This document discusses cyber security issues facing government offices in India and provides recommendations. It notes that over 14,000 Indian sites were hacked in one year, banks lost money to cyber criminals, and personal data has been leaked from breaches. Proper precautions are recommended like using strong passwords, two-factor authentication, privacy settings, and firewalls. Government offices should maximize security by properly configuring firewalls and operating systems, installing essential secure software and certificates, and monitoring network activity.
2. Present Scenario
More than 14,000 Indian sites hacked till Oct. this year:
Anonymous India hacks Kapil Sibal's official website
In year 2010 banks in Maharashtra 826 crore stole by cyber criminals
Pen drives major threat to cyber security: Indian Army
Emerging cities being targeted by cyber criminals
Domino's India website hacked; 37,000 account credentials leaked
online
Source: Thinkdigit.com
www.thinkdigit.com/latest/hacking.html
4. HACKING & HACKERS
Hacking
Hacking is the practice of modifying the features of a
system, in order to accomplish a goal outside of the
creator's original purpose.
Hackers
• Brilliant programmer
• Continuously working on one task
• Detail knowledge of net or users behaviors
13. Precaution for Facebook
Don’t share anyone your personal
information
Like :
Your mobile no.
Security ans( fev- teacher,food,hobby,book,first
mobile no etc.)
Always check your name on Google or Facebook
18. Always Use Password For Your Devices
• Computer for Administrator Account
• Mobile
• SIM Card (PIN)
• TAB
• Turn Off Remote Access
• Change your PIN for bank account (ATMs)
19. Challenges of Wireless Networks
• Easy to Hack or Crack
• Always use Password protection
• Use strongest password
• For office : Create MAC filters
• Insecure WI-FI Router(open access)
Should share your information to others
24. Child Safety
Internet Explorer
Tools
Internet options
Contents
Enable Parental control
25. Child Safety
• Sexual Material
• Nudity
• Violence
• Games
• Drugs
• Virus
26.
27. ILLITERACY ABOUT CYBER CRIME, HACKING, & CYBER SECURITY
COMPUTERS CONTAINS MANY VULNERABLE POINTS
INSECURE INTERNET CONNECTIONS OR USE
USERS USING WEEK PASSWORD OR NO PASSWORD
IMPROPER USE OF SECURITY SOFTWARES Ex. FIREWALLS ETC
FREE ENVIROMENT OF PHYSICAL & NETWORK ATTACKS
AND MUCH MORE…….
37. About Us
WE ARE WORKING IN
• Cyber security programs
• Create Hackproof office networks
• Maintaining Computer Networks & Hardware
TRAINING
• Run Ethical Hacking Courses
• Networking Training Center
SOCIAL RESPONSIBILITY
• Run Cyber Security blog on facebook
Our Facebook community page: - Ethical Hacking & Networking, security n joy