SlideShare a Scribd company logo
1 of 17
CYBER SECURITY AWARENESS
Special Session for Tech. and Non Tech. people
And how they prevent their systems, privacy, identity, location
and other activities.
Presented By:- Abhay Kumar Pathak (Ethical Hacking VAPT Certified)
Dept:- Cs & IT
ABHAY
World Wide Web (Internet)ABHAY
Accessible by normal people and
searchable with standard web search
engines.
It’s have 4% of all Internet.
Also called “Visible Web”, “Light Net”,
Indexed Web”.
96% of the Internet
Accessible by Tools
or Software
Accessible with special
software, having
encrypted data.
Not indexed for search
engines.
Restricted for special
browser,
Large scale illegal activitiesABHAY
Surface Web
The surface web also called Visible Web , Lightnet,
Indexed Web. This is the portion of the World
Wide Web, that is readily available to the general
public and searchable with standard Web Search
Engines.
4% of Internet
Indexable on Web Search Engines
Google’s Index contains 14.4B pages on Surface
Web
Opposite of Deep Web
ABHAY
Deep Web
Accessible by password, encryption or through
gateway software
Not Indexed for the search engines
Little illegal activities in this web.
The crimes huge in size and growing exponentially
ABHAY
Dark Net/Dark Web
Restricted for the browsers
Not Indexed for Search Engines
Large scale illegal activities
Unmeasured due to nature
Use for Transfer Virtual Currency(Like Bit coin)
ABHAY
How to acces Dark Web
Here some special tools given below for access the
Dark Web
TOR(The Onion Routing)
12P
VPN(Virtual Private Network)
Proxy(Use another server IP and Port No.)
These networks called Overlay Network, and also
use for Anonymous Surfing.
ABHAY
Security and Privacy Issues
We are in that type of world where we don’t know how transfers, processes and
execute the virtual things. We have some limited information of the Digital World.
And here we trying to find the Perfection in our Digital System.
We talk about privacy issues with these type accounts given below
 Yahoo.com
 Google.com
 Hotmail.com
 Indiatimes.com
 Reddif.com
Here each company have more than 120M Users(Google.com not consider)
And even all mail send by it’s user scanned by some special keywords
ABHAY
Google.com
If you using Google
 Everything you type ,Google record it as like he collects the IP
address of your personal computer
Prevention:-Use the another google portal “DUCK DUCK GO”
Here no privacy issues because duck duck go have no database to
record your activities
Another Issue with using Antivirus
 First, Company makes the Virus and spread it all the internet
 And second they give us paid softwares for prevent our system
Prevention :-
Use Online scanning
ABHAY
Windows and Mac
A error message of Windows
When you click report to windows then your
whole configuration of system send to
Mircosoft
Prevention
Use Linux
Free and secure
ABHAY
Issues with Using Android Phone
Google Location
The Google is track your Location 24/7 with
your android phone
If you want to know where was you before 2
years than your Google map have each and
every information about you for that day
:-Disable the button of location and maintain
your privacy
ABHAY
Anonymous Surfing
In the scenario where no one can hide over the internet then
anonymous surfing is the best way to prevent yourself
Prevention:-
Use TOR(for windows and linux)
Free and open source
For Android Users OR ORBOT
With using TOR, You hide your IP, location and identity with
using Random Servers
ABHAY
Secure Communication
When we trying to find the solution for secure
communication then I look,
What the terrorist are nowadays using,
A lot of report that the ISIS has been using
secure communication app using like VIKER
TELEGRAM and REDPHONE
These are the similar apps like whatsup and snapchat but
there are only difference they apps use MILITRY GRADE
encryption and using a separate OTP confirmation
channel.
ABHAY
ATM Threats
ATM have two layers of security machenism
Magnetic Strip(having whole information of account)
4 Digits PIN numbers
The hackers can put the additional reading
device and read all data and your account
details
The device look like this:-
ABHAY
The Case Discussion of Mumbai
ABHAY
Issues with ATM Machines
ABHAY
Keep your PINs secure and secret
Another factor is spyware or using external keyboard who looks
like original keyboard of ATM, who looks like this:-
ABHAY

More Related Content

What's hot

Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 

What's hot (20)

Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
internet security
internet securityinternet security
internet security
 
New internet security
New internet securityNew internet security
New internet security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Spyware
SpywareSpyware
Spyware
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Hacking
HackingHacking
Hacking
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 

Similar to security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine

Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Monique Jones
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 

Similar to security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine (20)

Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Spyware
SpywareSpyware
Spyware
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
Spyware
SpywareSpyware
Spyware
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 

security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine

  • 1. CYBER SECURITY AWARENESS Special Session for Tech. and Non Tech. people And how they prevent their systems, privacy, identity, location and other activities. Presented By:- Abhay Kumar Pathak (Ethical Hacking VAPT Certified) Dept:- Cs & IT ABHAY
  • 2. World Wide Web (Internet)ABHAY
  • 3. Accessible by normal people and searchable with standard web search engines. It’s have 4% of all Internet. Also called “Visible Web”, “Light Net”, Indexed Web”. 96% of the Internet Accessible by Tools or Software Accessible with special software, having encrypted data. Not indexed for search engines. Restricted for special browser, Large scale illegal activitiesABHAY
  • 4. Surface Web The surface web also called Visible Web , Lightnet, Indexed Web. This is the portion of the World Wide Web, that is readily available to the general public and searchable with standard Web Search Engines. 4% of Internet Indexable on Web Search Engines Google’s Index contains 14.4B pages on Surface Web Opposite of Deep Web ABHAY
  • 5. Deep Web Accessible by password, encryption or through gateway software Not Indexed for the search engines Little illegal activities in this web. The crimes huge in size and growing exponentially ABHAY
  • 6. Dark Net/Dark Web Restricted for the browsers Not Indexed for Search Engines Large scale illegal activities Unmeasured due to nature Use for Transfer Virtual Currency(Like Bit coin) ABHAY
  • 7. How to acces Dark Web Here some special tools given below for access the Dark Web TOR(The Onion Routing) 12P VPN(Virtual Private Network) Proxy(Use another server IP and Port No.) These networks called Overlay Network, and also use for Anonymous Surfing. ABHAY
  • 8. Security and Privacy Issues We are in that type of world where we don’t know how transfers, processes and execute the virtual things. We have some limited information of the Digital World. And here we trying to find the Perfection in our Digital System. We talk about privacy issues with these type accounts given below  Yahoo.com  Google.com  Hotmail.com  Indiatimes.com  Reddif.com Here each company have more than 120M Users(Google.com not consider) And even all mail send by it’s user scanned by some special keywords ABHAY
  • 9. Google.com If you using Google  Everything you type ,Google record it as like he collects the IP address of your personal computer Prevention:-Use the another google portal “DUCK DUCK GO” Here no privacy issues because duck duck go have no database to record your activities Another Issue with using Antivirus  First, Company makes the Virus and spread it all the internet  And second they give us paid softwares for prevent our system Prevention :- Use Online scanning ABHAY
  • 10. Windows and Mac A error message of Windows When you click report to windows then your whole configuration of system send to Mircosoft Prevention Use Linux Free and secure ABHAY
  • 11. Issues with Using Android Phone Google Location The Google is track your Location 24/7 with your android phone If you want to know where was you before 2 years than your Google map have each and every information about you for that day :-Disable the button of location and maintain your privacy ABHAY
  • 12. Anonymous Surfing In the scenario where no one can hide over the internet then anonymous surfing is the best way to prevent yourself Prevention:- Use TOR(for windows and linux) Free and open source For Android Users OR ORBOT With using TOR, You hide your IP, location and identity with using Random Servers ABHAY
  • 13. Secure Communication When we trying to find the solution for secure communication then I look, What the terrorist are nowadays using, A lot of report that the ISIS has been using secure communication app using like VIKER TELEGRAM and REDPHONE These are the similar apps like whatsup and snapchat but there are only difference they apps use MILITRY GRADE encryption and using a separate OTP confirmation channel. ABHAY
  • 14. ATM Threats ATM have two layers of security machenism Magnetic Strip(having whole information of account) 4 Digits PIN numbers The hackers can put the additional reading device and read all data and your account details The device look like this:- ABHAY
  • 15. The Case Discussion of Mumbai ABHAY
  • 16. Issues with ATM Machines ABHAY
  • 17. Keep your PINs secure and secret Another factor is spyware or using external keyboard who looks like original keyboard of ATM, who looks like this:- ABHAY