SlideShare a Scribd company logo
1 of 17
Top 100 security tips
Topics
• Social Engineering
• Social Media
• Physical computer security
• Password security
• Smartphones
• Encryption
• Anti Virus
• Public computers
• WiFi security
Social Engineering
1. Don't leave password notes on your desk, under your keyboard / phone /
table. You could use an password manager instead.
2. Don't provide people information that they should not have.
3. Always check the credentials if someone is asking for non-disclosed
information. (This could be your credentials, or the password of your
username).
4. Hackers often impersonate (Spoof) users to gain information. Be aware
of this threat.
5. With social engineering comes the threat; Theft of financial
information.Hackers use phishing or spear phishing techniques to request
confidential information, such as account details.
Social Engineering
6. Never provide sensitive information via email. If someone tries to get you to give out
personal data, passwords, and other sensitive information via your email, don't do so. Always call
back to the real source and confirm if such a request is needed.
7. Be skeptical of anyone that tries to get personal data, passwords, and other sensitive
information from you. Always be skeptical if anyone tries to get information from you. Normally,
it is very rare for a company to make you give out any information, so you should never do so if
you haven't checked the source first and are absolutely confident about it. It is your right not to
give out any information unless it is under extreme circumstances.
8. Beware of people that call you on the phone and try to make you provide your personal
information, passwords, and other sensitive information. Always be skeptical if someone calls
you on the phone and tries to get your personal information, your passwords, and other sensitive
data. Always be skeptical and never give out any information to strangers.
9. You will never get 100M USD via an e-mail contact. Spammers use various techniques to gain
information from you. They will act like they have money waiting for you and all they need is
your credentials. Be aware of this threat.
Social Engineering
10. The Govtdoes not send mass e-mails to private citizens about cyber
scams. if you received an e-mail that claims to be from the Govt or other
top official, it is most likely a scam.
11. Social engineering can strike you anytime.
12. Social engineering is an method that is used to obtain information
and let people do what you want them to do.
13. Attackers might use various methods to obtain their information.
14. When you get an security warning take it seriously!
Social Media
1. Consider if you want to use your real name. (You can connect your network directly to 
add an specific username)
2. Social media is fun. Yes social media is fun as it is dangerous. Don't leave your social 
media page open in an public environment like schools, cafes and other hotspots.
3. Applications are fun. Yes, applications are fun as they are dangerous. Applications 
need information for their databases. These databases could belong to anyone. So before 
you download or install an application check the source of the application. You don't 
want your information in the hands of cyber criminals right?
4. @Cyberwarzonecom OMG, someone just posted an picture follow this link bla bla
bla. Hackers often use messages that people will click on. Social media is an great 
resource for hackers as everyone is connected. When you click on an Malicious link you 
will get infected by malware that will extract your credentials to an criminal database.
Social Media
5. I got 21513 friends. DON'T!!! only accept people that you know to your social 
media network. This will protect you from harm.
6. Don't share your password with others!
7. Beware of shoulder-surfers when typing in your password, or sensitive 
information.
8. SSL keeps you safe. Pay attention to the SSL errors when browsing.
9. Recognize current phishing, phishing and other scams.
10. Malicious content is crawling social media. Be aware of surveys that like 
collecting your information.
Physicial computer security
 
1. Before you turn on a computer check if it has weird objects connect to it. People 
could use physical keyloggers to gain your information.
2. Don't leave your smartphone, computer, laptop, notebook or whatever with personal 
information unattended or unsecured.
3. Lock your plugin hardware. People could gain acces to your working environment. It 
would be an easy way for an criminal to take the plugin hardware with him. Lock op your 
external harddrive, USB sticks.
4. Don't toss around with your USB sticks. Keep them safe and encrypt them!
5. When your harddisk or memory is declared dead be sure to dispose them in an 
secured way. Put them in an bag and hammer them to pieces. Great workout.
Physicial computer security
 
6. Don't mix your laptop that you use for you work as an multimedia laptop. Keep work 
and fun separated when dealing with information.
7. Turn off your WiFi, either in the OS or using a physical switch (if you have one), when 
not in use.
8. Almost any device can be used to record audio and/or video, including smartphones, 
watches and buttons.
9. Disconnect the internet cable when you are done with the computer. This will 
prevent a Wake on Lan attack.
10. Use secure wiping functionality (Disk Utility) or tools to erase drives/devices before 
giving or selling them.
Password security
 
1. Use password generators to create passwords for you and then add an extra 
character that you prefer to the generated password.
2. Use password managers to manage your passwords for you.
3. Keep your password secret.
4. Do change your password on a regular basis.
5. Prevent the use of easy to guess passwords like; 12345, welcome. Hackers use 
password lists to brute force accounts. These lists expand millions of passwords
Password security
6. Don't use the same password.
7. Don't leave password notes on your desk, under your keyboard / 
phone / table. You could use an password manager instead.
8. Make sure that your credentials travel via HTTPS protocol.
9. Set strong (hard to guess) secret questions and answers.
10. Disable auto-login.
Smartphones
1. Be carefull with your contact list. Your list could contain potential information for 
hackers. If you lose your phone be sure to inform your contact about it.
2. Smartphones are used on a daily basis. We can't imagine a world without them. 
These smartphones contain a lot of information. Be sure to keep that information close.
3. Don't just install all types of applications. When you delete an application, remember 
to delete the account you created with it.
4. Your smartphone has an harddisk and an memory drive. Remember to wipe them 
before you decide to sell or trade them.
5. Set your phone to lock, or time out, after a certain period of inactivity, requiring a 
password to get back in. All of the major smartphone operating systems support this 
function.
Smartphones
6. Third-Party Apps That Share Too Much. When you install a third-party app, 
you grant it certain privileges. Those privileges may include access to your 
physical location, contact information (yours and that of others), or other 
personal data
7. GEO-location. Do you really want people to know where you are?
8. WiFi for free. Be aware that when you are connected to a access point 
someone could right out all your information.
9. Disable WiFi, Bluetooth when you are not using it.
Encryption
1. Use encryption software to encrypt your 
information.
2. Make sure that only you know the encryption 
password.
3. Don't write the encryption password down.
Anti virus
1. Use an anti-virus on your computer. If you 
can't pay one get one for free. You can use the 
microsoft security essentials to protect your 
computer.
2. Update your anti virus. Your anti virus uses an 
database with signatures. This database needs to 
get updated so it can recognize new threats.
3. Run your anti virus on a regular basis.
Public computers
1. Prevent logging in on public computers.
2. Disable auto-login.
3. Check for weird objects like keyloggers.
4. Use secured protocols like HTTPS.
5. Don't store files on public computers.
6. Be aware of your environment.
7. Delete your browsing history.
8. Delete your cookies.
9. Delete auto-forms.
10. Prevent using public computers.
WiFi Security
1. Use a strong password.
2. Don’t broadcast your SSID.
3. Use good wireless encryption.
4. Use another layer of encryption when possible
5. Restrict access by MAC address.
6. Shut down the network when it’s not being used.
7. Shut down your wireless network interface, too.
8. Monitor your network for intruders.
9. Cover the bases.
10. Don’t waste your time on ineffective security measures.

More Related Content

What's hot

Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for saleRamiro Cid
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 

What's hot (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet security
Internet securityInternet security
Internet security
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Users guide
Users guideUsers guide
Users guide
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Hacking
HackingHacking
Hacking
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Passwords for sale
Passwords for salePasswords for sale
Passwords for sale
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked (8)

Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Case study 11
Case study 11Case study 11
Case study 11
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 
Stuxnet worm
Stuxnet wormStuxnet worm
Stuxnet worm
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 
Smart card
Smart cardSmart card
Smart card
 

Similar to INTERNET SECUIRTY TIPS

EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxAnnMarieTAquinoII
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Similar to INTERNET SECUIRTY TIPS (20)

EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptxLEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
LEGAL AND ETHICAL USE OF TECHNOLOGY.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 

More from Santosh Khadsare (18)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 
New internet
New internetNew internet
New internet
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

INTERNET SECUIRTY TIPS

  • 2. Topics • Social Engineering • Social Media • Physical computer security • Password security • Smartphones • Encryption • Anti Virus • Public computers • WiFi security
  • 3. Social Engineering 1. Don't leave password notes on your desk, under your keyboard / phone / table. You could use an password manager instead. 2. Don't provide people information that they should not have. 3. Always check the credentials if someone is asking for non-disclosed information. (This could be your credentials, or the password of your username). 4. Hackers often impersonate (Spoof) users to gain information. Be aware of this threat. 5. With social engineering comes the threat; Theft of financial information.Hackers use phishing or spear phishing techniques to request confidential information, such as account details.
  • 4. Social Engineering 6. Never provide sensitive information via email. If someone tries to get you to give out personal data, passwords, and other sensitive information via your email, don't do so. Always call back to the real source and confirm if such a request is needed. 7. Be skeptical of anyone that tries to get personal data, passwords, and other sensitive information from you. Always be skeptical if anyone tries to get information from you. Normally, it is very rare for a company to make you give out any information, so you should never do so if you haven't checked the source first and are absolutely confident about it. It is your right not to give out any information unless it is under extreme circumstances. 8. Beware of people that call you on the phone and try to make you provide your personal information, passwords, and other sensitive information. Always be skeptical if someone calls you on the phone and tries to get your personal information, your passwords, and other sensitive data. Always be skeptical and never give out any information to strangers. 9. You will never get 100M USD via an e-mail contact. Spammers use various techniques to gain information from you. They will act like they have money waiting for you and all they need is your credentials. Be aware of this threat.
  • 5. Social Engineering 10. The Govtdoes not send mass e-mails to private citizens about cyber scams. if you received an e-mail that claims to be from the Govt or other top official, it is most likely a scam. 11. Social engineering can strike you anytime. 12. Social engineering is an method that is used to obtain information and let people do what you want them to do. 13. Attackers might use various methods to obtain their information. 14. When you get an security warning take it seriously!
  • 6. Social Media 1. Consider if you want to use your real name. (You can connect your network directly to  add an specific username) 2. Social media is fun. Yes social media is fun as it is dangerous. Don't leave your social  media page open in an public environment like schools, cafes and other hotspots. 3. Applications are fun. Yes, applications are fun as they are dangerous. Applications  need information for their databases. These databases could belong to anyone. So before  you download or install an application check the source of the application. You don't  want your information in the hands of cyber criminals right? 4. @Cyberwarzonecom OMG, someone just posted an picture follow this link bla bla bla. Hackers often use messages that people will click on. Social media is an great  resource for hackers as everyone is connected. When you click on an Malicious link you  will get infected by malware that will extract your credentials to an criminal database.
  • 7. Social Media 5. I got 21513 friends. DON'T!!! only accept people that you know to your social  media network. This will protect you from harm. 6. Don't share your password with others! 7. Beware of shoulder-surfers when typing in your password, or sensitive  information. 8. SSL keeps you safe. Pay attention to the SSL errors when browsing. 9. Recognize current phishing, phishing and other scams. 10. Malicious content is crawling social media. Be aware of surveys that like  collecting your information.
  • 8. Physicial computer security   1. Before you turn on a computer check if it has weird objects connect to it. People  could use physical keyloggers to gain your information. 2. Don't leave your smartphone, computer, laptop, notebook or whatever with personal  information unattended or unsecured. 3. Lock your plugin hardware. People could gain acces to your working environment. It  would be an easy way for an criminal to take the plugin hardware with him. Lock op your  external harddrive, USB sticks. 4. Don't toss around with your USB sticks. Keep them safe and encrypt them! 5. When your harddisk or memory is declared dead be sure to dispose them in an  secured way. Put them in an bag and hammer them to pieces. Great workout.
  • 9. Physicial computer security   6. Don't mix your laptop that you use for you work as an multimedia laptop. Keep work  and fun separated when dealing with information. 7. Turn off your WiFi, either in the OS or using a physical switch (if you have one), when  not in use. 8. Almost any device can be used to record audio and/or video, including smartphones,  watches and buttons. 9. Disconnect the internet cable when you are done with the computer. This will  prevent a Wake on Lan attack. 10. Use secure wiping functionality (Disk Utility) or tools to erase drives/devices before  giving or selling them.
  • 10. Password security   1. Use password generators to create passwords for you and then add an extra  character that you prefer to the generated password. 2. Use password managers to manage your passwords for you. 3. Keep your password secret. 4. Do change your password on a regular basis. 5. Prevent the use of easy to guess passwords like; 12345, welcome. Hackers use  password lists to brute force accounts. These lists expand millions of passwords
  • 11. Password security 6. Don't use the same password. 7. Don't leave password notes on your desk, under your keyboard /  phone / table. You could use an password manager instead. 8. Make sure that your credentials travel via HTTPS protocol. 9. Set strong (hard to guess) secret questions and answers. 10. Disable auto-login.
  • 12. Smartphones 1. Be carefull with your contact list. Your list could contain potential information for  hackers. If you lose your phone be sure to inform your contact about it. 2. Smartphones are used on a daily basis. We can't imagine a world without them.  These smartphones contain a lot of information. Be sure to keep that information close. 3. Don't just install all types of applications. When you delete an application, remember  to delete the account you created with it. 4. Your smartphone has an harddisk and an memory drive. Remember to wipe them  before you decide to sell or trade them. 5. Set your phone to lock, or time out, after a certain period of inactivity, requiring a  password to get back in. All of the major smartphone operating systems support this  function.
  • 13. Smartphones 6. Third-Party Apps That Share Too Much. When you install a third-party app,  you grant it certain privileges. Those privileges may include access to your  physical location, contact information (yours and that of others), or other  personal data 7. GEO-location. Do you really want people to know where you are? 8. WiFi for free. Be aware that when you are connected to a access point  someone could right out all your information. 9. Disable WiFi, Bluetooth when you are not using it.
  • 16. Public computers 1. Prevent logging in on public computers. 2. Disable auto-login. 3. Check for weird objects like keyloggers. 4. Use secured protocols like HTTPS. 5. Don't store files on public computers. 6. Be aware of your environment. 7. Delete your browsing history. 8. Delete your cookies. 9. Delete auto-forms. 10. Prevent using public computers.