General Awareness On Cyber Security

4,794 views
4,627 views

Published on

This is a presentation that I shared with a group of College students on Cyber Security.

This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.

Published in: Technology
7 Comments
23 Likes
Statistics
Notes
No Downloads
Views
Total views
4,794
On SlideShare
0
From Embeds
0
Number of Embeds
41
Actions
Shares
0
Downloads
0
Comments
7
Likes
23
Embeds 0
No embeds

No notes for slide
  • As part of the Cyber Saft Tamil Nadu – 2009 Event, anchored jointly by NASSCOM, Tamil Nadu Police and DSCI, I presented on this topic to a bunch of college students in Chennai.
  • We would be looking at all of these aspects of Cyber Security.
  • If you browse, email or generally use the Internet, you should be aware of Cyber Security.
  • There could be three kind of Risks - Hacker/Attacker/Intruder – people who try to exploit weaknesses in software and computer systems for their own gain or for some popularity or mischief - Malicious Code – like Viruses or Worms – Any code that could be used to attack your computer - Vulnerability – Due to programming errors / bugs etc.
  • Attachments – Be sure of the source of the email attachment. Scan and then open the attachment. Spam – Activate your spam setting. Check for the ‘real’ source of the email – not just the sender’s name, as shown to you. Don’t bulk email your friends – use Bcc option. Chat & Instant Messaging – Do not meet people whom you got introduced through Chat / IM without verifying their identity. Do not click on suspicious links that you receive through Chat/IM.
  • Limit Personal info on these sites. Ensure that you set appropriate privacy settings. Links and Add ons – Be cautions while clicking on Links or Add ons to the site. Billboard Rule – If you don’t want some information of yours to be on a Billboard, then don’t put it on a Social networking site.
  • https – Secure, encrypted sites. http – not secure.
  • Physical Security – Do not leave your mobile devices lying around. Password Protection – As far as possible, password protect all your mobile devices, including Laptops. USB – Do not plug in a USB drive into your system if you are not sure of its origin. Scan it before accessing the contents. Wireless Security Key – Do not stick to the default key. Set a complex key so that neighbors or others in your vicinity do not access your wireless internet.
  • Phishing attacks - Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. Identity Theft – Stealing your identity fraudulently and using it for the thief's gain.
  • Phishing Email Example
  • Phishing Email Example
  • Phishing Example
  • Phishing Example
  • Phishing Example
  • Nigerian Email Scam
  • Supplementing Passwords – While registering for a web service (email / social networking etc..), you may be asked to answer a security question or use a secondary password. In such cases, share a response/password that is not easy to guess. The most common security question is – “What is your mother’s maiden name?”. While answering such a question, if you share a fictitious maiden name, your account would be more secure.
  • Use licensed applications. Ensure that updates and patches are current so that vulnerabilities are taken care of. Be cautious about file sharing sites. Nothing comes for free. You may get viruses and worms through these sites too. If you leave your internet on through the night to download large files, you may leave a gate open for intruders to attack your system.
  • General Awareness On Cyber Security

    1. 1. General Awareness on Cyber Security
    2. 2. Contents
    3. 3. Why should YOU be aware of Cyber Security?
    4. 4. So, What are the risks?
    5. 5. RISKS Hacker / Attacker / Intruder Malicious Code Vulnerability
    6. 6. Aren't these just Technology issues?
    7. 7. NO
    8. 8. It is all about people ...
    9. 9. It is people, who …. <ul><li>Break into Corporate & Organizational networks to get access to confidential data </li></ul>Penetrate a major bank’s security system to steal $10 million
    10. 10. It is people, who …. <ul><li>Write Software Code which can completely make your computer useless </li></ul>Create Denial of Service attacks on Sites like Twitter, Facebook & LiveJournal recently to bring the sites to a standstill
    11. 11. If large organizations and Institutions are not safe from Cyber Attacks....
    12. 12. Are YOU Safe?
    13. 13. Not Always...
    14. 14. Can YOU be Cautious?
    15. 15. Yes. You can!
    16. 16. The first step in becoming Cyber Safe is Awareness!
    17. 17. GENERAL SECURITY
    18. 18. General Security <ul><li>Passwords </li></ul><ul><ul><li>No Personal Information (Name, College, Friend’s name, Date of birth etc) </li></ul></ul><ul><ul><li>Complex, but easy to remember </li></ul></ul><ul><ul><li>Number, Special Characters, Upper Case </li></ul></ul><ul><ul><li>Not Dictionary words </li></ul></ul><ul><ul><li>Don’t Write it down some where </li></ul></ul><ul><ul><li>Don’t allow programs to “remember” your password </li></ul></ul>**********
    19. 19. General Security <ul><li>Anti-Virus Software </li></ul><ul><ul><li>Use a good, well known software </li></ul></ul><ul><ul><li>Set up Automatic Scans </li></ul></ul><ul><ul><li>Manually Scan files received from Outside </li></ul></ul><ul><ul><li>Regularly update the software – to get latest definitions </li></ul></ul><ul><ul><li>Not always 100% effective! </li></ul></ul><ul><li>Firewalls </li></ul><ul><ul><li>Enable your Operating System Firewall (if built in) </li></ul></ul><ul><ul><li>If your broadband is always on – Good to have Firewall </li></ul></ul>
    20. 20. General Security <ul><li>Good Security Habits </li></ul><ul><ul><li>Lock your computer when you are away from it </li></ul></ul><ul><ul><li>Disconnect your computer from the Internet, if you are not using it </li></ul></ul><ul><ul><li>Evaluate your security settings </li></ul></ul><ul><ul><li>Back up all of your data </li></ul></ul>
    21. 21. SAFE BROWSING, EMAIL
    22. 22. Email & Chat Attachments Spam Chat & IM
    23. 23. Social Networks Limit Personal Info Privacy Settings Billboard Rule! Be Skeptical! Links & Add Ons
    24. 24. Secure Sites & Cookies <ul><li>https vs http </li></ul><ul><li>Check if the website has a valid Certificate </li></ul><ul><li>Cookies store information about you and your browsing habits </li></ul><ul><li>To increase your level of security, adjust your privacy and security settings on your browser </li></ul>
    25. 25. https Security Certificate Lock
    26. 26. MOBILE DEVICES
    27. 27. Mobile Devices Physical Security Password Protection Caution! USB! Wireless Security Key
    28. 28. ATTACKS AND THREATS
    29. 29. Important Attacks and Threats Today Social Engineering - Phishing Identity Theft
    30. 35. Nigerian Email Scam
    31. 36. PRIVACY
    32. 37. Privacy <ul><li>Limit exposure of your private information online </li></ul><ul><li>Encrypt confidential communication </li></ul><ul><li>Supplementing Passwords – Use secure data/passwords while supplementing </li></ul>
    33. 38. SOFTWARE & APPLICATIONS
    34. 39. Software and Applications Licensed! Updates & Patches File Sharing
    35. 40. Can YOU be Cautious?
    36. 41. Yes. You can!
    37. 42. Questions?
    38. 43. Thank You! Dominic Rajesh http://twitter/dominicrajesh http://domsownblog.blogspot.com

    ×