Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

General Awareness On Cyber Security

10,024 views

Published on

This is a presentation that I shared with a group of College students on Cyber Security.

This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.

Published in: Technology
  • Get Now to Download PDF Format === http://hellowbookeas.cf/2035841607-larousse-du-college-special-conseil-general-vienne.html
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ❶❶❶ http://bit.ly/2ZDZFYj ❶❶❶
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ❤❤❤ http://bit.ly/2ZDZFYj ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THIS BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download Full EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download Full doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book THIS can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer THIS is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story THIS Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money THIS the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths THIS Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Looking For A Job? Positions available now. FT or PT. $10-$30/hr. No exp required.  http://t.cn/AieXS62G
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

General Awareness On Cyber Security

  1. 1. General Awareness on Cyber Security
  2. 2. Contents
  3. 3. Why should YOU be aware of Cyber Security?
  4. 4. So, What are the risks?
  5. 5. RISKS Hacker / Attacker / Intruder Malicious Code Vulnerability
  6. 6. Aren't these just Technology issues?
  7. 7. NO
  8. 8. It is all about people ...
  9. 9. It is people, who …. <ul><li>Break into Corporate & Organizational networks to get access to confidential data </li></ul>Penetrate a major bank’s security system to steal $10 million
  10. 10. It is people, who …. <ul><li>Write Software Code which can completely make your computer useless </li></ul>Create Denial of Service attacks on Sites like Twitter, Facebook & LiveJournal recently to bring the sites to a standstill
  11. 11. If large organizations and Institutions are not safe from Cyber Attacks....
  12. 12. Are YOU Safe?
  13. 13. Not Always...
  14. 14. Can YOU be Cautious?
  15. 15. Yes. You can!
  16. 16. The first step in becoming Cyber Safe is Awareness!
  17. 17. GENERAL SECURITY
  18. 18. General Security <ul><li>Passwords </li></ul><ul><ul><li>No Personal Information (Name, College, Friend’s name, Date of birth etc) </li></ul></ul><ul><ul><li>Complex, but easy to remember </li></ul></ul><ul><ul><li>Number, Special Characters, Upper Case </li></ul></ul><ul><ul><li>Not Dictionary words </li></ul></ul><ul><ul><li>Don’t Write it down some where </li></ul></ul><ul><ul><li>Don’t allow programs to “remember” your password </li></ul></ul>**********
  19. 19. General Security <ul><li>Anti-Virus Software </li></ul><ul><ul><li>Use a good, well known software </li></ul></ul><ul><ul><li>Set up Automatic Scans </li></ul></ul><ul><ul><li>Manually Scan files received from Outside </li></ul></ul><ul><ul><li>Regularly update the software – to get latest definitions </li></ul></ul><ul><ul><li>Not always 100% effective! </li></ul></ul><ul><li>Firewalls </li></ul><ul><ul><li>Enable your Operating System Firewall (if built in) </li></ul></ul><ul><ul><li>If your broadband is always on – Good to have Firewall </li></ul></ul>
  20. 20. General Security <ul><li>Good Security Habits </li></ul><ul><ul><li>Lock your computer when you are away from it </li></ul></ul><ul><ul><li>Disconnect your computer from the Internet, if you are not using it </li></ul></ul><ul><ul><li>Evaluate your security settings </li></ul></ul><ul><ul><li>Back up all of your data </li></ul></ul>
  21. 21. SAFE BROWSING, EMAIL
  22. 22. Email & Chat Attachments Spam Chat & IM
  23. 23. Social Networks Limit Personal Info Privacy Settings Billboard Rule! Be Skeptical! Links & Add Ons
  24. 24. Secure Sites & Cookies <ul><li>https vs http </li></ul><ul><li>Check if the website has a valid Certificate </li></ul><ul><li>Cookies store information about you and your browsing habits </li></ul><ul><li>To increase your level of security, adjust your privacy and security settings on your browser </li></ul>
  25. 25. https Security Certificate Lock
  26. 26. MOBILE DEVICES
  27. 27. Mobile Devices Physical Security Password Protection Caution! USB! Wireless Security Key
  28. 28. ATTACKS AND THREATS
  29. 29. Important Attacks and Threats Today Social Engineering - Phishing Identity Theft
  30. 35. Nigerian Email Scam
  31. 36. PRIVACY
  32. 37. Privacy <ul><li>Limit exposure of your private information online </li></ul><ul><li>Encrypt confidential communication </li></ul><ul><li>Supplementing Passwords – Use secure data/passwords while supplementing </li></ul>
  33. 38. SOFTWARE & APPLICATIONS
  34. 39. Software and Applications Licensed! Updates & Patches File Sharing
  35. 40. Can YOU be Cautious?
  36. 41. Yes. You can!
  37. 42. Questions?
  38. 43. Thank You! Dominic Rajesh http://twitter/dominicrajesh http://domsownblog.blogspot.com

×