security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
Similar to security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
Similar to security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine (20)
security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
1. CYBER SECURITY AWARENESS
Special Session for Tech. and Non Tech. people
And how they prevent their systems, privacy, identity, location
and other activities.
Presented By:- Abhay Kumar Pathak (Ethical Hacking VAPT Certified)
Dept:- Cs & IT
ABHAY
3. Accessible by normal people and
searchable with standard web search
engines.
It’s have 4% of all Internet.
Also called “Visible Web”, “Light Net”,
Indexed Web”.
96% of the Internet
Accessible by Tools
or Software
Accessible with special
software, having
encrypted data.
Not indexed for search
engines.
Restricted for special
browser,
Large scale illegal activitiesABHAY
4. Surface Web
The surface web also called Visible Web , Lightnet,
Indexed Web. This is the portion of the World
Wide Web, that is readily available to the general
public and searchable with standard Web Search
Engines.
4% of Internet
Indexable on Web Search Engines
Google’s Index contains 14.4B pages on Surface
Web
Opposite of Deep Web
ABHAY
5. Deep Web
Accessible by password, encryption or through
gateway software
Not Indexed for the search engines
Little illegal activities in this web.
The crimes huge in size and growing exponentially
ABHAY
6. Dark Net/Dark Web
Restricted for the browsers
Not Indexed for Search Engines
Large scale illegal activities
Unmeasured due to nature
Use for Transfer Virtual Currency(Like Bit coin)
ABHAY
7. How to acces Dark Web
Here some special tools given below for access the
Dark Web
TOR(The Onion Routing)
12P
VPN(Virtual Private Network)
Proxy(Use another server IP and Port No.)
These networks called Overlay Network, and also
use for Anonymous Surfing.
ABHAY
8. Security and Privacy Issues
We are in that type of world where we don’t know how transfers, processes and
execute the virtual things. We have some limited information of the Digital World.
And here we trying to find the Perfection in our Digital System.
We talk about privacy issues with these type accounts given below
Yahoo.com
Google.com
Hotmail.com
Indiatimes.com
Reddif.com
Here each company have more than 120M Users(Google.com not consider)
And even all mail send by it’s user scanned by some special keywords
ABHAY
9. Google.com
If you using Google
Everything you type ,Google record it as like he collects the IP
address of your personal computer
Prevention:-Use the another google portal “DUCK DUCK GO”
Here no privacy issues because duck duck go have no database to
record your activities
Another Issue with using Antivirus
First, Company makes the Virus and spread it all the internet
And second they give us paid softwares for prevent our system
Prevention :-
Use Online scanning
ABHAY
10. Windows and Mac
A error message of Windows
When you click report to windows then your
whole configuration of system send to
Mircosoft
Prevention
Use Linux
Free and secure
ABHAY
11. Issues with Using Android Phone
Google Location
The Google is track your Location 24/7 with
your android phone
If you want to know where was you before 2
years than your Google map have each and
every information about you for that day
:-Disable the button of location and maintain
your privacy
ABHAY
12. Anonymous Surfing
In the scenario where no one can hide over the internet then
anonymous surfing is the best way to prevent yourself
Prevention:-
Use TOR(for windows and linux)
Free and open source
For Android Users OR ORBOT
With using TOR, You hide your IP, location and identity with
using Random Servers
ABHAY
13. Secure Communication
When we trying to find the solution for secure
communication then I look,
What the terrorist are nowadays using,
A lot of report that the ISIS has been using
secure communication app using like VIKER
TELEGRAM and REDPHONE
These are the similar apps like whatsup and snapchat but
there are only difference they apps use MILITRY GRADE
encryption and using a separate OTP confirmation
channel.
ABHAY
14. ATM Threats
ATM have two layers of security machenism
Magnetic Strip(having whole information of account)
4 Digits PIN numbers
The hackers can put the additional reading
device and read all data and your account
details
The device look like this:-
ABHAY
17. Keep your PINs secure and secret
Another factor is spyware or using external keyboard who looks
like original keyboard of ATM, who looks like this:-
ABHAY