPLYPD LCUCM LBO IXZROK CI FXKL XDOK XPV LBO RODOPVK CI XPAYOPLEYPDK. SXU Y SXEO KC ZCRV XK LC AJXNO X IXNCMJ CI UCMJSXGOKLU?” OFYRCDMO, LXROK IJCS LBO LBCMKXPV XPV CPO PYDBLK

First guess:◦ LBO is THE

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 14/21

Assuming LBO represents THE, we replace L with T, B with H,

and O with E and get

PCQ VMJYPD THYK TYSE KHXHJXWXV HXV ZCJPE EYPDKHXHJYUXJ THJEE KCPK. CP THE THCMKXPV XPV IYJKTPYDHT, QHEP KHO HXV EPVEV THE LXRE CI SX'XJMI, KHE JCKEXPV EYKKEV THE DJCMPV ZEICJE HYS, KXUYPD: “DJEXT EYPD, ICJ X THCMKXPV XPV CPE PYDHTK Y HXNE ZEEP JEACMPTYPDTC UCM THE IXZREK CI FXKT XDEK XPV THE REDEPVK CIXPAYEPT EYPDK. SXU Y SXEE KC ZCRV XK TC AJXNE X IXNCMJCI UCMJ SXGEKTU?” 

EFYRCDME, TXREK IJCS THE THCMKXPV XPV CPE PYDBTK

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 15/21

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 16/21

 

Now during this time Shahrazad had borne King Shahriyar threesons.

On the thousand and first night, when she had ended the tale of 

Ma'aruf , she rose and kissed the ground before him, saying: “Great

King, for a thousand and one nights I have been recounting toyou the fables of past ages and the legends of ancient kings.May I make so bold as to crave a favour of your majesty?” 

Epilogue, Tales from the Thousand and One Nights

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 17/21

1. ILOVEYOU

2. Mydoom

3. Blaster4. Sobig Worm

5. Code Red

6. CIH

7. Klez

8. Melissa9. Sasser

10. Bagle

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 18/21

Check Email details

Valid website

Secure online payment

Spam unsecure mail

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 19/21

Never keep Personal information Online

Never use unsecure network

Change password once a month

Get update with online security

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 20/21

 

Online security is today's main concern.

R&D should put more concern on it.

World need to fight together.

Never try it, its illegal.

8/3/2019 Who is Using Your PC

http://slidepdf.com/reader/full/who-is-using-your-pc 21/21