SlideShare a Scribd company logo
1 of 29
Download to read offline
SAFE INTERNET HABITS
&
BROWSING SECURITY
Chandan Singh Ghodela
Information Security Officer
Information Security
CONFIDENTIALITY INTEGRITY AVAILABILITY
2
Chandan Singh Ghodela
Importance of Security Awareness
The behavior of employees and contractors
with access to data affects information
systems and assets.
The human factor (what employees do or
don’t do) is the biggest threat to information
systems and assets.
3
Chandan Singh Ghodela
Importance of Security Awareness
Chandan Singh Ghodela 4
“As we tackle #COVID19, many children’s worlds
have shrunk to just their screens. This leaves them
vulnerable to online sexual exploitation, grooming,
violence and bullying.”
Importance of Security Awareness
Chandan Singh Ghodela 5
Talk About Internet Safety
Set-Up Parental Controls
Teach Kids About Online Abuse and Boundaries
Nothing is Private
Learn About Ads, Influencers & Sponsorships
Know That Scammers Are Smart, Too
Social Media Unknown Friend
Keep Your Privacy Settings On
Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
Be Careful What You Download
Make Online Purchases From Secure Sites
Choose Strong Passwords
Use Strong Password
• Use unique passwords for all of your
accounts.
• Lengthy
• At least 12, more is better
• Complex
• Mix upper, lower, numbers and
symbols
• Do not use common or predictable
passwords
• Change password periodically (90 days)
• Keep your password secret.
Chandan Singh Ghodela 6
Password Protection Standard
• Don’t reveal a password over the phone
to anyone.
• Don’t reveal a password in an mail
message.
• Don’t reveal a password to the boss.
• Don’t talk about a password in front of
others.
• Don’t hint at the format of a password.
• Don’t reveal a password on
questionnaires on security forms.
• Don’t use the “Remember Password”
feature of applications.
• Don’t write passwords down and store
them anywhere in your office.
• Don’t store password in a file on ANY
computer system unencrypted.
Chandan Singh Ghodela 7
How to Securely Share a Password with Someone
• Safenote.co
Chandan Singh Ghodela 8
Safe Web Browsing
• Before logging into or entering sensitive
information into a website, look for the
security padlock symbol in the URL bar.
• Double clicking the icon will display the
certificate information for the page you
are viewing to guarantee that you’re as a
safe, security website.
• The “https” is another indication that the
page you are viewing is secure.
• Pay attention to the web address – if it
has changed or doesn’t seem right it may
be a fraudulent site.
Chandan Singh Ghodela 9
Safe Web Browsing
• https://facebook.com
• http://facebook.com
• facebook.com
Chandan Singh Ghodela 10
Safe Web Browsing
• How to safely close Scareware Popups
• Hold the Alt+F4 key
• Note: Never click on any of these buttons.
Chandan Singh Ghodela 11
Email Security Best Practices
• Don’t use your personal email account
for work purposes.
• Use two-tier authentication.
• Watch our for phishing emails.
• Never open unexpected attachments
without scanning.
• Never access emails from public Wi-Fi.
• Do not open attachment is unfamiliar
emails.
• Do not click on suspicious links.
• Use secure email encryption whenever
sending any restricted or sensitive
information.
Chandan Singh Ghodela 12
Mobile Devices
• Protect your devices with a password/PIN
(6 Digit recommended minimum)
• Device encryption, Remote wipe, GPS
Location, physical security
• Do not download apps from unknown
sources.
• Read what others are saying about the
app in the review section.
• Avoid using public Wi-Fi hotspots,
especially when access any password-
protected sites or where you will enter
any personal or confidential information.
Chandan Singh Ghodela 13
Malware
• Malware is a malicious software that gets
installed in your device and performs
unwanted tasks.
• Mainly designed to transmit information
about your web browsing habits to the
third party.
Chandan Singh Ghodela 14
Crypto Ransomware
• ‘Ransomware’ is a type of malware that
attempts to extort money from a
computer user by infecting and taking
control of the victim’s machine, or the
files or documents stored on it.
• Typically, the ransomware will either ‘lock’
the computer to prevent normal usage,
or encrypt the documents and files on it
to prevent access to the saved data.
Chandan Singh Ghodela 15
How to Criminals install Ransomware
• Ransomware generates a pop-up windows, webpage, or email warning from what looks
like an official authority.
• Ransomware is usually installed when you open
• A malicious email attachment.
• Click a malicious link in
• An email message
• An instant message
• On social networking site
• Ransomware can even be installed when you visit a malicious website.
Chandan Singh Ghodela 16
How to Prevent Ransomware
• Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is
paid, there is no guarantee that you will be able to regain access to your files.
• Keep all of the software on your computer up to date.
• Make sure automatic updating is turned on to get all the latest update and browser-
related components.
• Keep your firewall turned on.
• Don’t open spam email message or click links on suspicious websites.
(Cryptolocker spreads via .zip files sent as email attachments, for example)
• Always have a good backup system in place, just in case your PC does become infected
and you can’t recover your files.
Chandan Singh Ghodela 17
How to Prevent Ransomware
• Restore any impacted files from a known good backup. Restoration of your files from a
backup is the fastest way to regain access to your data.
• Be sure to contact your IT department if you or your coworkers receive suspicious calls.
• If traveling, alert your IT department beforehand, especially if you’re going to be using
public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when
accessing public Wi-Fi like Norton Secure VPN.
Chandan Singh Ghodela 18
VPN (Virtual Private Network)
• A VPN is a type of private network that uses public telecommunication, such as the
internet, instead of leased lines to communicate.
• It enables a computer or network-enabled device to send an receive data across shared
or public networks as if it were directly connected to the private network, while benefiting
from the functionality, security ana management policies of the private network.
Chandan Singh Ghodela 19
7 Security Tips
• Follow a clean desk policy
• Be aware when creating or disposing
paper documents.
• Consider carefully what information you
put out there.
• Prevent unauthorized people accessing
your company.
• Just because they know you, doesn’t
mean you know them!
• Phishing scams: Don’t bite.
• Prevent damage from malware.
Chandan Singh Ghodela 20
Internet Privacy
Chandan Singh Ghodela 21
Social Media
Social networking sites
A social networking service is an online platform that is used by people to build social
networks or social relations with other people who share similar personal or career interests,
activities, backgrounds or real-life connections.
Social Networking Sites are the most appalling spying machine that has ever been
invented
Chandan Singh Ghodela 22
Privacy Breaches Causes
• Weak Credentials
• Stolen Credentials
• Compromised Assets
• Payment Card Fraud
• Third Party Access
• Mobile Devices
Chandan Singh Ghodela 23
Social networking sites
Chandan Singh Ghodela 24
Information Shared on Social Media
• Your Profile
• Your Status
• Your Location
• Shared Content
Chandan Singh Ghodela 25
Chandan Singh Ghodela 26
Chandan Singh Ghodela 27
Chandan Singh Ghodela 28
Queries
Chandan Singh Ghodela 29
Chandan Singh Ghodela
Sr. Information Security Analyst & Researcher
---------
Email: chandanghodela@gmail.com
LinkedIn: chandan-singh-Ghodela
Twitter: @chandanghodela
Mobile: 86193-33632

More Related Content

What's hot

Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityHome
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsAmazon Web Services
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 

What's hot (20)

Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 

Similar to Information security & data security | Chandan Singh Ghodela

ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxDhruvsinhbhati
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 

Similar to Information security & data security | Chandan Singh Ghodela (20)

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Information security & data security | Chandan Singh Ghodela

  • 1. SAFE INTERNET HABITS & BROWSING SECURITY Chandan Singh Ghodela Information Security Officer
  • 2. Information Security CONFIDENTIALITY INTEGRITY AVAILABILITY 2 Chandan Singh Ghodela
  • 3. Importance of Security Awareness The behavior of employees and contractors with access to data affects information systems and assets. The human factor (what employees do or don’t do) is the biggest threat to information systems and assets. 3 Chandan Singh Ghodela
  • 4. Importance of Security Awareness Chandan Singh Ghodela 4 “As we tackle #COVID19, many children’s worlds have shrunk to just their screens. This leaves them vulnerable to online sexual exploitation, grooming, violence and bullying.”
  • 5. Importance of Security Awareness Chandan Singh Ghodela 5 Talk About Internet Safety Set-Up Parental Controls Teach Kids About Online Abuse and Boundaries Nothing is Private Learn About Ads, Influencers & Sponsorships Know That Scammers Are Smart, Too Social Media Unknown Friend Keep Your Privacy Settings On Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection Be Careful What You Download Make Online Purchases From Secure Sites Choose Strong Passwords
  • 6. Use Strong Password • Use unique passwords for all of your accounts. • Lengthy • At least 12, more is better • Complex • Mix upper, lower, numbers and symbols • Do not use common or predictable passwords • Change password periodically (90 days) • Keep your password secret. Chandan Singh Ghodela 6
  • 7. Password Protection Standard • Don’t reveal a password over the phone to anyone. • Don’t reveal a password in an mail message. • Don’t reveal a password to the boss. • Don’t talk about a password in front of others. • Don’t hint at the format of a password. • Don’t reveal a password on questionnaires on security forms. • Don’t use the “Remember Password” feature of applications. • Don’t write passwords down and store them anywhere in your office. • Don’t store password in a file on ANY computer system unencrypted. Chandan Singh Ghodela 7
  • 8. How to Securely Share a Password with Someone • Safenote.co Chandan Singh Ghodela 8
  • 9. Safe Web Browsing • Before logging into or entering sensitive information into a website, look for the security padlock symbol in the URL bar. • Double clicking the icon will display the certificate information for the page you are viewing to guarantee that you’re as a safe, security website. • The “https” is another indication that the page you are viewing is secure. • Pay attention to the web address – if it has changed or doesn’t seem right it may be a fraudulent site. Chandan Singh Ghodela 9
  • 10. Safe Web Browsing • https://facebook.com • http://facebook.com • facebook.com Chandan Singh Ghodela 10
  • 11. Safe Web Browsing • How to safely close Scareware Popups • Hold the Alt+F4 key • Note: Never click on any of these buttons. Chandan Singh Ghodela 11
  • 12. Email Security Best Practices • Don’t use your personal email account for work purposes. • Use two-tier authentication. • Watch our for phishing emails. • Never open unexpected attachments without scanning. • Never access emails from public Wi-Fi. • Do not open attachment is unfamiliar emails. • Do not click on suspicious links. • Use secure email encryption whenever sending any restricted or sensitive information. Chandan Singh Ghodela 12
  • 13. Mobile Devices • Protect your devices with a password/PIN (6 Digit recommended minimum) • Device encryption, Remote wipe, GPS Location, physical security • Do not download apps from unknown sources. • Read what others are saying about the app in the review section. • Avoid using public Wi-Fi hotspots, especially when access any password- protected sites or where you will enter any personal or confidential information. Chandan Singh Ghodela 13
  • 14. Malware • Malware is a malicious software that gets installed in your device and performs unwanted tasks. • Mainly designed to transmit information about your web browsing habits to the third party. Chandan Singh Ghodela 14
  • 15. Crypto Ransomware • ‘Ransomware’ is a type of malware that attempts to extort money from a computer user by infecting and taking control of the victim’s machine, or the files or documents stored on it. • Typically, the ransomware will either ‘lock’ the computer to prevent normal usage, or encrypt the documents and files on it to prevent access to the saved data. Chandan Singh Ghodela 15
  • 16. How to Criminals install Ransomware • Ransomware generates a pop-up windows, webpage, or email warning from what looks like an official authority. • Ransomware is usually installed when you open • A malicious email attachment. • Click a malicious link in • An email message • An instant message • On social networking site • Ransomware can even be installed when you visit a malicious website. Chandan Singh Ghodela 16
  • 17. How to Prevent Ransomware • Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files. • Keep all of the software on your computer up to date. • Make sure automatic updating is turned on to get all the latest update and browser- related components. • Keep your firewall turned on. • Don’t open spam email message or click links on suspicious websites. (Cryptolocker spreads via .zip files sent as email attachments, for example) • Always have a good backup system in place, just in case your PC does become infected and you can’t recover your files. Chandan Singh Ghodela 17
  • 18. How to Prevent Ransomware • Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data. • Be sure to contact your IT department if you or your coworkers receive suspicious calls. • If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN. Chandan Singh Ghodela 18
  • 19. VPN (Virtual Private Network) • A VPN is a type of private network that uses public telecommunication, such as the internet, instead of leased lines to communicate. • It enables a computer or network-enabled device to send an receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security ana management policies of the private network. Chandan Singh Ghodela 19
  • 20. 7 Security Tips • Follow a clean desk policy • Be aware when creating or disposing paper documents. • Consider carefully what information you put out there. • Prevent unauthorized people accessing your company. • Just because they know you, doesn’t mean you know them! • Phishing scams: Don’t bite. • Prevent damage from malware. Chandan Singh Ghodela 20
  • 21. Internet Privacy Chandan Singh Ghodela 21 Social Media
  • 22. Social networking sites A social networking service is an online platform that is used by people to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections. Social Networking Sites are the most appalling spying machine that has ever been invented Chandan Singh Ghodela 22
  • 23. Privacy Breaches Causes • Weak Credentials • Stolen Credentials • Compromised Assets • Payment Card Fraud • Third Party Access • Mobile Devices Chandan Singh Ghodela 23
  • 25. Information Shared on Social Media • Your Profile • Your Status • Your Location • Shared Content Chandan Singh Ghodela 25
  • 29. Queries Chandan Singh Ghodela 29 Chandan Singh Ghodela Sr. Information Security Analyst & Researcher --------- Email: chandanghodela@gmail.com LinkedIn: chandan-singh-Ghodela Twitter: @chandanghodela Mobile: 86193-33632