Mapping your digital footprint by A K Goel

Security Researcher at Adobe, Chapter Leader at OWASP & null
Jun. 24, 2016
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
Mapping your digital footprint by A K Goel
1 of 8

More Related Content

Viewers also liked

Seasonal Employees-Foundation Of EconomiesSeasonal Employees-Foundation Of Economies
Seasonal Employees-Foundation Of EconomiesNewSourceMarket
κατανόηση κειμένου 2014 (1)κατανόηση κειμένου 2014 (1)
κατανόηση κειμένου 2014 (1)elpitheo
Civic sportsCivic sports
Civic sportsJack740
OWASP CSRF Protector_MinhazOWASP CSRF Protector_Minhaz
OWASP CSRF Protector_MinhazOWASP Delhi
All consuming newsAll consuming news
All consuming newsJack740
Campamento Sapucay Julio 2014 Scouts MayoresCampamento Sapucay Julio 2014 Scouts Mayores
Campamento Sapucay Julio 2014 Scouts MayoresMaria Mongelos

Similar to Mapping your digital footprint by A K Goel

Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
Positive Digital Footprints.pptxPositive Digital Footprints.pptx
Positive Digital Footprints.pptxMicahNidea2
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
RiverviewRiverview
RiverviewKathy Schrock
Purposeful Personal Branding - Nov 2018Purposeful Personal Branding - Nov 2018
Purposeful Personal Branding - Nov 2018Cassandra Faris

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!
纽约州立大学布法罗分校留学生如何办理毕业证书、完成信、成绩单!dadot2
IDNOG 8: APNIC MeasurementsIDNOG 8: APNIC Measurements
IDNOG 8: APNIC MeasurementsAPNIC
毕业证明书 英文:曼彻斯特大学毕业证书原版复制毕业证明书 英文:曼彻斯特大学毕业证书原版复制
毕业证明书 英文:曼彻斯特大学毕业证书原版复制uncesxy
巴塞罗那自治大学文凭认证真实留信网认证巴塞罗那自治大学文凭认证真实留信网认证
巴塞罗那自治大学文凭认证真实留信网认证dadot2
原版定制:英国赫尔大学毕业证书案例原版定制:英国赫尔大学毕业证书案例
原版定制:英国赫尔大学毕业证书案例gonksoe
办美国本科毕业证实拍图毕业证本科硕士文凭哪家好办美国本科毕业证实拍图毕业证本科硕士文凭哪家好
办美国本科毕业证实拍图毕业证本科硕士文凭哪家好sovcyuv

Mapping your digital footprint by A K Goel

  1. Mapping your Digital Footprint A K Goel June’16 | OWASP Delhi Chapter Meet
  2. What’s so fancy about this? Digital Footprint the stuff you leave behind as you use the Internet Social media comments, check-ins, last seen status, skype calls, flickr timeline, app use and email records
  3. Hard facts Footprint is permanent and internet is broken!
  4. Active and Passive footprint Best way to monitor: self-policing. Leading to becoming a self proclaimed creep the DARPA connection - lifelogging
  5. Adopting a positive digital footprint • Be up-to-date • Ensure privacy • Singular handle across the board • No report abuse history • Remain off-line • Polite behaviour • Indulge in Constructive discussions • Be responsible – don’t support Piracy
  6. How to erase your digital footprint • Search yourself regularly • Deactivate old profiles • Be a ninja with privacy settings • Add false info before going off a portal • Contact Webmasters • Unsubscribe from mailing lists • Have a secondary email account for all dirty work • The right to be forgotten • Check retail accounts • Cover your tracks – incognito
  7. You know nothing about how your information is being used