This document provides an overview of information and cyber security. It defines cyber security as technologies and processes designed to protect computers, networks, and data from attacks, vulnerabilities, damages, and unauthorized access. It discusses why cyber security is important by explaining the principles of confidentiality, integrity, and availability. It also covers common cyber security threats like viruses, malware, hacking, phishing, and denial of service attacks. The document provides tips on cyber security best practices for passwords, mobile devices, banking, and more. It introduces tools used in cyber security like Profession Look at Net and F-RAT.
Social Engineering as the Art of "Human OS" hacking
Main points of the presentation (1) Overall introduction on social engineering (2) Case studies (3) Defending against Social Engineering.
for: http://armsec.org/
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Network Security protects your network and data from breaches, intrusions and other threats. View this presentation now to understand what is network security and the types of network security.
Happy learning!!
Social Engineering as the Art of "Human OS" hacking
Main points of the presentation (1) Overall introduction on social engineering (2) Case studies (3) Defending against Social Engineering.
for: http://armsec.org/
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Network Security protects your network and data from breaches, intrusions and other threats. View this presentation now to understand what is network security and the types of network security.
Happy learning!!
Security threats, types of network security, firewall, importance of network security
Sources: How a firewall works: https://techtronic.in/how-firewalls-work/
Network Security: https://enterprise.comodo.com/blog/network-security/
Types of Firewall: https://www.geeksforgeeks.org/types-of-firewall-and-possible-attacks/
About Firewall: https://kb.iu.edu/d/aoru
https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html
https://www.forcepoint.com/cyber-edu/network-security
https://www.guru99.com/potential-security-threats-to-your-computer-systems.html
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This is a presentation i made about Denial of Service or a Distributed Denial of Service (DoS / DDoS) and the latest methods used to crash anything online and the future of such attacks which can disrupt the whole internet . Such attacks which are in TB's and can be launched from just single computer. And, there is not much that can be done to prevent them.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
A Firewall is a network security monitors and filters incoming and outgoing network traffic based on an organization's previous established security policies. View this presentation now to understand network security and firewall in network security.
Happy learning!!
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Security threats, types of network security, firewall, importance of network security
Sources: How a firewall works: https://techtronic.in/how-firewalls-work/
Network Security: https://enterprise.comodo.com/blog/network-security/
Types of Firewall: https://www.geeksforgeeks.org/types-of-firewall-and-possible-attacks/
About Firewall: https://kb.iu.edu/d/aoru
https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html
https://www.forcepoint.com/cyber-edu/network-security
https://www.guru99.com/potential-security-threats-to-your-computer-systems.html
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This is a presentation i made about Denial of Service or a Distributed Denial of Service (DoS / DDoS) and the latest methods used to crash anything online and the future of such attacks which can disrupt the whole internet . Such attacks which are in TB's and can be launched from just single computer. And, there is not much that can be done to prevent them.
We all use Wifi today. You know how much money it saves for your smart-phone data usage band-width. Connecting all your computers and gadgets with cables is not just history, even if you attempt it would be impractical!
Wifi being so pervasive, also brings along tremendous security implications. Come join us to look into details of Wifi security. How to secure your wifi network? How certain wifi encryption technologies can be hacked? We would prove that with live demos!
Join us to reflect on the security aspect of this technology, discuss about it and leave with more confidence about how 'secure' your WiFi access is?
A Firewall is a network security monitors and filters incoming and outgoing network traffic based on an organization's previous established security policies. View this presentation now to understand network security and firewall in network security.
Happy learning!!
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
Cyber Security Awareness Session conducted by Lightracers Consulting, for Management and non-IT employees. In this learning presentation, we will look at - What is Cyber Crime, Types of Cyber crime, What is Cyber Security, Types of Threats, Social Engineering techniques, Identifying legitimate and secure websites, Protection measures, Cyber Law in India followed by a small quiz.
The Internet is a fun place to be, but it is full of dangers too.This presentation helps you understand:
a. Types of Threats on the Internet
b. The Dos of Internet Security
c. The Don'ts of Internet Security
A brief introduction to Computer Security and its threats, Security Mechanism(Cryptography, Digital Signature, Firewall, IDS etc) and Security Services.
In present world, where computers/laptops and smart phone made it possible to extract other's secrets, a need has been imminent to handle such problems by Cyber Security Regime, which not only be launched by individuls(IT Expert) of organizations but the governments of the country should also play a vital role.
Similar to Information & cyber security, Winter training ,bsnl. online (20)
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Information & cyber security, Winter training ,bsnl. online
1. Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Information & Cyber Security
Presented By:
Presented By:
Pintu
Pintu Basak
Basak
JTO/NSCBTTC/
JTO/NSCBTTC/Kalyani
Kalyani
2. Contents
Contents
• What is Cyber Security?
• Why Cyber Security?
• Indication of Infections
• Major Security Problems
• Cyber Security Facts and Stats
• What is Cyber Crime?
Advantages of Cyber Security
What is Cyber Crime?
• Advantages of Cyber Security
• SafetyTips
• Mobile Phone Security
• Banking Security
• Cyber Security Question
• Tools used in Cyber Security
• Conclusion
• Reference
3. What is Cyber Security?
What is Cyber Security?
• Cyber security refers to the technologies and processes
designed to protect computers, networks and data from
attacks, vulnerabilities, damages and unauthorized access.
• Cyber security standards are security standards which
enable organizations or individuals to practice safe security
enable organizations or individuals to practice safe security
techniquesto minimize the number of successful cyber
security attacks.
• Cyber security is very important for network, data and
applications.
4. Why Cyber Security?
Why Cyber Security?
• Confidentiality, Integrity and
Availability have served as
the standard for computer
Security since the time of
Security since the time of
first mainframes.
8. Indication of Infections
Indication of Infections
• Poor System Performance
• Delayed network speed
• Crashing of Applications
• Abnormal System Behavior
• Unknown Services are running
• System Not Shutting Down
• Hard Disk is Busy
• Random error codes popping up
• Pop ups ads, warnings, and other
unwanted material
• Browser pages redirecting to a
• Unknown Services are running
• Change in file extension or
contents
• Automatic shutdown of System
• Browser pages redirecting to a
website you’ve never interacted
with
• Password locked out of
important files or the system
itself
9. System vulnerabilities to attack
System vulnerabilities to attack
• Use of Default User Accounts and Password
• Remote Access Not Disabled /Allowing Remote Access
• No proper Access Controls on Files
• Non Availability of Updated Antivirus and Firewall
• Non Availability of Updated Antivirus and Firewall
• Un-necessary Services running
10. Major Security Problems
Major Security Problems
• Virus and worms
• Malware
• Spyware
• Adware
• Denial of Service
• Spam Email
• Ransomware
• Key Logger
• Adware
• Hacking
• Phishing
• Trojan horses
• Key Logger
• ATM Skimming and Point of Sale
• Password Cracking
crimes
11. Viruses and Worms
Viruses and Worms
• AVirus is a “program that is
loaded onto your computer
without your knowledge and
runs against your wishes.
runs against your wishes.
• Viruses Attach themselves to
a file.
• Worms don’t need to attach
themselves.
13. Malware
Malware
• The word "malware" comes from the term "MALicious
softWARE. “ Malware is any software that infects and
damages a computer system without the owner's knowledge
or permission.
14. How to stop Malware
How to stop Malware
• Download an anti-malware
program that also helps prevent
infections.
• Activate Network Threat
• Activate Network Threat
Protection, Firewall,Antivirus.
15. Spyware
Spyware
• Spyware is a type of
malware that hackers use to
spy on you in order to gain
access to your personal
information, banking
information, banking
details, or online activity.
• We should protect
ourselves by installing an
anti-spyware tool.
16. Adware
Adware
• Adware is a type of
malware that bombards
you with endless ads and
pop-up windows that
could potentially be
could potentially be
dangerous for your device.
• The best way to remove
adware is to use an adware
removal tool.
17. Hacking
Hacking
• Hacking in simple terms
means an illegal intrusion into
a computer system and/or
network.
• Hacker is a person who
• Hacker is a person who
breaks into computers, usually
by gaining access to
administrative controls.
18. Types of Hackers
Types of Hackers
• White Hat Hacker
• Grey Hat Hacker
• Black Hat Hacker
19. White Hat Hacker
White Hat Hacker
• Individual professing hacker
skills and using them for
defensive purposes and also
known as Security analyst
20. Black Hat Hacker
Black Hat Hacker
• Individuals with extraordinary
computing skills, restoring to
malicious or destructive
activist.
21. Gray Hat Hacker
Gray Hat Hacker
• Individuals who work both
offensively and defensively
at various times
22. How to prevent hacking
How to prevent hacking
• It may be impossible to
prevent computer hacking,
however effective security
controls including strong
passwords, and the use of
passwords, and the use of
firewalls can helps.
23. Phishing
Phishing
• Phishing is a fraudulent attempt, usually made through email,
to steal your personal and sensitive information such as
username, password and credit card details.
• A common online phishing scam starts with an email message
that appears to come from a trusted source(legitimate site)
that appears to come from a trusted source(legitimate site)
but actually directs recipients to provide information to a
fraudulent web site.
25. Trojan Horses
Trojan Horses
• Trojan is a type of malware that pretends
to be something useful, helpful, or fun
while actually causing harm or stealing
data.
• Trojans are often silently downloading
• Trojans are often silently downloading
other malware (e.g. spyware, adware,
ransomware) on an infected device as
well.
26. How to avoid Trojan Horses
How to avoid Trojan Horses
• Security suites, such as Avast,
McAfee Internet Security, will
prevent you from downloading
Trojan Horses.
27. Denial of Service
Denial of Service
• This is an act by the criminals who floods the Bandwidth of
the victims network.
• In the DoS attack, a hacker uses internet connection to flood
a target with fake request-usually in an attempt to exhaust
server resources or until the target cannot respond or simply
server resources or until the target cannot respond or simply
crashes.
• On the other hand, DDoS attacks are launched from multiple
connected devices that are distributed across the internet.
28. Denial of Service
Denial of Service
• DoS :When a single host
attacks.
• DDoS :When multiple
hosts attack simultaneously
and continuously
and continuously
29. Spam Email
Spam Email
• Spamming is the use of electronic messaging systems to
send unsolicited messages (spam), especially advertising, as
well as sending messages repeatedly from the same site.
• Spam is a serious security
concern as it can be used
concern as it can be used
to deliverTrojan horses,
viruses, worms, spyware,
and targeted phishing attacks.
30. Ransomware
Ransomware
• Hackers use this technique to lock you out of your devices and
demand a ransom money in return for access.
• The most dangerous ransomware attacks are caused by
Wannacry, Petya,Cerber and Locky ransomware.
31. Keylogger
Keylogger
• Keylogger also known as a keystroke logger or system monitor.
It can be a program or a hardware installed in the system,
which log each key strokes and map it to a text file and send it
to the creator.
32. ATM Skimming and Point of Sale Crimes
ATM Skimming and Point of Sale Crimes
• It is a technique of compromising the ATM machine by
installing a skimming device, at top of the machine keypad to
appear as a genuine keypad or a device made to be affixed to
the card reader to look like a part of the machine.
• Successful implementation of skimmers cause in ATM
• Successful implementation of skimmers cause in ATM
machine to collect card numbers and personal identification
number that are later replicated to carry out fraudulent
transaction.
33.
34. Password Cracking
Password Cracking
• Password attacks are attacks
by hackers that are able to
determine passwords or find
passwords to different
protected electronic areas and
protected electronic areas and
social network sites.
36. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• There is a hacker attack every 39 seconds
• 95% of breached records came from only three industries in
2016
• 43% of cyber attacks target small business
• The average cost of a data breach in 2020 will exceed $150
• The average cost of a data breach in 2020 will exceed $150
million
• Over 75% of healthcare industry has been infected with
malware over last year
37. Cyber Security Facts and Stats
Cyber Security Facts and Stats
• Large-scale DDoS attacks increase in size by 500%
• Approximately $6 trillion is expected to be spent globally on
cyber security by 2021
• More than 77% of organizations do not have a Cyber Security
• More than 77% of organizations do not have a Cyber Security
Incident Response plan
• Share prices fall 7.27% on average after a breach
38. What is Cyber Crime?
What is Cyber Crime?
• Any criminal act done with the help of computer or any
electronic devices through internet is Cyber Crime.
• Unlawful act wherein the computer is either a tool or target
or both.
39. Cyber Crimes includes
Cyber Crimes includes
• Illegal access
• Illegal Interception
• System Interference
• Data Interference
• Data Interference
• Misuse of devices
• Fraud
40. History of Cyber Crime
History of Cyber Crime
• The first cyber crime was recorded in the year1820.
• The first spam email took place in 1978 when it was sent over
the ARPANet.
• On January 18, 1994, the first large scale spam hit the USENET.
• On January 18, 1994, the first large scale spam hit the USENET.
“Global Alert for All: Jesus is Coming Soon” was cross-
posted to every available newsgroup by a student.
• The firstVirus, Elk Cloner was installed on an Apple Computer
in 1982 written by Rich Skrenta.
41. Advantages of Cyber Security
Advantages of Cyber Security
• It will defend from hacks and viruses.
• It helps us to browse the safe website.
• Internet Security processes all the incoming and outgoing data
on our computer.
The cyber security will defend us from critical attacks.
• The cyber security will defend us from critical attacks.
• Protection for data and network
• Prevention of unauthorized users
• Protection to end users
42. Safety Tips
Safety Tips
• Read Privacy policy carefully when you submit the data through
internet.
• Encryption: lots of website uses SSL (secure socket layer)to
encrypt a data.
• Disable remote connectivity.
• Disable remote connectivity.
• The application of cyber security used in our PC needs update
every week.
• The security developers update their database every week . Hence
the new virus also deleted.
43. Safety Tips
Safety Tips
• Monitor for any changes in Configuration of ‘High risk’ devices
• Monitor Failed Login Attempts, Unusual Traffic, Changes to the
Firewall,Access Grants to Firewall
• Keep OS Updated
• Install Security Patches for OS
• Install Security Patches for OS
• Harden OS by turning off unnecessary Services and features
• Do not Install Programs of unknown origin
• Take precautions while using emails
44. Mobile Phone security
Mobile Phone security
• Use a strong password, Pattern lock
• Face and Finger print detection is
better
• Screen Lock/ App Lock
• Never store username/password in
• Never store username/password in
mobile
• Software Updates
• VPN
45. Banking Security
Banking Security
• Change Password and PIN (in a period of around 3 months)
• Do not use your same email password
• Always use HTTPS server while online transactions
• Use osk instead of our physical keyboard to login to banking sites.
• Go for the OTP instead of security password.
Do not share OTP to some other parties
Go for the OTP instead of security password.
• Do not share OTP to some other parties
• Never Response to anonymous call asking for your Account No,
Credit Card No,Transaction OTP etc.
• Use MPIN in UPI Transactions
• E-wallet Security
46. Real Time Cyber Security
Real Time Cyber Security
Question & Solution
Question & Solution
47. How do I know if an App is safe?
How do I know if an App is safe?
• Download apps from official app stores like App Store or
Google's Play Store only.
• Read the user reviews.
• Check out the developer. Rovio Entertainment makes Angry
• Check out the developer. Rovio Entertainment makes Angry
Birds Space; if you're downloading the game from other
developer, you're probably going to regret it.
• Install a mobile security app.
48. If an app is safe, is there anything to
If an app is safe, is there anything to
worry about it?
worry about it?
• Most free apps stay free by displaying messages from third-
party ad networks.
• Since the ad code comes from remote servers, it could
• Since the ad code comes from remote servers, it could
contain all kinds of bad things, including "root" apps that can
snatch complete control of your phone.
49. Is it safe to check my bank account on
Is it safe to check my bank account on
my phone?
my phone?
• "Short answer, 'Yes with an if,’ long answer, 'No with a but.’"
• Basically, we're pretty safe if we play it smart and have some
antispyware and malware protection in place.
50. Is every internet connection safe?
Is every internet connection safe?
• Cellular carrier's 3G or 4G network should be relatively secure.
• Wi-Fi hotspots can be a hacking honeypot
• Use only SecureWi-Fi (encrypted withWPA2 )
Use only the secure websites for sensitive operations.
• Use only the secure websites for sensitive operations.
• Turn-off the Wi-Fi once work is done.
51. I am using an unsecuredWi
I am using an unsecuredWi-
-Fi from my
Fi from my
neighbor. Is it possible for them to get
neighbor. Is it possible for them to get
access to my login ID and password?
access to my login ID and password?
• Yes, it is possible to access my IP address, passwords, GPS
tracking, and others information.
tracking, and others information.
• There is every chance that the connection could be used to
hack the device, gain access to the system, or attribute the
unwanted browsing history to me.
52. Tools used in Cyber Security
Tools used in Cyber Security
• Professional Look at Net
• F-RAT
61. Conclusion
Conclusion
• The only system which is truly secure is one which is switched
off and unplugged.
• So , only way to be safe is Pay attention and Act smart.