SlideShare a Scribd company logo
1 of 15
Download to read offline
uide to Cyber Etiquette
www.infosectrain.com | sales@infosectra
ectrain.com | sales@infosectrain.com
y's digital world, cybersecurity and Information security has become an
al concern for every organization. Irrespective of the size and strength of an
ation, a minor cyber attack can cost millions to recover. This informative
cludes the Dos and Don'ts of Internet security that help understand the best
ecurity practices.
and Information security has become an
al concern for every organization. Irrespective of the size and strength of an
ation, a minor cyber attack can cost millions to recover. This informative
cludes the Dos and Don'ts of Internet security that help understand the best
Slide 2
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
s Cyber Etiquette?
etiquette is a code of conduct or behavior required to follow while using the
t to perform various tasks. It is also referred to as Cyber Netiquette. It consists
ptable norms and rules to ensure secure communication over the Internet.
ules help to get aware of cyber threats associated with the Internet and
t wrongdoings.
's of Internet Security
of HTTPS sites
urfing for banking and shopping websites or paying the bills online, check
er the website's URL begins with 'HTTPS.' Also, check for the padlock icon,
ndicates a secure connection between the website and the server.
osectrain.com | sales@infosectrain.com
ndicates a secure connection between the website and the server.
of strong password
use unique and hard-to-guess passwords. Create a password with special
ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same
ords for all online accounts.
t Logout of accounts
g into an online account creates a session with you and your website. If this
remains active, it might allow attackers to exploit your session, leading to a
hijacking. Ensure you log out of all your online accounts when you are done,
ally when using a public computer.
etiquette is a code of conduct or behavior required to follow while using the
t to perform various tasks. It is also referred to as Cyber Netiquette. It consists
ptable norms and rules to ensure secure communication over the Internet.
ules help to get aware of cyber threats associated with the Internet and
urfing for banking and shopping websites or paying the bills online, check
er the website's URL begins with 'HTTPS.' Also, check for the padlock icon,
ndicates a secure connection between the website and the server.
ndicates a secure connection between the website and the server.
guess passwords. Create a password with special
ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same
g into an online account creates a session with you and your website. If this
remains active, it might allow attackers to exploit your session, leading to a
hijacking. Ensure you log out of all your online accounts when you are done,
Slide 3
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
e verified software or websites
k whether the software or website is secured and verified before
loading them into your system.
ter the URL of the banking website manually
ss your bank's website manually by typing its URL in the search bar. Never
he links in your email or text message, which can lead to malware attacks.
cure Backup regularly
regular backup of all your essential files. Having backup files on a hard drive
ng trusted cloud-based backup services is necessary, and it helps to recover
ata quickly.
osectrain.com | sales@infosectrain.com
ata quickly.
Don'ts of Internet Security
ver enable 'Keep me logged In' and 'Remember me' checkboxes
enabling 'Keep me logged in' or 'Remember me' checkboxes on public
uters. It can save and manage your credentials in the system leading to
attacks.
oid responding to pop-up messages
r respond to pop-up ads, as it can redirect you to an illegitimate website
makes you enter your credentials, leading to malware attacks. Close all kinds
p-up screens using the task manager.
k whether the software or website is secured and verified before
ss your bank's website manually by typing its URL in the search bar. Never
he links in your email or text message, which can lead to malware attacks.
regular backup of all your essential files. Having backup files on a hard drive
based backup services is necessary, and it helps to recover
ver enable 'Keep me logged In' and 'Remember me' checkboxes
enabling 'Keep me logged in' or 'Remember me' checkboxes on public
uters. It can save and manage your credentials in the system leading to
up ads, as it can redirect you to an illegitimate website
makes you enter your credentials, leading to malware attacks. Close all kinds
Slide 4
b24 bhavika.official@outlook.com, 3/8/2021
b25 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
er use free and public Internet sources
using free, unsecured Wi-Fi, especially for shopping or banking on the
et. Do not log into your social media profiles, as it can reveal your
nt credentials, and the attacker can hack your social media profile.
not share your confidential information.
share your personal/bank details over a phone, email, or SMS, even if
ller/sender seems genuine, and it can lead to a Vishing
nal Identifiable Information (PII), such as an Aadhar card number or SSN,
ique number that connects with all your Bank, Health, and other
es. If it is required to share your Aadhaar card details or SSN details,
the masked Aadhaar number or SSN to avoid cyber attacks.
osectrain.com | sales@infosectrain.com
the masked Aadhaar number or SSN to avoid cyber attacks.
not use unsecured websites.
use or visit unsecured websites which are not protected and verified.
websites allow entering even if it is not secure using the Advanced
, and they might be legitimate or illegitimate websites. So do not enter
uch unsecure websites.
cTrain is one of the best training and consultancy services that offers
ctor-led training on a wide range of Cybersecurity, Information security,
oud security domains. Our training program helps you to enhance your
sional career to the next level. Check out our courses, choose your best
le training program, and enroll now.
Fi, especially for shopping or banking on the
et. Do not log into your social media profiles, as it can reveal your
nt credentials, and the attacker can hack your social media profile.
share your personal/bank details over a phone, email, or SMS, even if
attack.
card number or SSN,
ique number that connects with all your Bank, Health, and other
card details or SSN details,
number or SSN to avoid cyber attacks.
number or SSN to avoid cyber attacks.
use or visit unsecured websites which are not protected and verified.
websites allow entering even if it is not secure using the Advanced
, and they might be legitimate or illegitimate websites. So do not enter
is one of the best training and consultancy services that offers
, Information security,
oud security domains. Our training program helps you to enhance your
sional career to the next level. Check out our courses, choose your best
Slide 5
b1 bhavika.official@outlook.com, 3/8/2021
b2 Please add more slides for -
1.-Course content as we did in InfosecTrain PPT Template
2-Summary slides
3-Questions Slides
4-Thank you slide
bhavika.official@outlook.com, 3/8/2021
bout InfosecTrain
tablished in 2016, we are one of the finest
curity and Technology Training and
onsulting company
de range of professional training programs,
rtifications & consulting services in the IT
rtifications & consulting services in the IT
nd Cyber Security domain
gh-quality technical services, certifications
customized training programs curated with
ofessionals of over 15 years of combined
perience in the domain
nfosectrain.com | sales@infosectrain.com
de range of professional training programs,
quality technical services, certifications
customized training programs curated with
Our Endorsements
nfosectrain.com | sales@infosectrain.com
Our Endorsements
hy InfosecTrain
Flexible modes
of Training
fied and
rienced Instructors
Access to the
recorded
sessions
Tailor Made
Training
training
pletion
nfosectrain.com | sales@infosectrain.com
Global Learning Par
Access to the
recorded
sessions
Our Trusted Clients
nfosectrain.com | sales@infosectrain.com
Our Trusted Clients
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com
IND: 1800-843-7890 (Toll Free) / US: +1 657-722-11
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com

More Related Content

Similar to A Guide to Cyber Etiquette.pdf

cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 

Similar to A Guide to Cyber Etiquette.pdf (20)

cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Kali linux cookbook
Kali linux cookbookKali linux cookbook
Kali linux cookbook
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 

More from Infosec Train

INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORInfosec Train
 
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITY
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITYFREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITY
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITYInfosec Train
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Interview Questions for Azure Security.pdf
Interview Questions for Azure Security.pdfInterview Questions for Azure Security.pdf
Interview Questions for Azure Security.pdfInfosec Train
 
CyberArk Interview.pdf
CyberArk Interview.pdfCyberArk Interview.pdf
CyberArk Interview.pdfInfosec Train
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfInfosec Train
 
Cloud Security Engineer.pdf
Cloud Security Engineer.pdfCloud Security Engineer.pdf
Cloud Security Engineer.pdfInfosec Train
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfInfosec Train
 
What is Incident Response in Cybersecurity.pptx
What is Incident Response in Cybersecurity.pptxWhat is Incident Response in Cybersecurity.pptx
What is Incident Response in Cybersecurity.pptxInfosec Train
 
Top Cyber Security Risks for Businesses.pptx
Top Cyber Security Risks for Businesses.pptxTop Cyber Security Risks for Businesses.pptx
Top Cyber Security Risks for Businesses.pptxInfosec Train
 
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptx
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptxTop 5 Know Skills & Responsibilities of a SOC Analyst.pptx
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptxInfosec Train
 
Exploring the Power of Data Visualization & its Various Applications.pptx
Exploring the Power of Data Visualization & its Various Applications.pptxExploring the Power of Data Visualization & its Various Applications.pptx
Exploring the Power of Data Visualization & its Various Applications.pptxInfosec Train
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfInfosec Train
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdfInfosec Train
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfInfosec Train
 
Career Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfCareer Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfInfosec Train
 
Benefits of Earning the AWS Architect Certification.pdf
Benefits of Earning the AWS Architect Certification.pdfBenefits of Earning the AWS Architect Certification.pdf
Benefits of Earning the AWS Architect Certification.pdfInfosec Train
 

More from Infosec Train (20)

INTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITORINTERVIEW QUESTION FOR IT AUDITOR
INTERVIEW QUESTION FOR IT AUDITOR
 
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITY
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITYFREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITY
FREQUENTLY ASKED QUESTION IN A TESTER INTERVIEW PENETRATION AND VULNERABILITY
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Interview Questions for Azure Security.pdf
Interview Questions for Azure Security.pdfInterview Questions for Azure Security.pdf
Interview Questions for Azure Security.pdf
 
CyberArk Interview.pdf
CyberArk Interview.pdfCyberArk Interview.pdf
CyberArk Interview.pdf
 
CyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdfCyberArk Interview Questions and Answers for 2022.pdf
CyberArk Interview Questions and Answers for 2022.pdf
 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
 
Cloud Security Engineer.pdf
Cloud Security Engineer.pdfCloud Security Engineer.pdf
Cloud Security Engineer.pdf
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
What is Incident Response in Cybersecurity.pptx
What is Incident Response in Cybersecurity.pptxWhat is Incident Response in Cybersecurity.pptx
What is Incident Response in Cybersecurity.pptx
 
Top Cyber Security Risks for Businesses.pptx
Top Cyber Security Risks for Businesses.pptxTop Cyber Security Risks for Businesses.pptx
Top Cyber Security Risks for Businesses.pptx
 
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptx
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptxTop 5 Know Skills & Responsibilities of a SOC Analyst.pptx
Top 5 Know Skills & Responsibilities of a SOC Analyst.pptx
 
Exploring the Power of Data Visualization & its Various Applications.pptx
Exploring the Power of Data Visualization & its Various Applications.pptxExploring the Power of Data Visualization & its Various Applications.pptx
Exploring the Power of Data Visualization & its Various Applications.pptx
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdf
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdf
 
Career Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdfCareer Benefits of Microsoft Security Certifications.pdf
Career Benefits of Microsoft Security Certifications.pdf
 
Benefits of Earning the AWS Architect Certification.pdf
Benefits of Earning the AWS Architect Certification.pdfBenefits of Earning the AWS Architect Certification.pdf
Benefits of Earning the AWS Architect Certification.pdf
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

A Guide to Cyber Etiquette.pdf

  • 1. uide to Cyber Etiquette www.infosectrain.com | sales@infosectra
  • 2. ectrain.com | sales@infosectrain.com y's digital world, cybersecurity and Information security has become an al concern for every organization. Irrespective of the size and strength of an ation, a minor cyber attack can cost millions to recover. This informative cludes the Dos and Don'ts of Internet security that help understand the best ecurity practices. and Information security has become an al concern for every organization. Irrespective of the size and strength of an ation, a minor cyber attack can cost millions to recover. This informative cludes the Dos and Don'ts of Internet security that help understand the best
  • 3. Slide 2 b1 bhavika.official@outlook.com, 3/8/2021 b2 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021
  • 4. s Cyber Etiquette? etiquette is a code of conduct or behavior required to follow while using the t to perform various tasks. It is also referred to as Cyber Netiquette. It consists ptable norms and rules to ensure secure communication over the Internet. ules help to get aware of cyber threats associated with the Internet and t wrongdoings. 's of Internet Security of HTTPS sites urfing for banking and shopping websites or paying the bills online, check er the website's URL begins with 'HTTPS.' Also, check for the padlock icon, ndicates a secure connection between the website and the server. osectrain.com | sales@infosectrain.com ndicates a secure connection between the website and the server. of strong password use unique and hard-to-guess passwords. Create a password with special ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same ords for all online accounts. t Logout of accounts g into an online account creates a session with you and your website. If this remains active, it might allow attackers to exploit your session, leading to a hijacking. Ensure you log out of all your online accounts when you are done, ally when using a public computer. etiquette is a code of conduct or behavior required to follow while using the t to perform various tasks. It is also referred to as Cyber Netiquette. It consists ptable norms and rules to ensure secure communication over the Internet. ules help to get aware of cyber threats associated with the Internet and urfing for banking and shopping websites or paying the bills online, check er the website's URL begins with 'HTTPS.' Also, check for the padlock icon, ndicates a secure connection between the website and the server. ndicates a secure connection between the website and the server. guess passwords. Create a password with special ers, symbols, numbers, uppercase, and lowercase letters. Do not use the same g into an online account creates a session with you and your website. If this remains active, it might allow attackers to exploit your session, leading to a hijacking. Ensure you log out of all your online accounts when you are done,
  • 5. Slide 3 b1 bhavika.official@outlook.com, 3/8/2021 b2 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021
  • 6. e verified software or websites k whether the software or website is secured and verified before loading them into your system. ter the URL of the banking website manually ss your bank's website manually by typing its URL in the search bar. Never he links in your email or text message, which can lead to malware attacks. cure Backup regularly regular backup of all your essential files. Having backup files on a hard drive ng trusted cloud-based backup services is necessary, and it helps to recover ata quickly. osectrain.com | sales@infosectrain.com ata quickly. Don'ts of Internet Security ver enable 'Keep me logged In' and 'Remember me' checkboxes enabling 'Keep me logged in' or 'Remember me' checkboxes on public uters. It can save and manage your credentials in the system leading to attacks. oid responding to pop-up messages r respond to pop-up ads, as it can redirect you to an illegitimate website makes you enter your credentials, leading to malware attacks. Close all kinds p-up screens using the task manager. k whether the software or website is secured and verified before ss your bank's website manually by typing its URL in the search bar. Never he links in your email or text message, which can lead to malware attacks. regular backup of all your essential files. Having backup files on a hard drive based backup services is necessary, and it helps to recover ver enable 'Keep me logged In' and 'Remember me' checkboxes enabling 'Keep me logged in' or 'Remember me' checkboxes on public uters. It can save and manage your credentials in the system leading to up ads, as it can redirect you to an illegitimate website makes you enter your credentials, leading to malware attacks. Close all kinds
  • 7. Slide 4 b24 bhavika.official@outlook.com, 3/8/2021 b25 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021
  • 8. er use free and public Internet sources using free, unsecured Wi-Fi, especially for shopping or banking on the et. Do not log into your social media profiles, as it can reveal your nt credentials, and the attacker can hack your social media profile. not share your confidential information. share your personal/bank details over a phone, email, or SMS, even if ller/sender seems genuine, and it can lead to a Vishing nal Identifiable Information (PII), such as an Aadhar card number or SSN, ique number that connects with all your Bank, Health, and other es. If it is required to share your Aadhaar card details or SSN details, the masked Aadhaar number or SSN to avoid cyber attacks. osectrain.com | sales@infosectrain.com the masked Aadhaar number or SSN to avoid cyber attacks. not use unsecured websites. use or visit unsecured websites which are not protected and verified. websites allow entering even if it is not secure using the Advanced , and they might be legitimate or illegitimate websites. So do not enter uch unsecure websites. cTrain is one of the best training and consultancy services that offers ctor-led training on a wide range of Cybersecurity, Information security, oud security domains. Our training program helps you to enhance your sional career to the next level. Check out our courses, choose your best le training program, and enroll now. Fi, especially for shopping or banking on the et. Do not log into your social media profiles, as it can reveal your nt credentials, and the attacker can hack your social media profile. share your personal/bank details over a phone, email, or SMS, even if attack. card number or SSN, ique number that connects with all your Bank, Health, and other card details or SSN details, number or SSN to avoid cyber attacks. number or SSN to avoid cyber attacks. use or visit unsecured websites which are not protected and verified. websites allow entering even if it is not secure using the Advanced , and they might be legitimate or illegitimate websites. So do not enter is one of the best training and consultancy services that offers , Information security, oud security domains. Our training program helps you to enhance your sional career to the next level. Check out our courses, choose your best
  • 9. Slide 5 b1 bhavika.official@outlook.com, 3/8/2021 b2 Please add more slides for - 1.-Course content as we did in InfosecTrain PPT Template 2-Summary slides 3-Questions Slides 4-Thank you slide bhavika.official@outlook.com, 3/8/2021
  • 10. bout InfosecTrain tablished in 2016, we are one of the finest curity and Technology Training and onsulting company de range of professional training programs, rtifications & consulting services in the IT rtifications & consulting services in the IT nd Cyber Security domain gh-quality technical services, certifications customized training programs curated with ofessionals of over 15 years of combined perience in the domain nfosectrain.com | sales@infosectrain.com de range of professional training programs, quality technical services, certifications customized training programs curated with
  • 11. Our Endorsements nfosectrain.com | sales@infosectrain.com Our Endorsements
  • 12. hy InfosecTrain Flexible modes of Training fied and rienced Instructors Access to the recorded sessions Tailor Made Training training pletion nfosectrain.com | sales@infosectrain.com Global Learning Par Access to the recorded sessions
  • 13. Our Trusted Clients nfosectrain.com | sales@infosectrain.com Our Trusted Clients
  • 14.
  • 15. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800 UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com IND: 1800-843-7890 (Toll Free) / US: +1 657-722-11 UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com