SlideShare a Scribd company logo
1 of 21
How to Judge and Recognize
Legitimate Websites
,Business Identity Theft
Counter Measures
McAfee SiteAdvisor software
(www.siteadvisor.com) is a
free web security plug-in that
provides the user with red,
yellow and green website
security ratings based on the
search results. These ratings
are based on tests conducted
by McAfee after looking for all
kinds of threats such as to
name a few Phishing sites, E-
Commerce vulnerabilities,
browser exploits, etc.
How to Identify Legitimate
and Scam Websites
Check the site's security : Legitimate
websites will usually have a padlock icon in the
URL bar, indicating that the site is secure and
that any information you enter will be
encrypted.
SSL/TLS stands for Secure Socket Layers and Transport Layer Security.
It is a protocol or communication rule that allows computer systems to
talk to each other on the internet safely. SSL/TLS certificates allow web
browsers to identify and establish encrypted network connections to
web sites using the SSL/TLS protocol
https protocol
HTTP lacks a security mechanism to encrypt the
data, whereas HTTPS provides SSL or TLS Digital
Certificate to secure the communication between
Server and client
Financial Security Certification
When you visit the website of your financial institution, whether it be your bank,
insurance agency, brokerage house or credit card company, the site is most likely
using an Extended Validation (EV) certificate to secure its communication and to
project its identity to users. Your browser will show the encryption lock in the
address bar as well as the company name. Sometimes this will be highlighted in
green, depending on your browser. This tells the user that the company’s identity
has been verified with detailed information contained within the certificate,
including its physical address, country and the type of business registration.
Site Content
Check the quality of the content on the website, a website
with good content is usually real, while a website with low-
quality content or with too many errors is a fake one, and
Check the About Us page A website's "About Us" page can
provide valuable information about the company or
organization behind the website. A legitimate website should
have a detailed "About Us" page that includes contact
information, a physical address and a history of the company.
Check the Privacy Policy :
A legitimate website will have a clear and detailed
privacy policy that explains how it will collect, use,
and protect your personal information.
Check the URL :
Look for spelling errors
or unusual characters in
the website's URL.
Legitimate websites will
typically have a URL that
is easy to read and
remember.
Anti Phishing plug-ins
Title Website Brief Description
Netcraft
Toolbar
http://toolbar.netcraft.co
m/
It offers protection from Phishing attacks.
Trust Watch http://wareseeker.com/fr
ee-trustwatch/
It has a toolbar for Internet Explorer users as well as
has an extension for Firefox users.
ScamBlocker http://www.earthlink.net
/elink/
issue95/security_archive.
html
It is an Earthlink Toolbar feature that helps protect
users from the latest Phishing threats.
PhishNet 1.2 http://download.cnet.co
m/PhishNet/ 3000-2144-
4-10473931.html
It protects users from web Phishing scams.
Title Website Brief Description
SpoofStick http://www.spoofstick.
com/
It helps users detect spoofed
(fake) websites.
Google safe browsing http://www.google.com
/tools/firefox/
safebrowsing/
It is used as an extension to
Firefox.
• It will alert when a webpage
tries asking for user's personal or
financial information.
Windows Internet
Explorer's Phishing
Filter
https://phishingfilter.mi
crosoft.com/
It is available in Internet Explorer
7.
It helps protect users from
entering Phishing sites.
Figure shows a
simple
flowchart
explaining how
to distinguish
between a
legitimate
E-Mail and a
phished E-Mail
SPS(Sanitizing Proxy System) Algorithm to Thwart Phishing
Attacks
1. Two-level filtering: SPS employs two-level filtering
composed of strict URL filtering and HTTP response
sanitizing. By combining two filtering methods, netizens
can be protected from revealing their personal
information on Phishing sites.
2. Flexibility of the rule set: By filtering HTTP responses,
the algorithm distinguishes between legitimate
websites and other suspicious websites based on a rule
set written by the operator of SPS.
3. Simplicity of the filtering algorithm: A simple two-level filtering
algorithm can be described into 20 steps and can easily apply the SPS
functions into existing proxy implementations, browser plug- ins or
personal firewalls. SPS can be based on two different open-sourced proxy
implementations to prove the simplicity and availability of the two-level
filtering algorithm.
4. Accountability of HTTP response sanitizing: SPS prevents netizens from
disclosing their personal information to Phishing sites by removing
malicious HTTP headers or HTML tags from HTTP responses. SPS can also
alert netizens about requested webpage containing suspicious parts that
are under threat at the time of Phishing attacks.
5. Robustness against both misbehavior of novice users and evasion
techniques: An SPS built-in proxy server can protect netizens from almost
all deceit cases of web Spoofing, regardless of netizen's misbehavior and
evasion techniques used by the phisher.
Business Identity Theft – Countermeasures
Business identity theft happens when criminals pose as
owners, officers or employees of a business to illegally get
cash, credit, and loans, leaving the victimized business
with the debts
1.Secure your business premises with locks and alarms
Alarm systems are effective deterrents to criminals thinking of breaking into
your business, including that intent on identity theft- especially alarm systems
that are monitored by a security company. Make sure that external doors have
deadbolts and that exposed windows are secured with security film, bars,
screens or shatter-proof glass.
2.Put your business records under lock and key
Store your physical business records, such as customer records and other
data on paper, locked in filing cabinets - and lock the filing cabinets at
night, Put copies of system and database backups and "important" busi-
ness data in your safe (or in your security deposit box at the bank if you
don't have an onsite safe).
3.Shred, shred and shred
Business records of any kind should never just be tossed into the trash or
recycling bin where they can become a bonanza for criminals wanting to
commit on identity theft; instead, all business records that you no longer
have a use for should be shreded. Pay special attention to the mail,
Anything that has your name and address on it should be shredded.
4.Be cautious on the phone
someone who claims they need to verify one of your personal accounts,
don't give out information over the phone unless you can positively
confirm the caller's identity. "Information thieves and stalkers easily they
were able to obtain all sorts of information simply by calling and asking.
Posing as government agencies
5.Limit access to your IT systems
Your computer network needs to be password protected, you also
need to consider issues of internal network access. Does every
employee needs to access programs or databases that may contain
sensitive information? Password-protect these too and grant access
on a "need-to-know" basis to help cut down identity theft.
6.Protect the IT systems from hackers
Hacking into company systems and databases appears to have be a
favorite identity theft technique. Your computer network needs to be
protected by firewalls, If you're running Windows operating systems,
it's also important that you keep your operating system updated,
installing the various patches as they come out. Often these patches
are fixes for security holes.
7.Create the awareness that the Internet is a dangerous
place
Ordering through the Net using a credit card is not dangerous, as long as it is a secure site.
However, there are other dangers Spyware and viruses, which attempt to download
information automatically when you or your employees visit certain sites. Moreover, if your
company has a website, If you are going to place information on the Net such as financial
data or customer databases, it needs to be password-protected and encrypted.
8.Avoid broadcasting information
This sort of cavalier sharing of personal information, which makes identity theft so easy,
has to stop. Train your employees to be sensitive to customer information issues, making
sure that they keep customer information private when they're dealing with individual
customers. and other practices such as not leaving files with customer information lying
open on counters should be taken into consideration.
9.Create and enforce a organization-wide information
security policy
The purpose of your security policy is to educate your employees about issues such as
identity theft and data protection. It should include information on E-Mail policies (how to
deal with suspicious E-Mail), computer network access, Internet use policies (such as how
to increase browser security and disconnecting from the Net after using it), customer
information protection strategies
10.Disconnect the access of ex-employees immediately
When employees no longer work for your business, you need to be sure that their access
to your computer network and company data is cut off immediately. taking these steps to
prevent identity theft for you and your customers is necessary
THANK YOU

More Related Content

Similar to cyber security presentation 1234567.pptx

What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfarri2009av
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalVaishnaviKhandelwal6
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerceabe8512000
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breachincmagazineseo
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 

Similar to cyber security presentation 1234567.pptx (20)

What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Threats to data
Threats to dataThreats to data
Threats to data
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 

Recently uploaded

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

cyber security presentation 1234567.pptx

  • 1. How to Judge and Recognize Legitimate Websites ,Business Identity Theft Counter Measures
  • 2.
  • 3. McAfee SiteAdvisor software (www.siteadvisor.com) is a free web security plug-in that provides the user with red, yellow and green website security ratings based on the search results. These ratings are based on tests conducted by McAfee after looking for all kinds of threats such as to name a few Phishing sites, E- Commerce vulnerabilities, browser exploits, etc.
  • 4. How to Identify Legitimate and Scam Websites
  • 5. Check the site's security : Legitimate websites will usually have a padlock icon in the URL bar, indicating that the site is secure and that any information you enter will be encrypted. SSL/TLS stands for Secure Socket Layers and Transport Layer Security. It is a protocol or communication rule that allows computer systems to talk to each other on the internet safely. SSL/TLS certificates allow web browsers to identify and establish encrypted network connections to web sites using the SSL/TLS protocol
  • 6. https protocol HTTP lacks a security mechanism to encrypt the data, whereas HTTPS provides SSL or TLS Digital Certificate to secure the communication between Server and client
  • 7. Financial Security Certification When you visit the website of your financial institution, whether it be your bank, insurance agency, brokerage house or credit card company, the site is most likely using an Extended Validation (EV) certificate to secure its communication and to project its identity to users. Your browser will show the encryption lock in the address bar as well as the company name. Sometimes this will be highlighted in green, depending on your browser. This tells the user that the company’s identity has been verified with detailed information contained within the certificate, including its physical address, country and the type of business registration.
  • 8. Site Content Check the quality of the content on the website, a website with good content is usually real, while a website with low- quality content or with too many errors is a fake one, and Check the About Us page A website's "About Us" page can provide valuable information about the company or organization behind the website. A legitimate website should have a detailed "About Us" page that includes contact information, a physical address and a history of the company.
  • 9. Check the Privacy Policy : A legitimate website will have a clear and detailed privacy policy that explains how it will collect, use, and protect your personal information. Check the URL : Look for spelling errors or unusual characters in the website's URL. Legitimate websites will typically have a URL that is easy to read and remember.
  • 10. Anti Phishing plug-ins Title Website Brief Description Netcraft Toolbar http://toolbar.netcraft.co m/ It offers protection from Phishing attacks. Trust Watch http://wareseeker.com/fr ee-trustwatch/ It has a toolbar for Internet Explorer users as well as has an extension for Firefox users. ScamBlocker http://www.earthlink.net /elink/ issue95/security_archive. html It is an Earthlink Toolbar feature that helps protect users from the latest Phishing threats. PhishNet 1.2 http://download.cnet.co m/PhishNet/ 3000-2144- 4-10473931.html It protects users from web Phishing scams.
  • 11. Title Website Brief Description SpoofStick http://www.spoofstick. com/ It helps users detect spoofed (fake) websites. Google safe browsing http://www.google.com /tools/firefox/ safebrowsing/ It is used as an extension to Firefox. • It will alert when a webpage tries asking for user's personal or financial information. Windows Internet Explorer's Phishing Filter https://phishingfilter.mi crosoft.com/ It is available in Internet Explorer 7. It helps protect users from entering Phishing sites.
  • 12. Figure shows a simple flowchart explaining how to distinguish between a legitimate E-Mail and a phished E-Mail
  • 13. SPS(Sanitizing Proxy System) Algorithm to Thwart Phishing Attacks 1. Two-level filtering: SPS employs two-level filtering composed of strict URL filtering and HTTP response sanitizing. By combining two filtering methods, netizens can be protected from revealing their personal information on Phishing sites. 2. Flexibility of the rule set: By filtering HTTP responses, the algorithm distinguishes between legitimate websites and other suspicious websites based on a rule set written by the operator of SPS.
  • 14. 3. Simplicity of the filtering algorithm: A simple two-level filtering algorithm can be described into 20 steps and can easily apply the SPS functions into existing proxy implementations, browser plug- ins or personal firewalls. SPS can be based on two different open-sourced proxy implementations to prove the simplicity and availability of the two-level filtering algorithm. 4. Accountability of HTTP response sanitizing: SPS prevents netizens from disclosing their personal information to Phishing sites by removing malicious HTTP headers or HTML tags from HTTP responses. SPS can also alert netizens about requested webpage containing suspicious parts that are under threat at the time of Phishing attacks. 5. Robustness against both misbehavior of novice users and evasion techniques: An SPS built-in proxy server can protect netizens from almost all deceit cases of web Spoofing, regardless of netizen's misbehavior and evasion techniques used by the phisher.
  • 15. Business Identity Theft – Countermeasures Business identity theft happens when criminals pose as owners, officers or employees of a business to illegally get cash, credit, and loans, leaving the victimized business with the debts
  • 16. 1.Secure your business premises with locks and alarms Alarm systems are effective deterrents to criminals thinking of breaking into your business, including that intent on identity theft- especially alarm systems that are monitored by a security company. Make sure that external doors have deadbolts and that exposed windows are secured with security film, bars, screens or shatter-proof glass. 2.Put your business records under lock and key Store your physical business records, such as customer records and other data on paper, locked in filing cabinets - and lock the filing cabinets at night, Put copies of system and database backups and "important" busi- ness data in your safe (or in your security deposit box at the bank if you don't have an onsite safe).
  • 17. 3.Shred, shred and shred Business records of any kind should never just be tossed into the trash or recycling bin where they can become a bonanza for criminals wanting to commit on identity theft; instead, all business records that you no longer have a use for should be shreded. Pay special attention to the mail, Anything that has your name and address on it should be shredded. 4.Be cautious on the phone someone who claims they need to verify one of your personal accounts, don't give out information over the phone unless you can positively confirm the caller's identity. "Information thieves and stalkers easily they were able to obtain all sorts of information simply by calling and asking. Posing as government agencies
  • 18. 5.Limit access to your IT systems Your computer network needs to be password protected, you also need to consider issues of internal network access. Does every employee needs to access programs or databases that may contain sensitive information? Password-protect these too and grant access on a "need-to-know" basis to help cut down identity theft. 6.Protect the IT systems from hackers Hacking into company systems and databases appears to have be a favorite identity theft technique. Your computer network needs to be protected by firewalls, If you're running Windows operating systems, it's also important that you keep your operating system updated, installing the various patches as they come out. Often these patches are fixes for security holes.
  • 19. 7.Create the awareness that the Internet is a dangerous place Ordering through the Net using a credit card is not dangerous, as long as it is a secure site. However, there are other dangers Spyware and viruses, which attempt to download information automatically when you or your employees visit certain sites. Moreover, if your company has a website, If you are going to place information on the Net such as financial data or customer databases, it needs to be password-protected and encrypted. 8.Avoid broadcasting information This sort of cavalier sharing of personal information, which makes identity theft so easy, has to stop. Train your employees to be sensitive to customer information issues, making sure that they keep customer information private when they're dealing with individual customers. and other practices such as not leaving files with customer information lying open on counters should be taken into consideration.
  • 20. 9.Create and enforce a organization-wide information security policy The purpose of your security policy is to educate your employees about issues such as identity theft and data protection. It should include information on E-Mail policies (how to deal with suspicious E-Mail), computer network access, Internet use policies (such as how to increase browser security and disconnecting from the Net after using it), customer information protection strategies 10.Disconnect the access of ex-employees immediately When employees no longer work for your business, you need to be sure that their access to your computer network and company data is cut off immediately. taking these steps to prevent identity theft for you and your customers is necessary