SlideShare a Scribd company logo
MOHAMMAD ASHFAQUR RAHMAN
ITIL-F, NCDA, HP-CSA, OCP-OSSA
ASHFAQ.SAPHAL@GMAIL.COM
Cyber Security
Road Map
Introduction
Attack & Methods
Break
Safeguard Practices
 PC and Laptop Security
 Security on Mobile devices
 Browsing Safely
 Mail and Social Network practices
 Protecting Social Engineering
Discussion
Safeguard Practices: PC & Laptop
o Operating System
o Patch Update
o Use non administrative account
o Disable Remote Access
o Application Software
o Stop Piracy
o Use authorized source
o Stop Key-gen
o Install only required software
Safeguard Practices: PC & Laptop
o Password Management
o Complexity
o Non-Trivial
o Account Management
o No guest account
o Disable unused account
o Antivirus and Firewall
o Keep enable
o Update library
o Disk Management
o Keep it encrypted
Safeguard Practices: Mobile Device
o Locking
o Use Password
o Finger Print Detection
o Apps Install
o Is it required ?
o Who made it ?
o Grant Minimal Access
o Enable Power Save
o Network
o Is this wifi save ?
o Forget the network
o Have an antivirus
Safeguard Practices: Browsing
o Browser
o Update Regularly
o Update JAVA and Flash
o Prefer https
o Delete cookies
o Remember password ?
o Add anti Virus plug-in
o Download
o Avoid common File Server
o Download from trusted site
o Avoid executable file
Safeguard Practices: Browsing
o URL
o SSL : https, sftp, SMTSS
o Address Validity
o Think before click
Safeguard Practices: Browsing
o Sharing
o Don’t post Personal Information
o Don’t share file to unknown person
o Security on cloud file sharing
o E-Commerce
o Use only verified e-commerce site
o 2FA for transaction
o PIN Code is not required for transaction
o Inform Bank if card lost
Safeguard Practices: Collaboration
o Mail & Social Network
o Double factor authentication
o Change password regularly
o User multiple password
o Ensure Logout
o Browser need not to remember password
o Ensure HTTPS
o Know your friends
o Restrict your content
o Think before upload picture
o View attachment before download
o Beware of site redirection
Safeguard Practices: Collaboration
o Mail & Social Network
o Double factor authentication
o Change password regularly
o User multiple password
o Ensure Logout
o Browser need not to remember password
o Ensure HTTPS
o Know your friends
o Restrict your content
o Think before upload picture
o View attachment before download
o Beware of site redirection
Let Talk
You Are the Key to Your Safety

More Related Content

What's hot

Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
Information on Brute Force Attack
Information on Brute Force AttackInformation on Brute Force Attack
Information on Brute Force Attack
HTS Hosting
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internetVong Borey
 
Internet
InternetInternet
Internet
Prem Sahu
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013Janis Weiss
 
Cyber security tips
Cyber security tipsCyber security tips
Cyber security tips
Alberto León
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
Digital-Managers-Club
 
Osint - Dark side of Internet
Osint - Dark side of InternetOsint - Dark side of Internet
Osint - Dark side of Internet
Raghav Bisht
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
Sina Manavi
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should now
Mediaraven vzw
 
Computer Security Workshop
Computer Security Workshop Computer Security Workshop
Computer Security Workshop
btcgrant
 
How does Ransomware Works?
How does Ransomware Works? How does Ransomware Works?
How does Ransomware Works?
Mathieu Ferland
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
The ID Co.
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
rash2kool
 

What's hot (16)

Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
Information on Brute Force Attack
Information on Brute Force AttackInformation on Brute Force Attack
Information on Brute Force Attack
 
Anonymous internet
Anonymous internetAnonymous internet
Anonymous internet
 
Internet
InternetInternet
Internet
 
WHS-hackability-Index-083013
WHS-hackability-Index-083013WHS-hackability-Index-083013
WHS-hackability-Index-083013
 
Cyber security tips
Cyber security tipsCyber security tips
Cyber security tips
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
Osint - Dark side of Internet
Osint - Dark side of InternetOsint - Dark side of Internet
Osint - Dark side of Internet
 
EC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media ForensicsEC-Council Hackway Workshop Presentation- Social Media Forensics
EC-Council Hackway Workshop Presentation- Social Media Forensics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security & privacy on the internet: things you should now
Security & privacy on the internet: things you should nowSecurity & privacy on the internet: things you should now
Security & privacy on the internet: things you should now
 
Computer Security Workshop
Computer Security Workshop Computer Security Workshop
Computer Security Workshop
 
How does Ransomware Works?
How does Ransomware Works? How does Ransomware Works?
How does Ransomware Works?
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
 

Similar to Cyber Security Awareness - file 2 of 2

Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
DataFest Tbilisi
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Make it Fixable (Security Divas 2017)
Make it Fixable (Security Divas 2017)Make it Fixable (Security Divas 2017)
Make it Fixable (Security Divas 2017)
Patricia Aas
 
social engineering
social engineeringsocial engineering
social engineeringHarri Levo
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
Michael Lew
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
ACE Software n Web Solutions
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
National Information Standards Organization (NISO)
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
IIMBNSRCEL
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
Akash Mahajan
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
darrentthurston
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
Kit O'Connell
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
Ernest Staats
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
cyberforgeacademy
 
Social media security
Social media securitySocial media security
Social media security
Hindie Dershowitz
 

Similar to Cyber Security Awareness - file 2 of 2 (20)

Securing your digital life - Jason Addie
Securing your digital life -  Jason AddieSecuring your digital life -  Jason Addie
Securing your digital life - Jason Addie
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Make it Fixable (Security Divas 2017)
Make it Fixable (Security Divas 2017)Make it Fixable (Security Divas 2017)
Make it Fixable (Security Divas 2017)
 
social engineering
social engineeringsocial engineering
social engineering
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
 
How to-become-secure-and-stay-secure
How to-become-secure-and-stay-secureHow to-become-secure-and-stay-secure
How to-become-secure-and-stay-secure
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)Computer Security For Activists & Everyone (Oct 2018)
Computer Security For Activists & Everyone (Oct 2018)
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
Awareness Guide For Social Media Influencers - Influencers Meetup - CyberForg...
 
Social media security
Social media securitySocial media security
Social media security
 

More from Mohammad Ashfaqur Rahman

Cyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in BangladeshCyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in Bangladesh
Mohammad Ashfaqur Rahman
 
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
Mohammad Ashfaqur Rahman
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
Mohammad Ashfaqur Rahman
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
006.itsecurity bcp v1
006.itsecurity bcp v1006.itsecurity bcp v1
006.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
005.itsecurity bcp v1
005.itsecurity bcp v1005.itsecurity bcp v1
005.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
000.itsecurity bcp v1
000.itsecurity bcp v1000.itsecurity bcp v1
000.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
Mohammad Ashfaqur Rahman
 

More from Mohammad Ashfaqur Rahman (20)

Cyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in BangladeshCyber Security Considerations for 4IR in Bangladesh
Cyber Security Considerations for 4IR in Bangladesh
 
Cyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) developmentCyber Security For E-commerce (Infrastructure) development
Cyber Security For E-commerce (Infrastructure) development
 
Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19Cyber Awareness : Perspective Bangladesh & Covid-19
Cyber Awareness : Perspective Bangladesh & Covid-19
 
009.itsecurity bcp v1
009.itsecurity bcp v1009.itsecurity bcp v1
009.itsecurity bcp v1
 
008.itsecurity bcp v1
008.itsecurity bcp v1008.itsecurity bcp v1
008.itsecurity bcp v1
 
007.itsecurity bcp v1
007.itsecurity bcp v1007.itsecurity bcp v1
007.itsecurity bcp v1
 
006.itsecurity bcp v1
006.itsecurity bcp v1006.itsecurity bcp v1
006.itsecurity bcp v1
 
005.itsecurity bcp v1
005.itsecurity bcp v1005.itsecurity bcp v1
005.itsecurity bcp v1
 
002.itsecurity bcp v1
002.itsecurity bcp v1002.itsecurity bcp v1
002.itsecurity bcp v1
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
000.itsecurity bcp v1
000.itsecurity bcp v1000.itsecurity bcp v1
000.itsecurity bcp v1
 
Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning Business Continuty Planning and Disester Recovry Planning
Business Continuty Planning and Disester Recovry Planning
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
013.safetymanagement v3
013.safetymanagement v3013.safetymanagement v3
013.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
012.safetymanagement v3
012.safetymanagement v3012.safetymanagement v3
012.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
011.safetymanagement v3
011.safetymanagement v3011.safetymanagement v3
011.safetymanagement v3
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
 
010.safetymanagement v3
010.safetymanagement v3010.safetymanagement v3
010.safetymanagement v3
 

Recently uploaded

Toxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and ArsenicToxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and Arsenic
sanjana502982
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
kejapriya1
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Ana Luísa Pinho
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
muralinath2
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
Areesha Ahmad
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
IshaGoswami9
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Sérgio Sacani
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
Areesha Ahmad
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Sérgio Sacani
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
Nistarini College, Purulia (W.B) India
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
frank0071
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
David Osipyan
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
ronaldlakony0
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 

Recently uploaded (20)

Toxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and ArsenicToxic effects of heavy metals : Lead and Arsenic
Toxic effects of heavy metals : Lead and Arsenic
 
bordetella pertussis.................................ppt
bordetella pertussis.................................pptbordetella pertussis.................................ppt
bordetella pertussis.................................ppt
 
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...
 
Hemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptxHemostasis_importance& clinical significance.pptx
Hemostasis_importance& clinical significance.pptx
 
GBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram StainingGBSN- Microbiology (Lab 3) Gram Staining
GBSN- Microbiology (Lab 3) Gram Staining
 
Phenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvementPhenomics assisted breeding in crop improvement
Phenomics assisted breeding in crop improvement
 
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
GBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture MediaGBSN - Microbiology (Lab 4) Culture Media
GBSN - Microbiology (Lab 4) Culture Media
 
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...
 
Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.Nucleic Acid-its structural and functional complexity.
Nucleic Acid-its structural and functional complexity.
 
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdfMudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
Mudde & Rovira Kaltwasser. - Populism - a very short introduction [2017].pdf
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 
S.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary levelS.1 chemistry scheme term 2 for ordinary level
S.1 chemistry scheme term 2 for ordinary level
 
Deep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless ReproducibilityDeep Software Variability and Frictionless Reproducibility
Deep Software Variability and Frictionless Reproducibility
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 

Cyber Security Awareness - file 2 of 2

  • 1. MOHAMMAD ASHFAQUR RAHMAN ITIL-F, NCDA, HP-CSA, OCP-OSSA ASHFAQ.SAPHAL@GMAIL.COM Cyber Security
  • 2. Road Map Introduction Attack & Methods Break Safeguard Practices  PC and Laptop Security  Security on Mobile devices  Browsing Safely  Mail and Social Network practices  Protecting Social Engineering Discussion
  • 3. Safeguard Practices: PC & Laptop o Operating System o Patch Update o Use non administrative account o Disable Remote Access o Application Software o Stop Piracy o Use authorized source o Stop Key-gen o Install only required software
  • 4. Safeguard Practices: PC & Laptop o Password Management o Complexity o Non-Trivial o Account Management o No guest account o Disable unused account o Antivirus and Firewall o Keep enable o Update library o Disk Management o Keep it encrypted
  • 5. Safeguard Practices: Mobile Device o Locking o Use Password o Finger Print Detection o Apps Install o Is it required ? o Who made it ? o Grant Minimal Access o Enable Power Save o Network o Is this wifi save ? o Forget the network o Have an antivirus
  • 6. Safeguard Practices: Browsing o Browser o Update Regularly o Update JAVA and Flash o Prefer https o Delete cookies o Remember password ? o Add anti Virus plug-in o Download o Avoid common File Server o Download from trusted site o Avoid executable file
  • 7. Safeguard Practices: Browsing o URL o SSL : https, sftp, SMTSS o Address Validity o Think before click
  • 8. Safeguard Practices: Browsing o Sharing o Don’t post Personal Information o Don’t share file to unknown person o Security on cloud file sharing o E-Commerce o Use only verified e-commerce site o 2FA for transaction o PIN Code is not required for transaction o Inform Bank if card lost
  • 9. Safeguard Practices: Collaboration o Mail & Social Network o Double factor authentication o Change password regularly o User multiple password o Ensure Logout o Browser need not to remember password o Ensure HTTPS o Know your friends o Restrict your content o Think before upload picture o View attachment before download o Beware of site redirection
  • 10. Safeguard Practices: Collaboration o Mail & Social Network o Double factor authentication o Change password regularly o User multiple password o Ensure Logout o Browser need not to remember password o Ensure HTTPS o Know your friends o Restrict your content o Think before upload picture o View attachment before download o Beware of site redirection
  • 11. Let Talk You Are the Key to Your Safety