SlideShare a Scribd company logo
INTRUSION
By Eduardo Cambinda 2007
Introduction
• Intrusion is someone who goes into a place or
situation where he is not expected to be, in
simple words is someone unwanted: someone
is in not invited to partying but apear in party
Intrusion in Computing
• In this century computer is used everywhere in
our life, for writing, chatting, partying, selfing,
working etc. and attacks are more sophisticated
everywhere to collect data or just to intrude in
corporate Networks, to exploit weaknesses into
the Network system like websites, e-mail, and
with app that can run any system anytime
anywhere.
Data Security
• Data Security is Related to protect digital privacy
to prevent unauthorised access to computers,
database, websites, data corruption etc. Thera
are many securities policies established on
needed level, some organisation like ISO that
ensuring that information is accessed only to
those authorised to have access.
Data Security
• This graphic represent a communication process from
source to destination without any attacks, I will share the
four types of Attacks in this presentation: Interruption;
Interception; Modification and fabrication. All attacks
depend how quickly you can run, if you can run in 120mbps
than you are basically fit, if u can run as an intrusion more
than that so you are luck.
Source Destination
DATA SECURITY
Interruption
• Interruption is a state where the access be
unavailable or get destroyed, like you wanna
travel you have your tickets booked but you
reach the airport there is no plane to travel
basically that, cutting the signal.
source DESTINATION
Data Security
Modification
SOURCE
DESTINATION
DATA SECURITY
MODIFICATION
• In Modification information is intercepted and
modified by an unauthorised party while in
transit from the source to the destination
DATA SECURITY
FABRICATION
SOURCE DESTINATION
Data Security
Fabrication
• Fabrication is process of inventing something , it occur when an attackers
inserts into the systems without the sender’s involvement there are two
categories of fabrication Replaying and Masquerading
• Replaying is intercept the message insert new style and authenticate it
• Masquerading when an attacker clam to be legitimate source or owner adding
new records to information
Data Security
• In data security there are some aspects we should
take care of proprieties:
• Confidentiality
• Integrity
• Availability
• Authentication
• Non-repudiation
Data security
• Confidentiality is keeping data private or secret, that only
accessible to the authorised Dudes, like the source, destination,
timing of the communication and data.
• Integrity is the quality of data, it can't be altered or destroyed by
an unauthorised Dude, it is a security principle that protects
information from being modified.
• Availability is the way the data is able to used or obtained.
• Authentication is the security measured or a process to prove
that something is true.
• Non-Repudiation is the assurance that a contract you sign cant
be denied by any of the parts involved
SECURITY MECHANISM
• We discussed about security Proprieties core of
quality for any data system, various securities
tools and mechanism can be used to force the
securities proprieties are:
• Attack Prevention
• Attack Avoidance
• Attack Detection
SECURITY MECHANISM
Attack Prevention
• Attack Prevention, a cyber attack is an attack made from one computer to
another targeting information stored in it, is a part of cyber crime, Attack
prevention can be defined as a series of securities mechanisms implemented to
prevent or defend against various kid of attack before they occurs to affect the
target systems, access control includes authentication, authorisation and audit
• Attack Avoidance is the way in which information is modified in the way that
make unusable of the attack, cryptography is one of the technology used in
attack avoidance SKC, PKC. HC
• Attack Detection is the assume that the attacker is able to bypass the installed
security system to find the target desire. That something went wrong and
identify the problem
• Intrusion Detection is the way you located a dude having a fun in your system
creating malicious some tools to detect and report malicious in your network
system
ATTACK
• An Attack The way computer security tools is
challenged creating a negative impact in
information system.
Attack
treat
Target
VULNERABILITY
ATTACK MODELS
• There are many models but some Dudes they
divide it in two:
• Traditional Attack model: one-to-one attack
model, one-to-many attack model.
• Distributed Attack Model: many-to-one attack
model, many-to-many attack model
ATTACK MODEL
• Traditional Attack model is originates from a
single point, it is a single architecture there is a
single layer between target and attacker.
• One-To-One Attack model is like a single
relationship from attacker to target from a single
machine
• One-to-Many it is relation is from one to many
Attack Target
Attack Models
• It originate from a single machine to more than one target
• Distributed Attack models this is based on many to one
and many to many relationship, its originated from
intermediate that are compromised by attacker
• Many-to-one the attacker and target have many to one
relationship, many dude contacted to attack one target
• Many-to-Many the attacker and target have many to many
relationship, the attacker use many host for his duties,
the attacker compromise the system installing backdoor
and tools for his fun
IDS AND IPS
• IDS stand for interaction detection System are
software and hardware based system that detect
intrusion to network-based intrusion
detection(NIDS), host-based intrusion detection
System(HIDS), Hybrid Intrusion detection
system(HIDS) on a number of telltale sign
• IPS intrusion prevention system, all corporate are
protected by firewall those firewall allow some
traffic like web traffic to an internal web server
TYPES OF COMPUTER
INTRUSION
• INTRUDERS
• BLACK HAT HACKER
• HACKER SPIES SUPPORTED BY GOVERNMENT
• CYBERTERRORISTS
• CORPORATED SPIES
• PROFISSIONALS CRIMINALS
• VANDALS
• ETC….
QUICK BYTE
• bit defender process…..
• analyser Linux based bits
• tcp run
• bits defects intruders

More Related Content

What's hot (20)

PPTX
CYBER SECURITY
Ashish prashar
 
PPTX
cyber_security
Jana Baxter
 
PPSX
Wireless Network Security
Gyana Ranjana
 
PPTX
Network Security ppt
SAIKAT BISWAS
 
PPTX
Ransomware by lokesh
Lokesh Bysani
 
PPTX
Cyber Security Best Practices
Evolve IP
 
PPTX
Phishing
SouganthikaSankaresw
 
PPTX
Types of cyber attacks
krishh sivakrishna
 
PPTX
Computer security threats & prevention
PriSim
 
PPT
Wannacry
Gunther Clauwaert
 
PPT
IT Security Awareness-v1.7.ppt
OoXair
 
PPT
Malicious software
msdeepika
 
PPTX
Module 18 investigating web attacks
sagaroceanic11
 
PPTX
Security Awareness Training.pptx
MohammedYaseen638128
 
PPTX
Computer forensics
Ramesh Ogania
 
PPTX
Cybercrime and Security
Noushad Hasan
 
PPTX
Cyber security
Manjushree Mashal
 
PPTX
Types of attacks
Vivek Gandhi
 
PPTX
Information security awareness - 101
mateenzero
 
PPTX
ICT and end user security awareness slides
jubke
 
CYBER SECURITY
Ashish prashar
 
cyber_security
Jana Baxter
 
Wireless Network Security
Gyana Ranjana
 
Network Security ppt
SAIKAT BISWAS
 
Ransomware by lokesh
Lokesh Bysani
 
Cyber Security Best Practices
Evolve IP
 
Types of cyber attacks
krishh sivakrishna
 
Computer security threats & prevention
PriSim
 
IT Security Awareness-v1.7.ppt
OoXair
 
Malicious software
msdeepika
 
Module 18 investigating web attacks
sagaroceanic11
 
Security Awareness Training.pptx
MohammedYaseen638128
 
Computer forensics
Ramesh Ogania
 
Cybercrime and Security
Noushad Hasan
 
Cyber security
Manjushree Mashal
 
Types of attacks
Vivek Gandhi
 
Information security awareness - 101
mateenzero
 
ICT and end user security awareness slides
jubke
 

Viewers also liked (20)

DOC
Teaching Statistics Without Mathematics An Innovation Approach to Public Adm...
Dr. Michael W. Popejoy, MBA, Ph.D., M.P.H., M.S., FRSPH
 
PPTX
Big data
Mani Gandan
 
PDF
Top Companies for Graduates to Work For - 2015-16
Hazel Morton
 
PPTX
Think kidneys in primary and secondary care
Renal Association
 
DOCX
Table s1
Vignesh Subramanian
 
PPTX
slideshare y sildeboom
Michelle Santos
 
PPTX
Deporte, ejercicio y estilos de vida
Gabrielcano92
 
PDF
Proceedings boston 2013
Yogurt in Nutrition #YINI
 
PPTX
RSM AKI September 2015
Renal Association
 
DOC
News SA 10 2017
Roberta Culiersi
 
PPTX
Network Security July 1
Jd Mercado
 
PPTX
Open Source Software Concepts
JITENDRA LENKA
 
PDF
Collapse of angolan banking system copy
Eduardo Cambinda
 
PPTX
Cyberpunk
hidralisko
 
PDF
Yii Framework Security
Ilko Kacharov
 
PPTX
Informatics Practices Chapter 2 Open Source Software Concepts Class 12th
Harsh Mathur
 
DOC
K-Sheldon-WA_text.Doc
Konie Sheldon
 
PPTX
CyberPunk
Fabio Silva
 
Teaching Statistics Without Mathematics An Innovation Approach to Public Adm...
Dr. Michael W. Popejoy, MBA, Ph.D., M.P.H., M.S., FRSPH
 
Big data
Mani Gandan
 
Top Companies for Graduates to Work For - 2015-16
Hazel Morton
 
Think kidneys in primary and secondary care
Renal Association
 
slideshare y sildeboom
Michelle Santos
 
Deporte, ejercicio y estilos de vida
Gabrielcano92
 
Proceedings boston 2013
Yogurt in Nutrition #YINI
 
RSM AKI September 2015
Renal Association
 
News SA 10 2017
Roberta Culiersi
 
Network Security July 1
Jd Mercado
 
Open Source Software Concepts
JITENDRA LENKA
 
Collapse of angolan banking system copy
Eduardo Cambinda
 
Cyberpunk
hidralisko
 
Yii Framework Security
Ilko Kacharov
 
Informatics Practices Chapter 2 Open Source Software Concepts Class 12th
Harsh Mathur
 
K-Sheldon-WA_text.Doc
Konie Sheldon
 
CyberPunk
Fabio Silva
 
Ad

Similar to Intrusion in computing (20)

PPTX
Computer security concepts
Prachi Gulihar
 
PPTX
informations_security_presentations.pptx
FAKHARZAMANPROUD
 
PPTX
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
PPT
2.4.1 - Intro to Cyber Security for students.ppt
rameshselvarajkkp
 
PPTX
Data security
Soumen Mondal
 
PPTX
Network Security & Ethical Hacking
Sripati Mahapatra
 
PPTX
Access Control - Week 4
jemtallon
 
PPTX
Unit 1-NETWORK Security.pptx............
r47381047
 
PPTX
Cyber Security PPT.pptx
MBRoman1
 
PPTX
IT.pptx
RaaviKapoor
 
PPTX
Week 1 - Introduction to CyberSecurity.pptx
juancx3
 
PPTX
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 
PPTX
Cyber Security PPT.pptx
56ushodayareddy
 
PPTX
Module1 PP5t3g5g5yg5ygh5tgh5g56gh5g5gT.pptx
ThanushB1
 
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222
 
PPTX
Dos unit 5
JebasheelaSJ
 
PPT
Data+security+sp10
ismaelhaider
 
PPTX
Data Network Security
Atif Rehmat
 
PPTX
Unit 1
KRAMANJANEYULU1
 
Computer security concepts
Prachi Gulihar
 
informations_security_presentations.pptx
FAKHARZAMANPROUD
 
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
2.4.1 - Intro to Cyber Security for students.ppt
rameshselvarajkkp
 
Data security
Soumen Mondal
 
Network Security & Ethical Hacking
Sripati Mahapatra
 
Access Control - Week 4
jemtallon
 
Unit 1-NETWORK Security.pptx............
r47381047
 
Cyber Security PPT.pptx
MBRoman1
 
IT.pptx
RaaviKapoor
 
Week 1 - Introduction to CyberSecurity.pptx
juancx3
 
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 
Cyber Security PPT.pptx
56ushodayareddy
 
Module1 PP5t3g5g5yg5ygh5tgh5g56gh5g5gT.pptx
ThanushB1
 
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222
 
Dos unit 5
JebasheelaSJ
 
Data+security+sp10
ismaelhaider
 
Data Network Security
Atif Rehmat
 
Ad

More from Eduardo Cambinda (7)

PDF
How to check out your paper
Eduardo Cambinda
 
PDF
Proposta:resumo para o ministerio da industria
Eduardo Cambinda
 
PDF
Social Media
Eduardo Cambinda
 
PDF
Internship report copy
Eduardo Cambinda
 
PDF
Social media copy
Eduardo Cambinda
 
PPT
Network client configuration
Eduardo Cambinda
 
PDF
CASE STUDY
Eduardo Cambinda
 
How to check out your paper
Eduardo Cambinda
 
Proposta:resumo para o ministerio da industria
Eduardo Cambinda
 
Social Media
Eduardo Cambinda
 
Internship report copy
Eduardo Cambinda
 
Social media copy
Eduardo Cambinda
 
Network client configuration
Eduardo Cambinda
 
CASE STUDY
Eduardo Cambinda
 

Recently uploaded (20)

PPTX
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
PPTX
internet básico presentacion es una red global
70965857
 
PPTX
法国巴黎第二大学本科毕业证{Paris 2学费发票Paris 2成绩单}办理方法
Taqyea
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PPTX
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
PDF
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPTX
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
PPTX
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
PPTX
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
PPT
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPTX
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
PPTX
Orchestrating things in Angular application
Peter Abraham
 
PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
Optimization_Techniques_ML_Presentation.pptx
farispalayi
 
internet básico presentacion es una red global
70965857
 
法国巴黎第二大学本科毕业证{Paris 2学费发票Paris 2成绩单}办理方法
Taqyea
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PM200.pptxghjgfhjghjghjghjghjghjghjghjghjghj
breadpaan921
 
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
Computer Securityyyyyyyy - Chapter 2.ppt
SolomonSB
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
sajflsajfljsdfljslfjslfsdfas;fdsfksadfjlsdflkjslgfs;lfjlsajfl;sajfasfd.pptx
theknightme
 
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
unit 2_2 copy right fdrgfdgfai and sm.pptx
nepmithibai2024
 
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
Orchestrating things in Angular application
Peter Abraham
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 

Intrusion in computing

  • 2. Introduction • Intrusion is someone who goes into a place or situation where he is not expected to be, in simple words is someone unwanted: someone is in not invited to partying but apear in party
  • 3. Intrusion in Computing • In this century computer is used everywhere in our life, for writing, chatting, partying, selfing, working etc. and attacks are more sophisticated everywhere to collect data or just to intrude in corporate Networks, to exploit weaknesses into the Network system like websites, e-mail, and with app that can run any system anytime anywhere.
  • 4. Data Security • Data Security is Related to protect digital privacy to prevent unauthorised access to computers, database, websites, data corruption etc. Thera are many securities policies established on needed level, some organisation like ISO that ensuring that information is accessed only to those authorised to have access.
  • 5. Data Security • This graphic represent a communication process from source to destination without any attacks, I will share the four types of Attacks in this presentation: Interruption; Interception; Modification and fabrication. All attacks depend how quickly you can run, if you can run in 120mbps than you are basically fit, if u can run as an intrusion more than that so you are luck. Source Destination
  • 6. DATA SECURITY Interruption • Interruption is a state where the access be unavailable or get destroyed, like you wanna travel you have your tickets booked but you reach the airport there is no plane to travel basically that, cutting the signal. source DESTINATION
  • 8. DATA SECURITY MODIFICATION • In Modification information is intercepted and modified by an unauthorised party while in transit from the source to the destination
  • 10. Data Security Fabrication • Fabrication is process of inventing something , it occur when an attackers inserts into the systems without the sender’s involvement there are two categories of fabrication Replaying and Masquerading • Replaying is intercept the message insert new style and authenticate it • Masquerading when an attacker clam to be legitimate source or owner adding new records to information
  • 11. Data Security • In data security there are some aspects we should take care of proprieties: • Confidentiality • Integrity • Availability • Authentication • Non-repudiation
  • 12. Data security • Confidentiality is keeping data private or secret, that only accessible to the authorised Dudes, like the source, destination, timing of the communication and data. • Integrity is the quality of data, it can't be altered or destroyed by an unauthorised Dude, it is a security principle that protects information from being modified. • Availability is the way the data is able to used or obtained. • Authentication is the security measured or a process to prove that something is true. • Non-Repudiation is the assurance that a contract you sign cant be denied by any of the parts involved
  • 13. SECURITY MECHANISM • We discussed about security Proprieties core of quality for any data system, various securities tools and mechanism can be used to force the securities proprieties are: • Attack Prevention • Attack Avoidance • Attack Detection
  • 14. SECURITY MECHANISM Attack Prevention • Attack Prevention, a cyber attack is an attack made from one computer to another targeting information stored in it, is a part of cyber crime, Attack prevention can be defined as a series of securities mechanisms implemented to prevent or defend against various kid of attack before they occurs to affect the target systems, access control includes authentication, authorisation and audit • Attack Avoidance is the way in which information is modified in the way that make unusable of the attack, cryptography is one of the technology used in attack avoidance SKC, PKC. HC • Attack Detection is the assume that the attacker is able to bypass the installed security system to find the target desire. That something went wrong and identify the problem • Intrusion Detection is the way you located a dude having a fun in your system creating malicious some tools to detect and report malicious in your network system
  • 15. ATTACK • An Attack The way computer security tools is challenged creating a negative impact in information system. Attack treat Target VULNERABILITY
  • 16. ATTACK MODELS • There are many models but some Dudes they divide it in two: • Traditional Attack model: one-to-one attack model, one-to-many attack model. • Distributed Attack Model: many-to-one attack model, many-to-many attack model
  • 17. ATTACK MODEL • Traditional Attack model is originates from a single point, it is a single architecture there is a single layer between target and attacker. • One-To-One Attack model is like a single relationship from attacker to target from a single machine • One-to-Many it is relation is from one to many Attack Target
  • 18. Attack Models • It originate from a single machine to more than one target • Distributed Attack models this is based on many to one and many to many relationship, its originated from intermediate that are compromised by attacker • Many-to-one the attacker and target have many to one relationship, many dude contacted to attack one target • Many-to-Many the attacker and target have many to many relationship, the attacker use many host for his duties, the attacker compromise the system installing backdoor and tools for his fun
  • 19. IDS AND IPS • IDS stand for interaction detection System are software and hardware based system that detect intrusion to network-based intrusion detection(NIDS), host-based intrusion detection System(HIDS), Hybrid Intrusion detection system(HIDS) on a number of telltale sign • IPS intrusion prevention system, all corporate are protected by firewall those firewall allow some traffic like web traffic to an internal web server
  • 20. TYPES OF COMPUTER INTRUSION • INTRUDERS • BLACK HAT HACKER • HACKER SPIES SUPPORTED BY GOVERNMENT • CYBERTERRORISTS • CORPORATED SPIES • PROFISSIONALS CRIMINALS • VANDALS • ETC….
  • 21. QUICK BYTE • bit defender process….. • analyser Linux based bits • tcp run • bits defects intruders