This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
A Webinar on cyber Security Awareness and Digital Safety is hosted on the 7th of June, 2020. Sthir Yuwa in association with Information Security Response Team Nepal and Center For Cyber Security Research and Innovation conducted successfully. There were almost 70 participants on this webinar.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
This presentation was made by collecting all publicly available materials and it is purely for educational purpose. Author wants to thank each and every contributor of pictures, video, text in this presentation.
A Webinar on cyber Security Awareness and Digital Safety is hosted on the 7th of June, 2020. Sthir Yuwa in association with Information Security Response Team Nepal and Center For Cyber Security Research and Innovation conducted successfully. There were almost 70 participants on this webinar.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
Now a days ,our cyer is not secure.So, we need to know how we make our cyber secure from crime.In this file ,we are knowing that how we are secure from cyber crime and rebulotion of cyber security.
These are from the National Cyber Security Alliance (NCSA) for National Cyber Security Awareness Month (NCSAM) and are free to use. See https://staysafeonline.org/ for more info.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
This presentation explains a wide range of attacks / infections and provides tips to prevent them. Following these tips may help you protect your offline and online space including FB, Gmail, Bank Accounts etc.
Consider sharing with your friends, if you find this useful.
Feel free to share what you think in comments. Help me improve :)
Basic Android OS security mechanism,
Basic malware definition
Attacking Android platform with
Malware, Remote access, File is stealing and Social Engeering attack is methods have been done discussing in the class.
Attacking the Android:
Installing Kali Linux on android to perform attacks
Installing Dsploit for running attack with android (MITM, XSS, traffic sniffing…. Etc.)
Now a days ,our cyer is not secure.So, we need to know how we make our cyber secure from crime.In this file ,we are knowing that how we are secure from cyber crime and rebulotion of cyber security.
These are from the National Cyber Security Alliance (NCSA) for National Cyber Security Awareness Month (NCSAM) and are free to use. See https://staysafeonline.org/ for more info.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
This presentation explains a wide range of attacks / infections and provides tips to prevent them. Following these tips may help you protect your offline and online space including FB, Gmail, Bank Accounts etc.
Consider sharing with your friends, if you find this useful.
Feel free to share what you think in comments. Help me improve :)
Basic Android OS security mechanism,
Basic malware definition
Attacking Android platform with
Malware, Remote access, File is stealing and Social Engeering attack is methods have been done discussing in the class.
Attacking the Android:
Installing Kali Linux on android to perform attacks
Installing Dsploit for running attack with android (MITM, XSS, traffic sniffing…. Etc.)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
we have made this like computer application course material which is so functionable and any one can use it to develop your technological concept skill.
We Belete And Tadelech
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Hom
There is no such thing as too much security when it comes to your computer, and all electronic devices. Most of us use our electronics to transmit personal and financial information almost daily making it more important than ever to stay safe. Follow our commandments to keep yourself and your information guarded.
Can you tell if your computer has been compromised?
Cyber Security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction
More than 50% of the world's population is actively connected to the internet.
Cyber Security is becoming a fundamental requirement for every business organization worldwide. We are all susceptible to this new frontier of crime and it is our responsibility to be prepared.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc. M.C.A, Research Scholar in Digital Forensics
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17. PFMS point of view
Access Management
Role based access is created in PFMS
or any other software so the concern
person should not use others account.
Credentials should not be shared as at
any time some problem may occur.
18. Password Policy
• Secure password should be created.
– 8 to 10 character with combination of all
characters to make it unpredictable.
– Should not share with anyone
• Digital Signature:
– It is a unique identity of the person
– It should be kept secretly
19. PROTECT PASSWORDS
19
Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing
letters, numbers and punctuation.
Do not use one of these common passwords or any variation of them: qwerty1, abc123, letmein, password1, iloveyou1,
(yourname1), baseball1.
Change your passwords periodically.
When choosing a password:
o Mix upper and lower case letters
o Use a minimum of 8 characters
o Use mnemonics to help you remember a difficult password
Store passwords in a safe place.
20.
21.
22.
23. Malware infected Computer
Performance low, suddenly stops working, freeze
frequently, Restart automatically, etc
Unusual error message pop up constantly
Home page, icons, setting changes itself
Internet activity without you accessing internet.
24. Points to check for security
Update antivirus and Operating system regularly
Keep observation on network usage
Keep observation list of application installed in the system
Check the unwanted hidden files and folder of the system
Delete the temp folder data and internet files regularly
25. Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, Windows
Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).
Most new operating systems are set to download updates by default. After updates are downloaded, you will be
asked to install them. Click yes!
To download patches for your system and software, visit:
Windows Update: http://windowsupdate.microsoft.com to get or ensure you
have all the latest operating system updates only. Newer Windows systems
are set to download these updates by default.
Microsoft Update: http://www.update.microsoft.com/microsoftupdate/ to
get or ensure you have all the latest OS and Microsoft Office software
updates. You must sign up for this service.
Apple: http://www.apple.com/support
Unix: Consult documentation or online help for system update information and instructions.
Be sure to restart your computer after updates are installed so that the patches can be applied immediately
INSTALL OS/SOFTWARE UPDATES
25
26. RUN ANTI-VIRUS SOFTWARE
26
To avoid computer problems caused by viruses, install and run an anti-
virus program like Sophos.
Periodically, check to see if your anti-virus is up to date by opening
your anti-virus program and checking the Last updated: date.
Anti-virus software removes viruses, quarantines and repairs infected
files, and can help prevent future viruses.
27. PREVENT IDENTITY THEFT
27
Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal
identity information unless you know exactly who's receiving it. Protect others people’s information as you
would your own.
Never send personal or confidential information via email or instant messages as these can be easily intercepted.
Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business
(often a financial institution) in an attempt to gain personal or account information. These often do not include a
personal salutation. Never enter personal information into an online form you accessed via a link in an email you
were not expecting. Legitimate businesses will not ask for personal information online.
28. TURN ON PERSONAL FIREWALLS
Check your computer's security settings for a built-in personal firewall. If you have one, turn it on.
Microsoft Vista and Mac OSX have built-in firewalls. For more information, see:
• Mac Firewall
(docs.info.apple.com/article.html?path=Mac/10.4/en/mh1042.ht
ml)
• Microsoft Firewall
(www.microsoft.com/windowsxp/using/networking/security/winfi
rewall.mspx)
• Unix users should consult system documentation or online help for personal firewall instructions
and/or recommendations.
Once your firewall is turned on, test your firewall for open ports that could allow in viruses and
hackers.
28
29. AVOID SPYWARE/ADWARE
29
Spyware and adware take up memory and can slow down your computer or cause other problems.
Use Spybot and Ad-Aware to remove spyware/adware from your computer. UC Davis students,
faculty and staff can get Spybot and Ad-Aware for free on the Internet Tools CD (available from IT
Express in Shields Library).
Watch for allusions to spyware and adware in user agreements before installing free software
programs.
Be wary of invitations to download software from unknown internet sources.
30. Mobile Safety
Remove the unwanted apps from your mobile
Disable unreliable source for installation of apps
Check the APPS permission setting and allow the
specific task what is required to application instead
of allowing all the permission.
31. BACK UP IMPORTANT FILES
Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up
copies.
Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy.
Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a
server.
Store your back-up media in a secure place away from your computer, in case of fire or theft.
Test your back up media periodically to make sure the files are accessible and readable.
31
32. CYBER-SAFETY AT HOME
Physically secure your computer by using security cables and locking doors and
windows in the dorms and off-campus housing.
Avoid leaving your laptop unsupervised and in plain view in the library or coffee
house, or in your car, dorm room or home.
Set up a user account and password to prevent unauthorized access to your
computer files.
Do not install unnecessary programs on your computer.
32
33. CYBER-SAFETY AT WORK
Be sure to work with your technical support coordinator before implementing new cyber-safety measures.
Talk with your technical support coordinator about what cyber-safety measures are in place in your
department.
Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any
suspicious activity by unauthorized individuals in your work area.
Physically secure your computer by using security cables and locking building/office doors and windows.
Do not install unnecessary programs on your work computer.
33