SlideShare a Scribd company logo
RECENT TRENDS IN
TECHNOLOGY & INTERNET
SECURITY
Introduction
• Operating System
• Websites
• Passwords
• Hackers
• Mobile Platform
• Virus & Worms
• Recent Trends
• Bio metrics
Unix / Mac OS /OS X
• Unix (all-caps UNIX for the trademark) is a
family of multitasking, multiuser computer
operating systems that derive from the
original AT&T Unix, developed in the 1970s
at the Bell Labs research centre by Ken
Thompson, Dennis Ritchie, and others
• Permission technology and also the user
groups sandboxing.
• Root / superuser sandboxing
• Virus adaptability better than its competitors.
Windows
• It is the most commonly
used OS world wide.
• It was developed by
Microsoft
• It uses DLL and registry
model.
• It uses a user access
control system.
Linux
• Linux is a Unix-like and mostly POSIX-
compliant computer operating system
assembled under the model of free and
open-source software development and
distribution. The defining component of Linux
is the Linux kernel,an operating system
kernel first released on 5 October 1991 by
Linus Torvalds.
• Almost all the security measures of that of
Unix.
• Ubuntu
• Mint
• Fedora
• Red hat
WEBSITES
HTTP VS HTTPS
PASSWORD
Password
• Its a simple mechanism to know whether the user is
genuine
• It may include letters numbers and may be in some cases
the special characters
• Password of the future may include the physical
verification
• extended security through 2 step verification.
• Password mangers to help you for password management
Precautions for password
• Different password for each and every website
• Avoid managers but too many passwords mean managers
• Use long passwords and avoid 123456, Password , Incorrect etc
• Avoid using meaningful words.
• use multilingual password
• Enable 2 step verification for the Gmail iCloud and available services
• Enable notification for Facebook and authenticators for generating a
2nd layer security.
• using passwords like these would ensure your computers are
safe but as said earlier MEMORY?
• Change the password in every 72-90 days
• Make sure you log out of the online services after use.
enable auto sign in the computers you have complete
control on.
• enable guest users for the computers and for mobiles .
• use incognito mode when ever you want your searches
traceless
• Clear the cookies and the history every 2 months.
• Avoid auto login saves time but your safety?
MOBILE PLATFORM
iOS
• iphone os - iOS
• Developed based on unix
• used by apple closed coded
• Benefits of sandboxing
• limitation slow roll out of features
• Fast updates
Android
• Freedom
• users mode
• customise the appearance
• easier access to the google services including the mail
the contacts the calendar system
• drawbacks too much resource allocation.
• Hacking prone
Windows Phone
• Better than windows mobile
• Fast growing
• Benefits of the existing users
• easier to learn for the majority of the users
• hugely inspired the windows 8/8.1 and the windows
10
• There are other Mobile OS available like ubuntu,
sailfish, Tizen and many more.
• But then why is it that they are not popular?
• Not well developed App stores - the hardware
companies want to go with the tried and tested
• the os will require a specific hardware and
• best is already used.
HACKERS
– Fred Durst
“If you wanna know how not secure you are,
just take a look around. Nothing's secure.
Nothing's safe. I don't hate technology, I don't
hate hackers, because that's just what comes
with it, without those hackers we wouldn't solve
the problems we need to solve, especially
security.”
Black Hat Hacker
• Dont follow rules
• Doesn't do hacking for approved reasons
• Malicious codes / virus
• Violates computer security
White Hat Hackers
• Computer Security
• Improves Security and Services
• Hacks with the permission of the user.
Hactivists
• The story of Anonymous
• The NSA
• The Digital Terrorism.
• Does Good / Bad
VIRUS & WORMS
Virus
• A program that can replicate by itself and can
spread from one computer to another with out the
input from the creator
• Needs a host program
• The purpose for the virus can be different or it can
be used for any purpose eg kali linux payload
management
Computer Worms
• It is similiar to virus and can replicate through
network
• It is a self sustaining program doesn't need to be
attached with any of the programs
• Common symptoms include overall sluggishness in
the os and the slowness in the network due to
increase bandwith consumption.
Trojan Horse
• One of the most irritating programs in the computer
world.
• Inspiration from the TROY story
• Does something entirely different from what it is
suppose to do tricks the user. Started as a greeting card
virus.
• Commonly used to hack and steal information from the
users commonly used in keyloggers. Hence it is called
social engineering toolkit.
Types of hacking
• Password cracking : it can be done in 2 ways through
brute force or through dictionary guessing.
• Packet sniffing : all information through the internet
always passes through as packets and thus softwares like
wireshark can sniff the packet data and hence get the
information
• Phishing : My most favourite method of hacking
because requires very less work and then fool the
customers into giving their information. CLONING the
website.
Types of Hacking
• Rootkit: Software that can hid the unwanted process from seeing
in the windows task manger.
• Key loggers : if you have access to the computer installing a key
loggers can provide all that is typed in that computer. taps in to the
typing in the computer.
• Scareware/ransomware: Commonly disguise as an antivirus
making you pay for the security or for providing information.
Credit card informations !!!
• IP spoofing / MAC address cloning : use the id of some other
person and avoid being detected in the hacked network to avoid
the forensic detection.
Free advice
• Always protect your system with an antivirus !!!!!!!
and keep it updated.
• use cloud antivirus
• never use a cracked system or a cracked antivirus.
• it affects your motherboard and also your security.
RECENT TRENDS IN THE
TECHNOLOGICAL FIRMS
Who wants 1 device ?
• Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit
and apple watch.
• Google with chrome books chrome cast android and other
services like the google glass and even internet itself- project loom
android wear
• Windows with laptops, phones,xbox surface tabs and surface TV
and Zune players, Office.
• All want not one device but your complete home and the
complete ecosystem
• the maximum effects come with the maximum devices
Continuum - Windows 10
Continuity- Apple
Self driving cars of the future. - Benz
• Wireless charging
• Hands free control
• 3D projectors
• 3D Printers - Guess what chicken of the future will
be printed.
• Robotic skeletons for army.
• Control the home from Anywhere in the world
through Home kit.
• Free and wireless payments through NFC.
BIO METRICS
Finger Print Scanner
• It is simple
• uses a unique design
• Much safer than the face recognition
• Partial and complete recognition of the finger print
• Safe place to store the data
• Can carry along where ever you go
• But not hack free
• Sensors inaccurate to detect a finger or differentiate from an animal
• Good for making authentication for the payments.
Internet security
USB Tokenisation
• A single usb key
• No passwords
• Connect the USB
• Incorruptible Data ROM storage.
• Best used in offices, for authentication.
Internet security
iris recognition system.
• the most secure in the world
• error rate is high
• requires very good sensors
• Used for very high security measures in the military
• mass usage still in testing
• Checking for the possibilities for the daily usage.
• inconvenient for almost daily usage.
Internet security
THANK YOU!

More Related Content

PPTX
Senior Technology Education
Summerpair77
 
PDF
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Tom Eston
 
PPTX
Syafiqah slideshare of security measures
Syafiqah Akemi
 
PPTX
Online reputation
esl2m
 
PDF
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
Shakacon
 
PDF
Microcontroller mayhem - ECTF & USSS 2011
warezjoe
 
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 
Senior Technology Education
Summerpair77
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Tom Eston
 
Syafiqah slideshare of security measures
Syafiqah Akemi
 
Online reputation
esl2m
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
Shakacon
 
Microcontroller mayhem - ECTF & USSS 2011
warezjoe
 
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
 

What's hot (18)

PPTX
Cyber Security Tips for students_Deepak
Deepak Khari
 
PPTX
Hacking (1)
Deepu Näñí
 
PPTX
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
PPTX
2014CyberSecurityProject
Kaley Hair
 
PPTX
User's Guide to Online Privacy
cdunk12
 
PDF
Securing your cyberspace_Watson
Patricia M Watson
 
PDF
Cyber security
Arjun Chetry
 
PPTX
Network Security
Angie Perez (LION)
 
PPT
Computer security
Robin E. Beavers
 
PDF
Let's Hack a House
Synack
 
PPTX
System failure
chrispaul8676
 
PPTX
Mobile device security using transient authentication
Paulo Martins
 
PPTX
Open Source Software
Andrew Nolen, MCJ/FP, CDCA
 
PDF
Attacking and Defending Apple iOS Devices
Tom Eston
 
PDF
CNIT 128 5: Mobile malware
Sam Bowne
 
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
SecureState
 
PDF
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
Cyber Security Tips for students_Deepak
Deepak Khari
 
Hacking (1)
Deepu Näñí
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 
2014CyberSecurityProject
Kaley Hair
 
User's Guide to Online Privacy
cdunk12
 
Securing your cyberspace_Watson
Patricia M Watson
 
Cyber security
Arjun Chetry
 
Network Security
Angie Perez (LION)
 
Computer security
Robin E. Beavers
 
Let's Hack a House
Synack
 
System failure
chrispaul8676
 
Mobile device security using transient authentication
Paulo Martins
 
Open Source Software
Andrew Nolen, MCJ/FP, CDCA
 
Attacking and Defending Apple iOS Devices
Tom Eston
 
CNIT 128 5: Mobile malware
Sam Bowne
 
Smart Bombs: Mobile Vulnerability and Exploitation
SecureState
 
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
Ad

Similar to Internet security (20)

PPTX
Hacking By Nirmal
NIRMAL RAJ
 
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
PDF
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
PPT
Chapter 6 effects of ict on society
Pratik Gupta
 
PPTX
Botnets Attacks.pptx
MuhammadRehan856177
 
PPTX
It security the condensed version
Brian Pichman
 
PPT
Nomura UCCSC 2009
dnomura
 
PPTX
Cyber crime
Niraj Solanke
 
PPTX
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
PPTX
I haz you and pwn your maal
Harsimran Walia
 
PPTX
Computer , Internet and physical security.
Ankur Kumar
 
PPT
Security for database administrator to enhance security
ssuser20fcbe
 
PPTX
Senior Education
Summerpair77
 
PDF
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
PPTX
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
PDF
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
PPT
Introduction To Computer Security
Vibrant Event
 
PPT
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Hacking By Nirmal
NIRMAL RAJ
 
Pichman privacy, the dark web, & hacker devices i school (1)
Stephen Abram
 
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Chapter 6 effects of ict on society
Pratik Gupta
 
Botnets Attacks.pptx
MuhammadRehan856177
 
It security the condensed version
Brian Pichman
 
Nomura UCCSC 2009
dnomura
 
Cyber crime
Niraj Solanke
 
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
I haz you and pwn your maal
Harsimran Walia
 
Computer , Internet and physical security.
Ankur Kumar
 
Security for database administrator to enhance security
ssuser20fcbe
 
Senior Education
Summerpair77
 
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
Inetsecurity.in Ethical Hacking presentation
Joshua Prince
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
Shah Sheikh
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Introduction To Computer Security
Vibrant Event
 
Ethical Hacking - Introduction to Computer Security
Vibrant Technologies & Computers
 
Ad

Recently uploaded (20)

PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 

Internet security

  • 1. RECENT TRENDS IN TECHNOLOGY & INTERNET SECURITY
  • 2. Introduction • Operating System • Websites • Passwords • Hackers • Mobile Platform • Virus & Worms • Recent Trends • Bio metrics
  • 3. Unix / Mac OS /OS X • Unix (all-caps UNIX for the trademark) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, developed in the 1970s at the Bell Labs research centre by Ken Thompson, Dennis Ritchie, and others • Permission technology and also the user groups sandboxing. • Root / superuser sandboxing • Virus adaptability better than its competitors.
  • 4. Windows • It is the most commonly used OS world wide. • It was developed by Microsoft • It uses DLL and registry model. • It uses a user access control system.
  • 5. Linux • Linux is a Unix-like and mostly POSIX- compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel,an operating system kernel first released on 5 October 1991 by Linus Torvalds. • Almost all the security measures of that of Unix. • Ubuntu • Mint • Fedora • Red hat
  • 9. Password • Its a simple mechanism to know whether the user is genuine • It may include letters numbers and may be in some cases the special characters • Password of the future may include the physical verification • extended security through 2 step verification. • Password mangers to help you for password management
  • 10. Precautions for password • Different password for each and every website • Avoid managers but too many passwords mean managers • Use long passwords and avoid 123456, Password , Incorrect etc • Avoid using meaningful words. • use multilingual password • Enable 2 step verification for the Gmail iCloud and available services • Enable notification for Facebook and authenticators for generating a 2nd layer security.
  • 11. • using passwords like these would ensure your computers are safe but as said earlier MEMORY? • Change the password in every 72-90 days • Make sure you log out of the online services after use. enable auto sign in the computers you have complete control on. • enable guest users for the computers and for mobiles . • use incognito mode when ever you want your searches traceless • Clear the cookies and the history every 2 months. • Avoid auto login saves time but your safety?
  • 13. iOS • iphone os - iOS • Developed based on unix • used by apple closed coded • Benefits of sandboxing • limitation slow roll out of features • Fast updates
  • 14. Android • Freedom • users mode • customise the appearance • easier access to the google services including the mail the contacts the calendar system • drawbacks too much resource allocation. • Hacking prone
  • 15. Windows Phone • Better than windows mobile • Fast growing • Benefits of the existing users • easier to learn for the majority of the users • hugely inspired the windows 8/8.1 and the windows 10
  • 16. • There are other Mobile OS available like ubuntu, sailfish, Tizen and many more. • But then why is it that they are not popular? • Not well developed App stores - the hardware companies want to go with the tried and tested • the os will require a specific hardware and • best is already used.
  • 18. – Fred Durst “If you wanna know how not secure you are, just take a look around. Nothing's secure. Nothing's safe. I don't hate technology, I don't hate hackers, because that's just what comes with it, without those hackers we wouldn't solve the problems we need to solve, especially security.”
  • 19. Black Hat Hacker • Dont follow rules • Doesn't do hacking for approved reasons • Malicious codes / virus • Violates computer security
  • 20. White Hat Hackers • Computer Security • Improves Security and Services • Hacks with the permission of the user.
  • 21. Hactivists • The story of Anonymous • The NSA • The Digital Terrorism. • Does Good / Bad
  • 23. Virus • A program that can replicate by itself and can spread from one computer to another with out the input from the creator • Needs a host program • The purpose for the virus can be different or it can be used for any purpose eg kali linux payload management
  • 24. Computer Worms • It is similiar to virus and can replicate through network • It is a self sustaining program doesn't need to be attached with any of the programs • Common symptoms include overall sluggishness in the os and the slowness in the network due to increase bandwith consumption.
  • 25. Trojan Horse • One of the most irritating programs in the computer world. • Inspiration from the TROY story • Does something entirely different from what it is suppose to do tricks the user. Started as a greeting card virus. • Commonly used to hack and steal information from the users commonly used in keyloggers. Hence it is called social engineering toolkit.
  • 26. Types of hacking • Password cracking : it can be done in 2 ways through brute force or through dictionary guessing. • Packet sniffing : all information through the internet always passes through as packets and thus softwares like wireshark can sniff the packet data and hence get the information • Phishing : My most favourite method of hacking because requires very less work and then fool the customers into giving their information. CLONING the website.
  • 27. Types of Hacking • Rootkit: Software that can hid the unwanted process from seeing in the windows task manger. • Key loggers : if you have access to the computer installing a key loggers can provide all that is typed in that computer. taps in to the typing in the computer. • Scareware/ransomware: Commonly disguise as an antivirus making you pay for the security or for providing information. Credit card informations !!! • IP spoofing / MAC address cloning : use the id of some other person and avoid being detected in the hacked network to avoid the forensic detection.
  • 28. Free advice • Always protect your system with an antivirus !!!!!!! and keep it updated. • use cloud antivirus • never use a cracked system or a cracked antivirus. • it affects your motherboard and also your security.
  • 29. RECENT TRENDS IN THE TECHNOLOGICAL FIRMS
  • 30. Who wants 1 device ? • Apple with iPod, iPad ,iPhone, mac, apple tv car play home kit and apple watch. • Google with chrome books chrome cast android and other services like the google glass and even internet itself- project loom android wear • Windows with laptops, phones,xbox surface tabs and surface TV and Zune players, Office. • All want not one device but your complete home and the complete ecosystem • the maximum effects come with the maximum devices
  • 33. Self driving cars of the future. - Benz
  • 34. • Wireless charging • Hands free control • 3D projectors • 3D Printers - Guess what chicken of the future will be printed. • Robotic skeletons for army. • Control the home from Anywhere in the world through Home kit. • Free and wireless payments through NFC.
  • 36. Finger Print Scanner • It is simple • uses a unique design • Much safer than the face recognition • Partial and complete recognition of the finger print • Safe place to store the data • Can carry along where ever you go • But not hack free • Sensors inaccurate to detect a finger or differentiate from an animal • Good for making authentication for the payments.
  • 38. USB Tokenisation • A single usb key • No passwords • Connect the USB • Incorruptible Data ROM storage. • Best used in offices, for authentication.
  • 40. iris recognition system. • the most secure in the world • error rate is high • requires very good sensors • Used for very high security measures in the military • mass usage still in testing • Checking for the possibilities for the daily usage. • inconvenient for almost daily usage.