Description
My topic is about cyberwar, I attached the instructions for the presentation, and a simple of the presentation, that my friend did it, so you could get the idea about the design and how it's look, the teacher want a specific style for the presentation called, Pecha kucha style, so that why I upload the simple from my friend, also you could google it, make sure to read the instructions, i want to get the PowerPoint done, and a word file of a note, so I could read through it and explain the presentation.
(20 slides, 20 seconds each)
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Hi, here is the presentation and notes :)
Presentation
It is essentially defined as a network-based attack.
The attacks includes:
✓ online space
✓ networks
It begins at the level of defense and may end up in the world
of attacks and terrorism.
Denial-of-service tools
Exploits
Viruses and worms
Trojans
Can range in extremity
Destroy critical information systems worldwide
Disrupted the information
In the reconnaissance phase, the attack starts.
There is background research needed
Involve the following techniques and tools for finding
information related to targets.
▪
▪
▪
▪
DNS Servers
Email Addresses
Social Media
Port scanning
Attackers can use the data for delivering a malicious payload.
It is mainly done with E-mail address.
Targets may access their Social Media Accounts.
BitTera. C
YTFakeCreator
T2W (Trojan2 Worm)
The attackers engage in the installation process.
The foothold gets created through loading of extra tools.
The attackers pivot from an entry point into another.
❖ How to protect
Configure a strong hardware firewall
Install a good network-based Intrusion Detection System
Employ VPN
Ensure authorized people only
The Visual representation below indicates the channels ADPs.
Utilizing the “Havex” Malware.
Website that is injected with payload
Spear-phishing having malicious attachment
Compromised update server
Backdoors
TCP/IP protocol for transferring files
Web Applications
Have the capacity to use any existing remote
Attackers could then gain access to the operating systems
Have the ability to create false readings
Training
Creating awareness
System Administration
Physical Security and Personal Security
Policy Recommendation
Policy requirement
Backu...