SlideShare a Scribd company logo
1 of 39
The Net is Dangerous:

How to Protect Yourself and Your Company



              Gihan Dias
         University of Moratuwa
Why do we use the Internet?

   To get Information
   To provide information
   To communicate with other people
   To transact business, etc.
What can happen to me on the
Internet?
   can get caught to a fraud
   can be misled by falsehoods
   can waste my time
   can lose my money
   can lose my reputation
   can lose my identity
   can be lured into dangerous situations
If we don't use the Internet?

   Must go to the library to find information
   Should read the newspaper to get the cricket
    scores
   Have to send postal letters
   Need to visit your bank to check your balance


    We are back in the 20th century
So What do we Do?

   We need to be careful

   on the network
   on the computer
   what we do
What we'll cover today

   e-Mail
   Web
   Your Computer
   You
   Your company
e-Mail
e-Mail Scams




   Try to get you to do something by telling a story
Get Your password
 Dear Webmail User
 Your mailbox has exceeded the limit of Quota
 Usage, which is as set by your manager, and
 access to your mailbox via our mail portal will
 be unavailable for sometime during this
 maintenance
 period.

 You will not be able to create new e-mail to
 send or receive again
 until you validate your mailbox.

 To re-validate your mailbox, you can CLICK HERE
 https://docs.google.com/spreadsheet/viewform?
 formkey=dDdaOHc1MnlPUEVpc2FkVNNfdewk4xcHc6MQ

 Thanks
 System Administrator.
Send Malware to your computer

Attn: Owner/Manager
Here with the Better Business Bureau notifies you that we have
 received a complaint (ID 272854705) from one of your
customers with respect to their dealership with you.
Please open the COMPLAINT REPORT below to obtain more
information on this matter and let us know of your point of view
as soon as possible.
We are looking forward to your prompt reply.
Regards,
Allyssa BONDS
How to avoid e-Mail scams

   Make sure your e-mail program has security
    features enabled
       don't ignore warning messages
   Be suspicious of attachments or links
       attachments may contain malware
       links may go to sites which contain malware, or try
        to get your password
   Check who has sent the e-mail
       even if you recognise the "From:" adress, it may
        have been sent by a virus
How to avoid e-Mail scams (cont.)

   Ignore any offers to give / make money
   Be careful of people asking for money
   Don't give any personal info to website, unless
    you know who it is and have typed the address
    on the browser
       credit card / bank info
       phone no., address, e-mail
How to avoid e-Mail scams (cont.)

   Check the spelling, grammar and language of
    the message – many scam mails are in poor
    English
   Beware of messages which look just like
    message you get from Facebook, your bank,
    etc. - a scammer could have sent them
       may find your family members on Facebook and
        send mail as them
How to avoid e-Mail scams (cont.)

   Your company should run a spam / malware
    filter
       don't bypass it
   Deletes most viruses
   Can't delete all spam / scams
       one man's spam is another man's ham
       scammers are getting very sophisiticated
Junk Folder

   Today's e-mail programs are good at detecting
    viruses, spam, etc.
   They usually move spam to a "Junk" folder
       only problem, they may move good messages –
        usually from people not in your address book – to
        the junk folder
   Check your junk folder occasionally
Web
Secure connections

   A secure (https) connection
    1. secures connection between your computer and a
      website so outsiders can't read what you type
    2. confirms the identity of the site
      Indicated by a padlock or similar icon on your
      browser
   Verify the owner of the website by clicking on
    the address bar
   Don't type in passwords or credit card nos.
    unless you are on a verified secure connection
Personal Information

   Many websites ask for all sorts of personal
    information
   Do they really need it?
   Don't give them your main e-mail address
       create a webmail address just for site registrations
   Don't give any information they don't need
       just type in something
Passwords

   Most common way to authenticate you
   Use good passwords (next slide)
   Don't share passwords across sites
   Never give your password to another person
Good Passwords

   Hackers use software to check common
    passwords
       dont use "password" or "abc123" as your password
       a local site was hacked recently – its password was
        admin123
   Passwords should be a long as possibe
       at least 8 characters
   Use a mix of capitals, simples, numbers and
    symbols
       e.g. gR5h@@QT
How to Remember Passwords

   Think of a phrase – derive the password from it
    e.g. Strong passwords are safer
          s+rpW@saF3r
   Write it down in a safe place
       don't stick it on your computer
   Keep a copy in a safer place
Your Computer
Keep your Computer free of
Malware
   Make sure you run one antivirus software, and
    it is up to date
   Enable security settings on the computer
       should by done by corporate IT
   Beware of e-mail attachments
   Don't download videos, slides, etc. from
    unknown places
   Don't stick USB drives on your computer
       and don't stick your stick in unnecessary places
Vulnerabilities

   All computers and software have vulnerabilities
   Make sure your operating system (Windows)
    and all other software is up-to-date
       run windows update
       should be set by IT
   Disable features you don't use
   Don't download software
       who knows what they do
Sensitive Data

   What is on your computer?
   Should it be there?
       company data
       personal files
   Keep sensitive data where it should be
       on a server?
       encrypted?
   Don't send or receive sensitive data unless
    authorised
Backup

   What will happen if your hard disk crashes
    today
   or your computer is stolen?

   Make sure all your data is backed up
       IT should handle it
   Back up your home computer too
   Be careful of on-line backup services
You
Your Identity

   Your identity includes your name, e-mail,
    bank/credit card numbers, etc.
   Your identity can be stolen on-line
       your e-mail
       your credit card number
       your personal information
       your Facebook account
   Safeguard all of these (and more)
Your Reputation

   What you say and do
   What others say about you

   Guard what you say on the net (including e-mail
    and facebook)
       nothing is private
   You are not just you, but representing your
    company
   Difficult to control what others say about you
Your Company
Corporate Data and Reputation

   Your company has confidential information
       needs to be guarded
   What you say may be taken as coming from the
    company
       be careful what you say on the net
   Company should have an official net presence
       Facebook, too
   Others may post about your company
       respond appropriately
Social Engineering

   It's not necessary to hack a password by trying
    a million combinations
   Sometimes just asking will do it.
   People trust people – we try to help them
   If something is routine, then you don't think
    about it
       if a call or an e-mail seems legitimate, you act on it
Is Security Easy?

   No
       Security is a pain in the ...
   Tension Between Security and Other Values
       Ease of use
       Public Safety
But not having security is worse



   Your money, time, data, reputation etc. could
    be lost
What Should I Do?

   Follow security procedures
   Be vigilant
   Have a back-up plan
Questions?

   Gihan Dias
 gihan@uom.lk
   Do not install             strong passwords
    unnecessary software       sharing passwords
   Avoiding Email Traps    Don't open email attachments unless
                            you know for certain what it is
   update your operating   Be aware that actions have
    system and              consequences - ex: nude photos, bad
                            language, inappropriate conduct, etc. -
    applications (windows   could have legal impacts,
    update)                 embarrassment, or affect future job
                            opportunities
   backup
   The Internet is inescapable – both in your
    professional as well as your personal life. With
    our computers and phones, we are on the net
    at all times. But the net is dangerous. Whether
    you use e-mail, e-commerce, or even just a
    spreadsheet, you may not only be putting
    yourself in danger, but your whole company.
   In this presentation, Prof. Dias will explain
    some of the common ways you may be
    attacked when using Internet services, and how
    you can protect yourself against these attacks.
   spam                   sensitive data on your
   phishing                computer
   e-banking
                           loss of laptop / mobile
                            phone
   botnets                    address books
   keyloggers             gmail
   ssl certificates       vulnerabilities
       site identity      social engineering
       encryption
                           identity theft
   wireless
                           on-line postings

More Related Content

What's hot

CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 

What's hot (20)

CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 

Similar to The Net is Dangerous

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 

Similar to The Net is Dangerous (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Email
EmailEmail
Email
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

The Net is Dangerous

  • 1. The Net is Dangerous: How to Protect Yourself and Your Company Gihan Dias University of Moratuwa
  • 2. Why do we use the Internet?  To get Information  To provide information  To communicate with other people  To transact business, etc.
  • 3. What can happen to me on the Internet?  can get caught to a fraud  can be misled by falsehoods  can waste my time  can lose my money  can lose my reputation  can lose my identity  can be lured into dangerous situations
  • 4. If we don't use the Internet?  Must go to the library to find information  Should read the newspaper to get the cricket scores  Have to send postal letters  Need to visit your bank to check your balance  We are back in the 20th century
  • 5. So What do we Do?  We need to be careful  on the network  on the computer  what we do
  • 6. What we'll cover today  e-Mail  Web  Your Computer  You  Your company
  • 8. e-Mail Scams  Try to get you to do something by telling a story
  • 9. Get Your password Dear Webmail User Your mailbox has exceeded the limit of Quota Usage, which is as set by your manager, and access to your mailbox via our mail portal will be unavailable for sometime during this maintenance period. You will not be able to create new e-mail to send or receive again until you validate your mailbox. To re-validate your mailbox, you can CLICK HERE https://docs.google.com/spreadsheet/viewform? formkey=dDdaOHc1MnlPUEVpc2FkVNNfdewk4xcHc6MQ Thanks System Administrator.
  • 10. Send Malware to your computer Attn: Owner/Manager Here with the Better Business Bureau notifies you that we have received a complaint (ID 272854705) from one of your customers with respect to their dealership with you. Please open the COMPLAINT REPORT below to obtain more information on this matter and let us know of your point of view as soon as possible. We are looking forward to your prompt reply. Regards, Allyssa BONDS
  • 11. How to avoid e-Mail scams  Make sure your e-mail program has security features enabled  don't ignore warning messages  Be suspicious of attachments or links  attachments may contain malware  links may go to sites which contain malware, or try to get your password  Check who has sent the e-mail  even if you recognise the "From:" adress, it may have been sent by a virus
  • 12. How to avoid e-Mail scams (cont.)  Ignore any offers to give / make money  Be careful of people asking for money  Don't give any personal info to website, unless you know who it is and have typed the address on the browser  credit card / bank info  phone no., address, e-mail
  • 13. How to avoid e-Mail scams (cont.)  Check the spelling, grammar and language of the message – many scam mails are in poor English  Beware of messages which look just like message you get from Facebook, your bank, etc. - a scammer could have sent them  may find your family members on Facebook and send mail as them
  • 14. How to avoid e-Mail scams (cont.)  Your company should run a spam / malware filter  don't bypass it  Deletes most viruses  Can't delete all spam / scams  one man's spam is another man's ham  scammers are getting very sophisiticated
  • 15. Junk Folder  Today's e-mail programs are good at detecting viruses, spam, etc.  They usually move spam to a "Junk" folder  only problem, they may move good messages – usually from people not in your address book – to the junk folder  Check your junk folder occasionally
  • 16. Web
  • 17. Secure connections  A secure (https) connection 1. secures connection between your computer and a website so outsiders can't read what you type 2. confirms the identity of the site Indicated by a padlock or similar icon on your browser  Verify the owner of the website by clicking on the address bar  Don't type in passwords or credit card nos. unless you are on a verified secure connection
  • 18. Personal Information  Many websites ask for all sorts of personal information  Do they really need it?  Don't give them your main e-mail address  create a webmail address just for site registrations  Don't give any information they don't need  just type in something
  • 19. Passwords  Most common way to authenticate you  Use good passwords (next slide)  Don't share passwords across sites  Never give your password to another person
  • 20. Good Passwords  Hackers use software to check common passwords  dont use "password" or "abc123" as your password  a local site was hacked recently – its password was admin123  Passwords should be a long as possibe  at least 8 characters  Use a mix of capitals, simples, numbers and symbols  e.g. gR5h@@QT
  • 21. How to Remember Passwords  Think of a phrase – derive the password from it e.g. Strong passwords are safer s+rpW@saF3r  Write it down in a safe place  don't stick it on your computer  Keep a copy in a safer place
  • 23. Keep your Computer free of Malware  Make sure you run one antivirus software, and it is up to date  Enable security settings on the computer  should by done by corporate IT  Beware of e-mail attachments  Don't download videos, slides, etc. from unknown places  Don't stick USB drives on your computer  and don't stick your stick in unnecessary places
  • 24. Vulnerabilities  All computers and software have vulnerabilities  Make sure your operating system (Windows) and all other software is up-to-date  run windows update  should be set by IT  Disable features you don't use  Don't download software  who knows what they do
  • 25. Sensitive Data  What is on your computer?  Should it be there?  company data  personal files  Keep sensitive data where it should be  on a server?  encrypted?  Don't send or receive sensitive data unless authorised
  • 26. Backup  What will happen if your hard disk crashes today  or your computer is stolen?  Make sure all your data is backed up  IT should handle it  Back up your home computer too  Be careful of on-line backup services
  • 27. You
  • 28. Your Identity  Your identity includes your name, e-mail, bank/credit card numbers, etc.  Your identity can be stolen on-line  your e-mail  your credit card number  your personal information  your Facebook account  Safeguard all of these (and more)
  • 29. Your Reputation  What you say and do  What others say about you  Guard what you say on the net (including e-mail and facebook)  nothing is private  You are not just you, but representing your company  Difficult to control what others say about you
  • 31. Corporate Data and Reputation  Your company has confidential information  needs to be guarded  What you say may be taken as coming from the company  be careful what you say on the net  Company should have an official net presence  Facebook, too  Others may post about your company  respond appropriately
  • 32. Social Engineering  It's not necessary to hack a password by trying a million combinations  Sometimes just asking will do it.  People trust people – we try to help them  If something is routine, then you don't think about it  if a call or an e-mail seems legitimate, you act on it
  • 33. Is Security Easy?  No  Security is a pain in the ...  Tension Between Security and Other Values  Ease of use  Public Safety
  • 34. But not having security is worse  Your money, time, data, reputation etc. could be lost
  • 35. What Should I Do?  Follow security procedures  Be vigilant  Have a back-up plan
  • 36. Questions? Gihan Dias gihan@uom.lk
  • 37. Do not install  strong passwords unnecessary software  sharing passwords  Avoiding Email Traps Don't open email attachments unless you know for certain what it is  update your operating Be aware that actions have system and consequences - ex: nude photos, bad language, inappropriate conduct, etc. - applications (windows could have legal impacts, update) embarrassment, or affect future job opportunities  backup
  • 38. The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.  In this presentation, Prof. Dias will explain some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
  • 39. spam  sensitive data on your  phishing computer  e-banking  loss of laptop / mobile phone  botnets  address books  keyloggers  gmail  ssl certificates  vulnerabilities  site identity  social engineering  encryption  identity theft  wireless  on-line postings