SlideShare a Scribd company logo
1 of 22
INFORMATION & COMPUTER
SECURITY
Basic Practices for
1
CONTENTS
• What is a Threat and a Vulnerability
• Types of Threats
• What is Social Engineering
• Types of Social Engineering
• Information & Computer safety practices
• Quick Tips
• Q&A
2
VULNERABILITY
• “A vulnerability is a flaw or weakness in the system”
• It is loophole in the system’s design, implementation, operation and management
that can be exploited or misused to violet system’s security policy.
3
THREATS
• Threat is a possible danger that might exploit a vulnerability to breach security and
thus cause possible harm.
• Threat can be intentional or accidental.
• An intentional threat can be caused by some criminal organization or community of
unethical hackers.
• An accidental threat can be caused by occurrence of natural disasters such as
earthquakes, fire, tornado.
4
TYPES OF THREATS
• VIRUS
• WORM
• TROJANS
• SPYWARE
• ADWARE
• SPAM/SPIT/SPIM
• SYSTEM ATTACKS
5
• Virus is piece of software that can infect a computer without the permission or
knowledge of the user.
• A typical virus is sent as an attachment which may be hidden.
• It is transmitted over internet or network or through sharing of external portable
devices, removable media such as USB sticks and CDs.
• Worm a self replicating, malicious software program. It uses network to send
copies of itself to other computers on the network.
• Trojan/Trojan horse is nothing but an illegitimate program inside legitimate
program. It creates a secret way for hackers to enter in to your system by installing
backdoor programs.
6
• Spyware is software that is secretly installed on a computer without the user’s
consent. It monitors user activity or interferes with user control over a personal
computer.
• Adware is software which automatically plays, displays, or downloads
advertisements to a computer.
• The adware runs either after a software program has been installed on a computer
or while the application is being used.
• In some cases, adware is accepted by users in exchange for using software free-of-
charge.
• Not all adware types are dangerous. However, some types of adware are also
spyware and therefore a threat to privacy.
7
• SPAM is electronic junk email. The amount of spam has now reached 90 billion
messages a day. Email addresses are collected from chat rooms, websites,
newsgroups and by Trojans which harvest users’ address books.
• Don’t click on SPAM mails, directly delete them.
• SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN
Messenger and ICQ.
• SPIT is Spam over Internet Telephony. These are unwanted, automatically-
dialled, pre-recorded phone calls using Voice over Internet Protocol (VoIP).
• SYSTEM ATTACKS includes various types of attacks intended to destroy, steal or
misuse information over internet or networks.
• Various types includes BOTNET, DOS, DDos attacks, Flooding attacks, Buffer
attacks, TCP-IP attacks etc…
8
SOCIAL ENGINEERING
• “Social Engineering” is a psychological manipulation of people in order to gather
confidential information.
• This is a purposeful act carried out either to misuse someone’s personal information
to cause fraud or gain system access.
9
TYPES OF SOCIAL ENGINEERING
EAVESDROPPING
• “Eavesdropping is a secretly listening to a private conversation of others without
their consent.”
• This is commonly unethical practice.
10
TYPES OF SOCIAL ENGINEERING
SHOULDER SURFING
• “Shoulder surfing refers to using direct observation techniques such as looking over
someone’s shoulder to get information.”
• It is commonly used to obtain passwords, PINs, security codes and similar types of
data.
11
TYPES OF SOCIAL ENGINEERING
PHISHING
• Phishing (pronounced “fishing”) is a common form of bluffing in which a fake web
page is produced that looks just like a legitimate web page.
• The fake page is on a server under the control of the attacks.
• Below is the example of phishing.
12
TYPES OF SOCIAL ENGINEERING
SPOOFING
• “Spoofing is another type of bluffing where some person or program masquerades as
another.”
• Caller-Id spoofing, email id spoofing, IP address spoofing are commonly happening
spoofing incidences in real world.
13
TYPES OF SOCIAL ENGINEERING
PHARMING
• “Pharming is advance type of social engineering where without conscious of the
innocent user the data is stolen.”
• In this type, the authenticated website’s traffic is diverted to some compromised
website by hacker.
• pharming.gif
14
INFORMATION & COMPUTER SAFETY
PRACTICES
15
PASSWORD PROTECTION
• Always secure your desktop with passwords.
• Employ strong password policies.
• Password should be alphanumeric and it should be more than 8 characters.
• Password should not include your personal information.
• Avoid saving your passwords and sensitive information such as credit card numbers,
policy numbers, bank account information on your computer or mobile.
16
HIDE CONFIDENTIAL FILES ON DISK
• You can secure your confidential files on desktop by hiding files on your computer.
• To hide files on your windows desktop:
• Control Panel  Folder Options  View  Don’t show hidden files.
• To unhide file on your windows desktop:
• Control Panel  Folder Options  View  show hidden files.
17
TURN ON SYSTEM FIREWALL
• A Firewall is software or hardware that checks information coming from the
Internet or a network.
• It either blocks or allows that information to pass through to your computer
depending upon your firewall settings.
• Active firewall helps to prevent hackers from gaining access to your computer
through network or internet.
• To turn on firewall:
• Control Panel  Windows Firewall  Click on Turn windows firewall on/off
18
INSTALL SAFETY SOFTWARE PROGRAMS
• Secure browsing tools:
Ccleaner, AntiVirus Programs, Nessus
• Data safety Tools:
Folder Locker, True Crypt, SafeHouse Explorer, BitLocker
19
DATA BACKUP
• ‘Backup’ refers to the copying and archiving of computer data so it may be used
to restore the original after a data loss event.
• Our data may include important and confidential files such as files from the
workplace, presentations, work materials etc…
• As there are innumerable possibilities of data getting lost, taking a regular backup
of your data is the safety practices for the computer users.
• Take a backup in external portable devices and protect it with passwords.
20
QUICK TIPS
• Avoid sharing personal details such as email-Id, passwords, Bank account
information on telephone.
• Use Recognized Instant Messengers (IM). Don’t use just any.
• Don’t click on SPAM mails, directly delete them.
• Regularly scan computer and external portable devices for viruses.
• Turn off the file sharing when your are working in the network.
• Always check a website name in the browser before entering your private
information.
• Always sign-out from your account when you are working in the internet café.
• Protect your computer and its hard-disk with password.
• Always seek guidance from expert incase of doubt.
21
THANK YOU
For any queries please contact me on below id:
ddprajkta@gmail.com
Prajkta G Nagapurkar
+91-8690130987
22

More Related Content

What's hot

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Security Basics
Security BasicsSecurity Basics
Security BasicsRishi Prasath
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer security
Computer securityComputer security
Computer securityShashi Chandra
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Information security
Information securityInformation security
Information security
 
Computer security
Computer securityComputer security
Computer security
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 

Viewers also liked

Consumer Packaged Goods (CPG) - The New Consumer Shopping Journey
Consumer Packaged Goods (CPG) - The New Consumer Shopping JourneyConsumer Packaged Goods (CPG) - The New Consumer Shopping Journey
Consumer Packaged Goods (CPG) - The New Consumer Shopping JourneyLaunchfire
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation BlueChipICT
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Security Awareness
Security Awareness Security Awareness
Security Awareness Dedi Dwianto
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Software
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardMohammad Golyani
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 

Viewers also liked (20)

Consumer Packaged Goods (CPG) - The New Consumer Shopping Journey
Consumer Packaged Goods (CPG) - The New Consumer Shopping JourneyConsumer Packaged Goods (CPG) - The New Consumer Shopping Journey
Consumer Packaged Goods (CPG) - The New Consumer Shopping Journey
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Veeam back up and replication presentation
Veeam back up and replication presentation Veeam back up and replication presentation
Veeam back up and replication presentation
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness
Security Awareness Security Awareness
Security Awareness
 
Data destruction policy
Data destruction policyData destruction policy
Data destruction policy
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Veeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and TricksVeeam Backup & Replication Tips and Tricks
Veeam Backup & Replication Tips and Tricks
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
DES
DESDES
DES
 
Information security management
Information security managementInformation security management
Information security management
 
Incident Management
Incident ManagementIncident Management
Incident Management
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 

Similar to Basic practices for information & computer security

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimeskaranjohar
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 

Similar to Basic practices for information & computer security (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Basic practices for information & computer security

  • 2. CONTENTS • What is a Threat and a Vulnerability • Types of Threats • What is Social Engineering • Types of Social Engineering • Information & Computer safety practices • Quick Tips • Q&A 2
  • 3. VULNERABILITY • “A vulnerability is a flaw or weakness in the system” • It is loophole in the system’s design, implementation, operation and management that can be exploited or misused to violet system’s security policy. 3
  • 4. THREATS • Threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm. • Threat can be intentional or accidental. • An intentional threat can be caused by some criminal organization or community of unethical hackers. • An accidental threat can be caused by occurrence of natural disasters such as earthquakes, fire, tornado. 4
  • 5. TYPES OF THREATS • VIRUS • WORM • TROJANS • SPYWARE • ADWARE • SPAM/SPIT/SPIM • SYSTEM ATTACKS 5
  • 6. • Virus is piece of software that can infect a computer without the permission or knowledge of the user. • A typical virus is sent as an attachment which may be hidden. • It is transmitted over internet or network or through sharing of external portable devices, removable media such as USB sticks and CDs. • Worm a self replicating, malicious software program. It uses network to send copies of itself to other computers on the network. • Trojan/Trojan horse is nothing but an illegitimate program inside legitimate program. It creates a secret way for hackers to enter in to your system by installing backdoor programs. 6
  • 7. • Spyware is software that is secretly installed on a computer without the user’s consent. It monitors user activity or interferes with user control over a personal computer. • Adware is software which automatically plays, displays, or downloads advertisements to a computer. • The adware runs either after a software program has been installed on a computer or while the application is being used. • In some cases, adware is accepted by users in exchange for using software free-of- charge. • Not all adware types are dangerous. However, some types of adware are also spyware and therefore a threat to privacy. 7
  • 8. • SPAM is electronic junk email. The amount of spam has now reached 90 billion messages a day. Email addresses are collected from chat rooms, websites, newsgroups and by Trojans which harvest users’ address books. • Don’t click on SPAM mails, directly delete them. • SPIM is spam sent via instant messaging systems such as Yahoo! Messenger, MSN Messenger and ICQ. • SPIT is Spam over Internet Telephony. These are unwanted, automatically- dialled, pre-recorded phone calls using Voice over Internet Protocol (VoIP). • SYSTEM ATTACKS includes various types of attacks intended to destroy, steal or misuse information over internet or networks. • Various types includes BOTNET, DOS, DDos attacks, Flooding attacks, Buffer attacks, TCP-IP attacks etc… 8
  • 9. SOCIAL ENGINEERING • “Social Engineering” is a psychological manipulation of people in order to gather confidential information. • This is a purposeful act carried out either to misuse someone’s personal information to cause fraud or gain system access. 9
  • 10. TYPES OF SOCIAL ENGINEERING EAVESDROPPING • “Eavesdropping is a secretly listening to a private conversation of others without their consent.” • This is commonly unethical practice. 10
  • 11. TYPES OF SOCIAL ENGINEERING SHOULDER SURFING • “Shoulder surfing refers to using direct observation techniques such as looking over someone’s shoulder to get information.” • It is commonly used to obtain passwords, PINs, security codes and similar types of data. 11
  • 12. TYPES OF SOCIAL ENGINEERING PHISHING • Phishing (pronounced “fishing”) is a common form of bluffing in which a fake web page is produced that looks just like a legitimate web page. • The fake page is on a server under the control of the attacks. • Below is the example of phishing. 12
  • 13. TYPES OF SOCIAL ENGINEERING SPOOFING • “Spoofing is another type of bluffing where some person or program masquerades as another.” • Caller-Id spoofing, email id spoofing, IP address spoofing are commonly happening spoofing incidences in real world. 13
  • 14. TYPES OF SOCIAL ENGINEERING PHARMING • “Pharming is advance type of social engineering where without conscious of the innocent user the data is stolen.” • In this type, the authenticated website’s traffic is diverted to some compromised website by hacker. • pharming.gif 14
  • 15. INFORMATION & COMPUTER SAFETY PRACTICES 15
  • 16. PASSWORD PROTECTION • Always secure your desktop with passwords. • Employ strong password policies. • Password should be alphanumeric and it should be more than 8 characters. • Password should not include your personal information. • Avoid saving your passwords and sensitive information such as credit card numbers, policy numbers, bank account information on your computer or mobile. 16
  • 17. HIDE CONFIDENTIAL FILES ON DISK • You can secure your confidential files on desktop by hiding files on your computer. • To hide files on your windows desktop: • Control Panel  Folder Options  View  Don’t show hidden files. • To unhide file on your windows desktop: • Control Panel  Folder Options  View  show hidden files. 17
  • 18. TURN ON SYSTEM FIREWALL • A Firewall is software or hardware that checks information coming from the Internet or a network. • It either blocks or allows that information to pass through to your computer depending upon your firewall settings. • Active firewall helps to prevent hackers from gaining access to your computer through network or internet. • To turn on firewall: • Control Panel  Windows Firewall  Click on Turn windows firewall on/off 18
  • 19. INSTALL SAFETY SOFTWARE PROGRAMS • Secure browsing tools: Ccleaner, AntiVirus Programs, Nessus • Data safety Tools: Folder Locker, True Crypt, SafeHouse Explorer, BitLocker 19
  • 20. DATA BACKUP • ‘Backup’ refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. • Our data may include important and confidential files such as files from the workplace, presentations, work materials etc… • As there are innumerable possibilities of data getting lost, taking a regular backup of your data is the safety practices for the computer users. • Take a backup in external portable devices and protect it with passwords. 20
  • 21. QUICK TIPS • Avoid sharing personal details such as email-Id, passwords, Bank account information on telephone. • Use Recognized Instant Messengers (IM). Don’t use just any. • Don’t click on SPAM mails, directly delete them. • Regularly scan computer and external portable devices for viruses. • Turn off the file sharing when your are working in the network. • Always check a website name in the browser before entering your private information. • Always sign-out from your account when you are working in the internet cafĂŠ. • Protect your computer and its hard-disk with password. • Always seek guidance from expert incase of doubt. 21
  • 22. THANK YOU For any queries please contact me on below id: ddprajkta@gmail.com Prajkta G Nagapurkar +91-8690130987 22