By : Praveen Tiwari.  It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking.

Slides:



Advertisements
Similar presentations
Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
Advertisements

Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
FM Transmitter (Carvox) Discover the freedom of sending a wireless broadcast of any audio to any FM radio anywhere in your car !!! Wireless.
Csc333 Data communication & Networking Credit: 2.
Server-Side vs. Client-Side Scripting Languages
Spread Spectrum Input is fed into a channel encoder
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Nasca Internet Networking and Security viruses.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Unit 4.4 We are HTML Editors
Wireless & Mobile Networking: Multiple Division Techniques
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
Lesson 8 DATA EXCHANGE. Transmission Modes Type 1 - Simplex  Simplex transmission: sends data in one direction only. A radio broadcast is a good example.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Build a Free Website1 Build A Website For Free 2 ND Edition By Mark Bell.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Business Computing 550 Lesson 2. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Computer Security By Duncan Hall.
1 Spread Spectrum Technology. 2 What is Spread Spectrum(SS) Spread Spectrum (SS) technology was first introduced by military as a way of sending secure.
THE INTERNET WHAT IS IT? WHERE IS IT? HOW DOES IT WORK? TIGER WU / KEVIN PARKS.
The Online World DATA EXCHANGE 2. Introduction Devices on a network use a variety of methods to communicate with each other and to transmit data. This.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Adapted from  2004 Prentice Hall, Inc. All rights reserved. Clickjacking.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Wireless LAN Technology Chapter 13. Wireless LAN  Wireless LAN is one that make use of a wireless transmission medium.  Wireless LAN use infrared or.
Open Solutions for a Changing World™ Eddy Kleinjan Copyright 2005, Data Access WordwideNew Techniques for Building Web Applications June 6-9, 2005 Key.
NETWORK AND COMMUNICATIONS
BUILD SECURE PRODUCTS AND SERVICES
Security of Digital Signatures
The University of Adelaide, School of Computer Science
Instructor Materials Chapter 6 Building a Home Network
Section 6.3 Server-side Scripting
Remember that our latest topics involve a more advanced look at how webpages work
Instructor Materials Chapter 1 Ever Wonder How It Works?
Wireless LANs Wireless proliferating rapidly.
Channel Control Interim substates for adding new slaves
Security Issues.
STEGANOGRAPHY.
Telecommunications and Networking
Digital Communications
Cyber Security By: Pratik Gandhi.
Network and the internet
Wireless & Mobile Networking: Multiple Division Techniques
BTEC NCF Dip in Comp - Unit 15 Website Development Lesson 05 – Website Performance Mr C Johnston.
PROJECT ON WEB DESIGNING BY – POOJA SINGH CSE. WEB DESIGNING Web design Web design is a similar process of creation, with the intention of presenting.
Protect crypto exchange website from hackers
Packet Sniffing.
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Ethernet First network to provide CSMA/CD
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Network Models, Hardware, Protocols and number systems
Bluetooth.
Denial-of-Service Jammer Detector Training Course Worldsensing
Which of the following is a digital communications mode?
PHP Forms and Databases.
Emilia Nisha D’souza [ ]
Security in Wide Area Networks
PLTW Terms PLTW Vocabulary Set #10.
Presentation transcript:

By : Praveen Tiwari

 It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking on.  This may result in revealing confidential information or taking control of user’s computer.

 A click jack takes the form of embeded code or a script that can execute without the user’s knowledge. Such as clicking a button.  On a click jacked page, the attackers load another page which is hidden, and when user clicks on it an action is performed.

 No script add-on can be added to mozilla & mobile. It prevents users from clicking on invisible or redressed page elements of embeded docs.  GuardedID is a client side click jacking protection for user of internet explorer and mozilla.  Frame killer is a server side tool which a website owner can include to prevent their user from click jacked.

 Car whisperer is a software tool developed by european security researchers that exploits a key implementation issue in hands free bluetooth in cars.  It allows an attacker to send or receive audio from car kit.

 Car whisper merely waits sending out pings for bluetooth devices.  When one comes into range it negotiates a connection, wherein car whisperer passes the predicted pass key and start the attack.

 Channel hopping is a method to send radio signals in wideband systems by rapidly switching carrier among many frequency channels.  A pseudorandom sequence known to both transmitter and receiver is used so the intended receiver can listen to correct channel.

 It makes radio transmission more secure.  It makes efficient use of radio spectrum by allowing many more users per bandwidth.  It increases data rates and has positive effects on power requirement to broadcast a signal.