Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Introduction to

cyber security
SUBMITTED TO :- MR RAVINDRA KORANGA
SUBMITTED BY :-VINEET GOSWAMI
BTECH CSE 3rd SEMESTER
INTRODUCTION
 Cyber Security is a process that's designed to
protect networks and devices from external
threats. Businesses typically employ Cyber
Security professionals to protect their
confidential information, maintain employee
productivity, and enhance customer confidence in
products and services.
OBJECTIVE
• Understand computer forensic processes and some
managed traces.

• Skills to proactively and reactively manage and


monitor common cyber security attacks.

• Basic knowledge and skills of reverse engineering.

• Understand how malware works, how can it


become persistent and how it can be detected.

• Skills to identify and manage common


vulnerabilities.

• Basic knowledge and skills of penetration testing


Cyber Security
CYBERCRIME :
1.SCAREWARE: -Fake avs is the most successful example.
-Studies reveal around 2% of victims buy.

2.RANSOMWAVE: -Emerged right after scareware stopped working.


-Huge problem today.

3.CLICK FRAUD: -Online advertisement is a multi-billon dollor market.


-Attacker registers as publisher in an ad network.
 CYBERTHREATS:
 Refer to a wide range of malicious activities that can damage or
disrupt a computer system, a network or the information it
contains.
 Type of Cyber threats:-
 Structure: It is related to the attackers resources , organization
and funding.
 Target: Targeted attacks- Its very personal, Its persistent, Its
stealthy, Its focused on control of victum.
 Origin: External Threat-Attackers does not have access to the
victims systems and networks.
 Internal Threat-Attacker has authorized access to
s some parts of the victims systems and
networks.
 CYBERSPIONAGE:
 Dozens of cyberspionage campaigns discovered in
the last decade affecting:
 -Nation states, including governments and
military organizations.
 -Key industrial sectors, such as:
 ICT.
 Materials and maniufacturing.
 Aerospace.
 Financial and business.
COMPUTER FORENSICS
DIGITAL FORENSICS :
It is focused on recovering evidences that the user has hidden, deleted, or just left
behind while conducting their activities.
Evidences can be inculpatory or exculpatory .

DATA CARVING :
Techniques frequently occur during a digital investigation, when the unallocated
file system space is analyzed to extract files .

METADATA: Metadata is “data that provides information about


other data” , but not the content of the data , such as the text of a
Message or the image itself.
FILE EXTENSIONS: It is an identifier used as asufix to a name
of the computer file in an operating system such as microsoft
windows.

DATACARVING: In Cyber Forensics, carving is a helpful technique


in finding hidden or deleted files from digital media. A file can be
hidden in areas like lost cluster, unallocated clusters and slack space
of the disk or digital media.

COMPUTER FORENSICS: It is the application of investigation and


Analysis techniques to gather and preserve evidence from a
particular computing device in a way that is suitable for
presentation in a court of law.
Assembly Programming
REVERSE ENGINEERING: Reverse engineering, sometimes called back
engineering, is a process in which software, machines, aircraft, architectural
structures and other products
Are deconstructed to extract design information from them .

TYPES OF REVERSE ENGINEERING:


1. Static Technique: No execution , It describes structure execution order.

2. Dynamic Technique: Run time behaviour, Easy to find dead code,


Identification dependencies.
REVERSE ENGINEERING TECHNIQUES:

1.DECOMPILING: To decompile means to convert executable or ready-


to-run program code -- sometimes called object code -- into some form
of higher-level programming language that humans can easily
understand.

2. DISASSEMBLING: A disassembler differs from a decompiler,


which targets a high-level language rather than an assembly
language. Disassembly, the output of a disassembler, is often
formatted for human-readability rather than suitability for input to an
assembler, making it principal a reverse engineering tool.
ARITHMETIC INSTRUCTIONS: Add/ sub/ imul/ idiv: addition, subtraction,
multiplication and division.

LOGICAL INSTRUCTIONS: - Add/ or/ xor: logical operators.


- not: not logical operators.

CONDITIONAL INSTRUCTIONS: - IF, WHILE,FOR….


- cmp eax,22.

BASIC INSTRUCTIONS: -SIC mov: move instruction.


- push/pop: insert and remove element.
THANK
YOU
12

You might also like