This document summarizes an internet security presentation covering topics like online scams, spam, phishing, identity theft, malware like Stuxnet, antivirus software, firewalls, intrusion detection systems, best security practices for web browsing, browser vulnerabilities, and issues with an election system. The presentation provides advice on how to identify common online scams, examples of spam bots and phishing demonstrations, explains different types of malware, and outlines strategies for using strong and unique passwords, keeping software updated, and verifying senders of attachments.
4. What we will cover today
Online Scams
Why you din’t win $1m
Spam – Mail Bomb
Write your own spam bot
Phishing
Understanding the Phishermen
Identity Theft
Malware
Stuxnet
AntiVirus, Firewall and IDS
Best Practices Online
Browser Wars
Pwn2Own
Gymkhana Elections
Why it could have been a failure
5. Lottery – Help - Funds
Rule 1
You did not win any lottery.
Rule 2
You do not inherit any overseas property.
Rule 3
You won’t receive any commission for helping
people transfer their funds
Rule 4
Unsolicited income is a trap.
7. Think before you help
Before you want to donate, Just Google it and
donate only to established and recognized
organizations.
8. Spam – Mail Bomb
Spam is just another unsolicited email.
The very fact that you may receive an email
which you may be anticipating from a
‘stranger’ is the reason why spam filter’s life is
miserable
Often these carry several ‘infections’ with
them. More on this later!
10. Phishing
Phishing attacks use spoofed e-mails and
fraudulent websites designed to fool
recipients into divulging personal financial
data such as credit card numbers, account
usernames and passwords, social security
numbers, etc.
19. Best Practices Online
Get a ‘Good’ Web Browser
HTTPS vs HTTP
Unique Password
A unique password for every site
Best Security
Impossible to Remember
Semi Unique Password
A complicated password with slight changes for
different sites
Difficult to Remember
20. Best Practices Online
Unique Password Per Tier
Top Tier Websites
Google, Facebook, IITG Webmail, etc.
Medium Tier Websites
Microsoft, Yahoo, etc.
Low Tier Websites
Competitions, Subscriptions, Registrations, etc.
Update and Patch your Operating System,
Browser and AntiVirus.
Don’t download attachments until you are really
anticipating some attachment from the sender.