Web Security
Secure yourself on the web
What is Web Security?
• Almost everything relies on computers and
the Internet now:
• - Communication (email, cell phones)
• - Transportation (car engine systems, airplane
navigation)
• - Medicine (equipment, medical records)
• - Shopping (online stores, credit cards)
• - Entertainment (digital cable, MP3s)
Web Security (Contd...)
• Web Security, also known as 'Cybersecurity',
involves protecting information by preventing,
detecting, and responding to attacks.
What can Web users do?
• The first step in protecting yourself is to
recognize the risks and become familiar with
some of the terminology associated with
them.
Web Security: Terminologies
• Hacker: People who exploit weaknesses in
software and computer systems for personal
gain.
• Virus: Requires user action before infecting
your computer.
• Worm: Propagates without user intervention,
infecting other computers.
Web Security: Terminologies
(Contd...)
• Trojan Horse: Software that claims to be
something legitimate but does something
malicious.
• Ransomware: Encrypts files and demands
payment for decryption.
Keyloggers
• Keyloggers monitor and record user activity
such as keystrokes and mouse clicks.
• They can also take screenshots and track
movements on the screen.
Keylogger Prevention
• Use Anti-Spyware, firewalls, and automatic
form fillers.
• In public places, use on-screen keyboards to
avoid keylogging.
Firewalls
• Firewalls help regulate content and block
unwanted traffic.
Aspects of Data Security
• - Privacy: Keeping your information private.
• - Integrity: Ensuring information is not
changed.
• - Authenticity: Verifying the sender's identity.
Privacy
• Your personal details are valuable assets.
Businesses use data to target individuals more
effectively.
Integrity
• Maintaining data integrity is vital. Strong
encryption helps ensure that even if
intercepted, data is useless.
Authentication
• Digital signatures and Public/Private key
methods can authenticate message senders.
Authentication Example
• Most of us use webmail. PHP code can be
used to send email from a spoofed address.
Malicious Websites
• Preventive measures include using the latest
browser software, such as Internet Explorer
7+, Mozilla Firefox, or Opera.
SPAM
• SPAM is unsolicited email. Detection methods
include whitelisting, blacklisting, and
algorithm training.
419 Nigerian Scams
• Advance fee fraud scams involve users sending
money in hopes of receiving a larger prize.
Nigerian scammers will urge you to pay a
entry fee or tax something like that to receive
a large amount of fund you won in a lottery or
giveaway
Phishing
• Phishing involves tricking users into providing
their login details by imitating legitimate
websites.
Instead of Instagram.com they will use a a
different font which might look as same as the
alphabet g so when we look at the site
without suspicion we wont notice it and enter
our credentials
Denial of Service (DoS)
• A DoS attack aims to make a computer
resource unavailable. Distributed DoS (DDoS)
uses many computers to launch attacks.
Botnets
• Botnets are networks of compromised
computers controlled remotely for various
purposes, such as spam or DDoS attacks.
Botnet Case Study - STORM
BOTNET
• The Storm botnet used a Trojan horse spread
through email spam and compromised up to 1
million systems.
Further Action
• Take additional steps to protect yourself from
web security threats:
• - www.419eater.com
• - www.antiphishing.org
Botnet Attacks - Example 1
• Example: Cyber Assault on Estonia (May 2007)
• More than 1 million zombie computers were
used in a massive DDoS attack that shut down
email systems and online banking.
Botnet Attacks - Example 2
• Example: SlideShare DDoS Attack (April 2008)
• Attackers from China targeted SlideShare after
it hosted presentations related to corruption
in the Chinese government, causing the site to
go down for days.
Conclusion - Botnet Attacks
• Both examples illustrate the use of botnets as
attack vehicles in cyber warfare.
• Preventive measures include keeping systems
updated and avoiding malicious links.
Action Plan
• To avoid web security threats:
• - Use antivirus and anti-spyware tools
• - Be aware of scams and phishing attacks
• - Report SPAM
Closing Remarks
• Securing yourself on the web is a shared
responsibility. By staying informed and taking
action, we can mitigate the risks posed by
hackers, malware, and other threats.