Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Threats to your identity online

1,182 views

Published on

4 categories by which we lose privacy on-line

Published in: Technology
  • Be the first to comment

Threats to your identity online

  1. 1. Threats To Your Identity Online Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director Pinaka Technology Solutions @PinakaTT http://www.slideshare.net/ShivaBissessar1 https://www.linkedin.com/in/shivabissessar http://facebook.com/pinakaTT
  2. 2. Offering Corporate Entities & Public Institutions Consultancy On Strategic Matters Of ICT & Information Security
  3. 3. Loss of Privacy Self Imposed Trusted Party Blunder Malicious Actor In The Name of Security
  4. 4. Self Imposed
  5. 5. http://www.scmagazine.com/human-error-contributes-to-nearly-all-cyber-incidents-study-finds/article/356015/
  6. 6. http://edition.cnn.com/2013/03/11/tech/social-media/facebook-likes-study/
  7. 7. http://www.nytimes.com/2014/10/05/sunday-review/we-want-privacy-but-cant-stop-sharing.html?_r=0
  8. 8. Trusted Party Blunder
  9. 9. http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/
  10. 10. http://www.gizmodo.com.au/2014/09/report-apple-knew-of-security-problems-long-before-icloud-hack/
  11. 11. http://mashable.com/2012/06/07/linkedin-disabling-hacked-passwords/
  12. 12. Malicious Actor
  13. 13. http://www.trinidadexpress.com/news/E-mail-account-of-Presidents-staff-member-hacked-272444811.html
  14. 14. http://www.pcmag.com/article2/0,2817,2383197,00.asp
  15. 15. http://www.caribbeannewsnow.com/topstory-Trinidad-government-denies-spyware-in-school-computers-22696.html
  16. 16. June 2014, OAS Symantec Report, LATAM+ C Cyber Security Trends
  17. 17. http://www.nytimes.com/2014/09/30/upshot/its-so-much-more-fun-to-spread-rumors-than-the-truth.html?_r=0&abt=0002&abg=1
  18. 18. In The Name of Security
  19. 19. https://www.techdirt.com/articles/20140923/07120428605/law-enforcement-freaks-out-over-apple-googles-decision-to-encrypt-phone-info-default.shtml
  20. 20. PART I – General Information Security •Importance of Information Security •Local & Regional Context •Why Are There Growing Threats •Types of Attackers & Motivations •Consequences of Attacks •Web Security Essentials •Threat & Vulnerabilities PART II - Social Engineering •Users’ Security Appetite •Attack Scenario Analysis •Phishing, Spoofing, Vishing, Water Holing, Ransomware, Skimming •Resources End User Info. Security Awareness Workshop Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director Pinaka Technology Solutions +868 678 5078 spbisses@gmail.com
  21. 21. Threats To Your Identity Online Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director Pinaka Technology Solutions @PinakaTT http://www.slideshare.net/ShivaBissessar1 https://www.linkedin.com/in/shivabissessar http://facebook.com/pinakaTT

×