SlideShare a Scribd company logo
1 of 38
Cyber Security 
For Government Offices
Present Scenario 
 More than 14,000 Indian sites hacked till Oct. this year: 
 Anonymous India hacks Kapil Sibal's official website 
 In year 2010 banks in Maharashtra 826 crore stole by cyber criminals 
 Pen drives major threat to cyber security: Indian Army 
 Emerging cities being targeted by cyber criminals 
 Domino's India website hacked; 37,000 account credentials leaked 
online 
Source: Thinkdigit.com 
www.thinkdigit.com/latest/hacking.html
Cyber 
Criminals 
Challenges 
Hacking 
Data 
lose 
Misuse 
of Data 
Lack of 
proper 
knowledge 
User 
mistakes
HACKING & HACKERS 
Hacking 
Hacking is the practice of modifying the features of a 
system, in order to accomplish a goal outside of the 
creator's original purpose. 
Hackers 
• Brilliant programmer 
• Continuously working on one task 
• Detail knowledge of net or users behaviors
What happen if do not take proper precaution
Risk for Email Account
Precaution for email account 
Password Strategy 
Normal : 123india 
Good : 123@india 
Better : 123&InDIa.NanDurbar 
Best : NanDurBar#$%789_..01
Precaution for email account 
• Security Questions 
Q. Favorite teacher? 
A. K.Pathak (insecure) 
A. 123*pathak (secure)
Precaution for email account 
• Use 2 way verification system
Precaution for email account 
Google code 
229855
Risk Of Social Media (Facebook)
Precaution for Facebook 
Use secure password 
Put proper security questions
Precaution for Facebook 
Don’t share anyone your personal 
information 
Like : 
 Your mobile no. 
 Security ans( fev- teacher,food,hobby,book,first 
mobile no etc.) 
 Always check your name on Google or Facebook
Precaution for Facebook 
Use proper privacy settings for your personal pics
Precaution for Facebook 
Use Proper Security Settings
Phishing 
One of the type of hacking 
Mostly Online Banking crime done by this method
Original 
Phishing
Always Use Password For Your Devices 
• Computer for Administrator Account 
• Mobile 
• SIM Card (PIN) 
• TAB 
• Turn Off Remote Access 
• Change your PIN for bank account (ATMs)
Challenges of Wireless Networks 
• Easy to Hack or Crack 
• Always use Password protection 
• Use strongest password 
• For office : Create MAC filters 
• Insecure WI-FI Router(open access) 
Should share your information to others
Walking 
Vulnerability 
Wi-Fi, 
Bluetooth, 
Infrared 
Insecure 
privacy 
Antivirus & 
Firewall 
Smart Mobiles
Smart Mobiles 
Hotspot
SIM CARD CLONING 
Don’t response miscall +92; #90 or #09 
etc.(international no.) 
Example +92 4526897854
Privacy blocker 
Maxthon Browser 
Internet Explorer
Child Safety 
 Internet Explorer 
 Tools 
 Internet options 
 Contents 
 Enable Parental control
Child Safety 
• Sexual Material 
• Nudity 
• Violence 
• Games 
• Drugs 
• Virus
ILLITERACY ABOUT CYBER CRIME, HACKING, & CYBER SECURITY 
COMPUTERS CONTAINS MANY VULNERABLE POINTS 
INSECURE INTERNET CONNECTIONS OR USE 
USERS USING WEEK PASSWORD OR NO PASSWORD 
IMPROPER USE OF SECURITY SOFTWARES Ex. FIREWALLS ETC 
FREE ENVIROMENT OF PHYSICAL & NETWORK ATTACKS 
AND MUCH MORE…….
How to Secure Government Offices
MAXIMIZE MUASXEIM OIZFE USSEEC OUF SREICTUYR ISTYO SFOTFWTWAARREE'S'S
PROPER CONFIGURATION OF FIREWALLS
PROPER CONFIGURATION OF OPERATING SYSTEMS
INSTALLING ESSENTIAL SOFTWARE'S WITH PROPER CONFIGURATION
INSTALLING ESSENTIAL SECURITY CERTIFICATES
MANAGING SECURE 
INTERNET CONNECTIONS 
& 
NETWORKS
MONITORING ACTIVITIES ON INTERNET AND 
NETWORKS
About Us 
WE ARE WORKING IN 
• Cyber security programs 
• Create Hackproof office networks 
• Maintaining Computer Networks & Hardware 
TRAINING 
• Run Ethical Hacking Courses 
• Networking Training Center 
SOCIAL RESPONSIBILITY 
• Run Cyber Security blog on facebook 
Our Facebook community page: - Ethical Hacking & Networking, security n joy
Finish 
Thank You

More Related Content

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt
PptPpt
Ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Armytushar garg
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security USAID CEED II Project Moldova
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
IKANOW System Architecture Guide
IKANOW System Architecture GuideIKANOW System Architecture Guide
IKANOW System Architecture GuideSholeh Gregory
 
Managing Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchManaging Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchJoe Alex
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopYahoo Developer Network
 
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...SlideTeam.net
 
Mobile Email Security
Mobile Email SecurityMobile Email Security
Mobile Email SecurityRahul Sihag
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government SecurityMichael Smith
 
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...4 pieces pie chart circular puzzle with hole in center process powerpoint dia...
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...SlideTeam.net
 
5 stages cycle circular round jigsaw maze piece puzzle process slides.
5 stages cycle circular round jigsaw maze piece puzzle process slides.5 stages cycle circular round jigsaw maze piece puzzle process slides.
5 stages cycle circular round jigsaw maze piece puzzle process slides.SlideTeam.net
 
Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learningaccystanley
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchVic Hargrave
 
ePlus CyberSecurity Management Program
ePlus CyberSecurity Management ProgramePlus CyberSecurity Management Program
ePlus CyberSecurity Management ProgramePlus
 

Viewers also liked (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Indian Cyber Army
Indian Cyber ArmyIndian Cyber Army
Indian Cyber Army
 
Cyber security
Cyber securityCyber security
Cyber security
 
Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security Best practices and Government role in Cyber Security
Best practices and Government role in Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Hacker
HackerHacker
Hacker
 
IKANOW System Architecture Guide
IKANOW System Architecture GuideIKANOW System Architecture Guide
IKANOW System Architecture Guide
 
Managing Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchManaging Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using Elasticsearch
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with Hadoop
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...
Cycle circular round jigsaw maze piece puzzle with center 4 powerpoint ppt sl...
 
Mobile Email Security
Mobile Email SecurityMobile Email Security
Mobile Email Security
 
Email security
Email securityEmail security
Email security
 
Why Care About Government Security
Why Care About Government SecurityWhy Care About Government Security
Why Care About Government Security
 
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...4 pieces pie chart circular puzzle with hole in center process powerpoint dia...
4 pieces pie chart circular puzzle with hole in center process powerpoint dia...
 
5 stages cycle circular round jigsaw maze piece puzzle process slides.
5 stages cycle circular round jigsaw maze piece puzzle process slides.5 stages cycle circular round jigsaw maze piece puzzle process slides.
5 stages cycle circular round jigsaw maze piece puzzle process slides.
 
Government security classifications e learning
Government security classifications e learningGovernment security classifications e learning
Government security classifications e learning
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
ePlus CyberSecurity Management Program
ePlus CyberSecurity Management ProgramePlus CyberSecurity Management Program
ePlus CyberSecurity Management Program
 

Similar to Cyber security government ppt By Vishwadeep Badgujar

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigationMehedi Hasan
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Similar to Cyber security government ppt By Vishwadeep Badgujar (20)

Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 

Recently uploaded (20)

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 

Cyber security government ppt By Vishwadeep Badgujar

  • 1. Cyber Security For Government Offices
  • 2. Present Scenario  More than 14,000 Indian sites hacked till Oct. this year:  Anonymous India hacks Kapil Sibal's official website  In year 2010 banks in Maharashtra 826 crore stole by cyber criminals  Pen drives major threat to cyber security: Indian Army  Emerging cities being targeted by cyber criminals  Domino's India website hacked; 37,000 account credentials leaked online Source: Thinkdigit.com www.thinkdigit.com/latest/hacking.html
  • 3. Cyber Criminals Challenges Hacking Data lose Misuse of Data Lack of proper knowledge User mistakes
  • 4. HACKING & HACKERS Hacking Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. Hackers • Brilliant programmer • Continuously working on one task • Detail knowledge of net or users behaviors
  • 5. What happen if do not take proper precaution
  • 6. Risk for Email Account
  • 7. Precaution for email account Password Strategy Normal : 123india Good : 123@india Better : 123&InDIa.NanDurbar Best : NanDurBar#$%789_..01
  • 8. Precaution for email account • Security Questions Q. Favorite teacher? A. K.Pathak (insecure) A. 123*pathak (secure)
  • 9. Precaution for email account • Use 2 way verification system
  • 10. Precaution for email account Google code 229855
  • 11. Risk Of Social Media (Facebook)
  • 12. Precaution for Facebook Use secure password Put proper security questions
  • 13. Precaution for Facebook Don’t share anyone your personal information Like :  Your mobile no.  Security ans( fev- teacher,food,hobby,book,first mobile no etc.)  Always check your name on Google or Facebook
  • 14. Precaution for Facebook Use proper privacy settings for your personal pics
  • 15. Precaution for Facebook Use Proper Security Settings
  • 16. Phishing One of the type of hacking Mostly Online Banking crime done by this method
  • 18. Always Use Password For Your Devices • Computer for Administrator Account • Mobile • SIM Card (PIN) • TAB • Turn Off Remote Access • Change your PIN for bank account (ATMs)
  • 19. Challenges of Wireless Networks • Easy to Hack or Crack • Always use Password protection • Use strongest password • For office : Create MAC filters • Insecure WI-FI Router(open access) Should share your information to others
  • 20. Walking Vulnerability Wi-Fi, Bluetooth, Infrared Insecure privacy Antivirus & Firewall Smart Mobiles
  • 22. SIM CARD CLONING Don’t response miscall +92; #90 or #09 etc.(international no.) Example +92 4526897854
  • 23. Privacy blocker Maxthon Browser Internet Explorer
  • 24. Child Safety  Internet Explorer  Tools  Internet options  Contents  Enable Parental control
  • 25. Child Safety • Sexual Material • Nudity • Violence • Games • Drugs • Virus
  • 26.
  • 27. ILLITERACY ABOUT CYBER CRIME, HACKING, & CYBER SECURITY COMPUTERS CONTAINS MANY VULNERABLE POINTS INSECURE INTERNET CONNECTIONS OR USE USERS USING WEEK PASSWORD OR NO PASSWORD IMPROPER USE OF SECURITY SOFTWARES Ex. FIREWALLS ETC FREE ENVIROMENT OF PHYSICAL & NETWORK ATTACKS AND MUCH MORE…….
  • 28. How to Secure Government Offices
  • 29.
  • 30. MAXIMIZE MUASXEIM OIZFE USSEEC OUF SREICTUYR ISTYO SFOTFWTWAARREE'S'S
  • 32. PROPER CONFIGURATION OF OPERATING SYSTEMS
  • 33. INSTALLING ESSENTIAL SOFTWARE'S WITH PROPER CONFIGURATION
  • 35. MANAGING SECURE INTERNET CONNECTIONS & NETWORKS
  • 36. MONITORING ACTIVITIES ON INTERNET AND NETWORKS
  • 37. About Us WE ARE WORKING IN • Cyber security programs • Create Hackproof office networks • Maintaining Computer Networks & Hardware TRAINING • Run Ethical Hacking Courses • Networking Training Center SOCIAL RESPONSIBILITY • Run Cyber Security blog on facebook Our Facebook community page: - Ethical Hacking & Networking, security n joy