SlideShare a Scribd company logo
Basic Internet Security
By:
Muhammad Faheem Akhtar
www.mfaheemakhtar.com
The Purpose
The purpose of this Presentations is to share
[some of] my security knowledge
with you.
Disclaimer
This presentation is aimed to explain “How to
Protect” not “How to hack”. Whatever you
will learn here must not be used in any
unethical way. You will be responsible
for anything you do.
I don’t have anything confidential.
Why someone will hack me?
I don’t care. :P
Importance of PC
Your PC is one of the most important thing you
have. Your PC is always the first target of the
hackers.
And If someone hacks your PC, then he can:
1. Access your all personal files and folders.
2. Install malicious scripts and software.
3. Steal your login details.
4. Spy and Blackmail you.
Importance of Online Accounts
Like your PC, your online accounts such as Google,
Facebook, Twitter etc. can also be hacked. And if
that happens, then the hacker can:
1. Access your e-mails, messages, files and folders.
2. Withdraw your all money from your Account.
3. Use your accounts to hack others.
4. Spy and Blackmail you.
OMG! :O
I did not know that!
What should I do?
How can I protect myself?
You can’t. 
But you can increase your
defenses by following these steps.
Turn OFF AutoPlay
Turn OFF AutoPlay
AutoPlay helps malicious scripts run
automatically, from your drives.
Result = Less Chances of Infection 
Install an Antivirus
Install a FREE, updated and powerful Antivirus
Program like Avast, AVG, Avira, etc.
Instead of Cracked, Outdated and Dumb
Antivirus.
Result = Real-time Protection and Less Chances
of Infection 
Install a Firewall
Install a FREE, updated and powerful Firewall
Program like Zone Alarm.
Instead of Cracked, Outdated and Dumb
Firewall.
Result = Protection against unauthorized access.

Install an Anti-Spyware
Install a FREE, updated and powerful
Anti-Spyware Program like SUPERAntiSpyware,
MalwareBytes Anti-Malware, etc.
Instead of Cracked, Outdated and Dumb Security
Software.
Result = Protection against Spywares 
Update Your Programs
Regularly update your Anti-virus, Firewall,
Anti-Spyware, Browser, Plug-ins, and everything
that connects to the Internet.
No Update = Outdated + Vulnerable
Result = Less Vulnerabilities 
Make Backups
Regularly backup your important files.
No backup + Something BAD = DESTROYED! 
Result = Protection against accidents and
ransom-wares 
Use HTTPs
Use HTTPs whenever possible.
Don’t use HTTP to send any sensitive
information like Passwords.
HTTP + Password + MiM = HACKED! 
Result = Protection against Man-in-Middle
Attack 
Are you using HTTPs?
Verify that you are really using HTTPs.
SSL Certificates can be used to verify that.
[A green lock icon ]
HTTPs + Fake Certificate = HACKED! 
Result = Protection against Fake HTTPs 
Where are you?
Verify that you are on the correct domain.
e.g. Facebook.com
You + Fakebook.com = HACKED! 
Result = Protection against Phishing 
Don’t Download!
Don’t download anything from un-trusted
sources like the sites providing cracked
software.
PC + Trojans = HACKED! 
Result = Protection against Trojans 
Don’t Trust ME 
Don’t trust anyone [including me]. 
Apply everything you have learnt on every link.
You + Link by your friend* = HACKED! 
Result = Protection against Trojans 
* Some malware can share links on behalf of your friends
without their knowledge.
Hey! Can I have your Password?
I said don’t trust me! :P
Don’t give your passwords or any sensitive
information to anyone.
You + ME* = HACKED! 
Result = Protection against Social-Engineering 
* not me . ME = anyone who wants to hack you
No more Tips! 
Do you have?
Share in Comments
Don’t forget to visit my Website
Thank YOU! 
For reading my slide!

More Related Content

What's hot

Firewall
FirewallFirewall
Firewall
sajeena81
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Malware
MalwareMalware
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Hacking
HackingHacking
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Ivy Rose Recierdo
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Malicious
MaliciousMalicious
Malicious
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Malware
MalwareMalware
Malware
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Hacking
HackingHacking
Hacking
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Malware
MalwareMalware
Malware
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Viewers also liked

Internet security
Internet securityInternet security
Internet security
gohel
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
hoshmand kareem
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
dkp205
 
De955 Turnaround Management 1
De955 Turnaround Management 1De955 Turnaround Management 1
De955 Turnaround Management 1GOEL'S WORLD
 
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
Turnaround Management Society
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec
 
9 business-turn around-strategies
9 business-turn around-strategies9 business-turn around-strategies
9 business-turn around-strategies
Gogo Erekosima
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Cyber security specialist performance appraisal
Cyber security specialist performance appraisalCyber security specialist performance appraisal
Cyber security specialist performance appraisal
codyfred747
 
Top 8 marketing administrative assistant resume samples
Top 8 marketing administrative assistant resume samplesTop 8 marketing administrative assistant resume samples
Top 8 marketing administrative assistant resume samples
mikenagy357
 
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
AnastasiyaF
 
Part 1 Music Video Prep
Part 1 Music Video PrepPart 1 Music Video Prep
Part 1 Music Video Prep
miabanks7
 
Top 8 human resources staff resume samples
Top 8 human resources staff resume samplesTop 8 human resources staff resume samples
Top 8 human resources staff resume samplesguadiolamed
 

Viewers also liked (20)

Internet security
Internet securityInternet security
Internet security
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Internet security
Internet securityInternet security
Internet security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
De955 Turnaround Management 1
De955 Turnaround Management 1De955 Turnaround Management 1
De955 Turnaround Management 1
 
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
International Turnaround Management Standard Version 1.5 ONLY PREVIEW first 1...
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
9 business-turn around-strategies
9 business-turn around-strategies9 business-turn around-strategies
9 business-turn around-strategies
 
Crm At FlipKart
Crm At FlipKartCrm At FlipKart
Crm At FlipKart
 
Turnaround Management
Turnaround ManagementTurnaround Management
Turnaround Management
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Turnaround Strategies
Turnaround StrategiesTurnaround Strategies
Turnaround Strategies
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Cyber security specialist performance appraisal
Cyber security specialist performance appraisalCyber security specialist performance appraisal
Cyber security specialist performance appraisal
 
Top 8 marketing administrative assistant resume samples
Top 8 marketing administrative assistant resume samplesTop 8 marketing administrative assistant resume samples
Top 8 marketing administrative assistant resume samples
 
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
12. Горад у ІХ - сярэдзіне ХІІІ ст. Прыняцце хрысціянства
 
Part 1 Music Video Prep
Part 1 Music Video PrepPart 1 Music Video Prep
Part 1 Music Video Prep
 
Top 8 human resources staff resume samples
Top 8 human resources staff resume samplesTop 8 human resources staff resume samples
Top 8 human resources staff resume samples
 

Similar to Basic Internet Security

Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
Tahmid Munaz
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Safe Computing
Safe ComputingSafe Computing
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Internet security software
Internet security softwareInternet security software
Internet security software
university of education,Lahore
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 

Similar to Basic Internet Security (20)

Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Protect
ProtectProtect
Protect
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 

Recently uploaded

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 

Recently uploaded (20)

1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 

Basic Internet Security

  • 1. Basic Internet Security By: Muhammad Faheem Akhtar www.mfaheemakhtar.com
  • 2. The Purpose The purpose of this Presentations is to share [some of] my security knowledge with you.
  • 3. Disclaimer This presentation is aimed to explain “How to Protect” not “How to hack”. Whatever you will learn here must not be used in any unethical way. You will be responsible for anything you do.
  • 4. I don’t have anything confidential. Why someone will hack me? I don’t care. :P
  • 5. Importance of PC Your PC is one of the most important thing you have. Your PC is always the first target of the hackers. And If someone hacks your PC, then he can: 1. Access your all personal files and folders. 2. Install malicious scripts and software. 3. Steal your login details. 4. Spy and Blackmail you.
  • 6. Importance of Online Accounts Like your PC, your online accounts such as Google, Facebook, Twitter etc. can also be hacked. And if that happens, then the hacker can: 1. Access your e-mails, messages, files and folders. 2. Withdraw your all money from your Account. 3. Use your accounts to hack others. 4. Spy and Blackmail you.
  • 7. OMG! :O I did not know that! What should I do? How can I protect myself?
  • 8. You can’t.  But you can increase your defenses by following these steps.
  • 9. Turn OFF AutoPlay Turn OFF AutoPlay AutoPlay helps malicious scripts run automatically, from your drives. Result = Less Chances of Infection 
  • 10. Install an Antivirus Install a FREE, updated and powerful Antivirus Program like Avast, AVG, Avira, etc. Instead of Cracked, Outdated and Dumb Antivirus. Result = Real-time Protection and Less Chances of Infection 
  • 11. Install a Firewall Install a FREE, updated and powerful Firewall Program like Zone Alarm. Instead of Cracked, Outdated and Dumb Firewall. Result = Protection against unauthorized access. 
  • 12. Install an Anti-Spyware Install a FREE, updated and powerful Anti-Spyware Program like SUPERAntiSpyware, MalwareBytes Anti-Malware, etc. Instead of Cracked, Outdated and Dumb Security Software. Result = Protection against Spywares 
  • 13. Update Your Programs Regularly update your Anti-virus, Firewall, Anti-Spyware, Browser, Plug-ins, and everything that connects to the Internet. No Update = Outdated + Vulnerable Result = Less Vulnerabilities 
  • 14. Make Backups Regularly backup your important files. No backup + Something BAD = DESTROYED!  Result = Protection against accidents and ransom-wares 
  • 15. Use HTTPs Use HTTPs whenever possible. Don’t use HTTP to send any sensitive information like Passwords. HTTP + Password + MiM = HACKED!  Result = Protection against Man-in-Middle Attack 
  • 16. Are you using HTTPs? Verify that you are really using HTTPs. SSL Certificates can be used to verify that. [A green lock icon ] HTTPs + Fake Certificate = HACKED!  Result = Protection against Fake HTTPs 
  • 17. Where are you? Verify that you are on the correct domain. e.g. Facebook.com You + Fakebook.com = HACKED!  Result = Protection against Phishing 
  • 18. Don’t Download! Don’t download anything from un-trusted sources like the sites providing cracked software. PC + Trojans = HACKED!  Result = Protection against Trojans 
  • 19. Don’t Trust ME  Don’t trust anyone [including me].  Apply everything you have learnt on every link. You + Link by your friend* = HACKED!  Result = Protection against Trojans  * Some malware can share links on behalf of your friends without their knowledge.
  • 20. Hey! Can I have your Password? I said don’t trust me! :P Don’t give your passwords or any sensitive information to anyone. You + ME* = HACKED!  Result = Protection against Social-Engineering  * not me . ME = anyone who wants to hack you
  • 21. No more Tips!  Do you have? Share in Comments
  • 22. Don’t forget to visit my Website
  • 23. Thank YOU!  For reading my slide!