SlideShare a Scribd company logo
IT Security
Deepak John, Assistant Lecturer
Department of Computing, Lyit
Topics to be covered
1. Introduction to IT security
2. malware, phishing, information theft
3. Protecting data on all devices
4. Search safely online and evaluate web content
Certificate in Digital Skills
IT Security
➢ It is a set of security strategies that prevents unauthorized access to the systems, networks,
and data.
➢ Types of IT security
1. Network security: used to prevent unauthorized or malicious users from getting inside your
network.
2. Internet security: involves the protection of information that is sent and received in
browsers.
3. Endpoint security: provides protection at the device level.
4. Cloud security: help secure the usage of software-as-a-service (SaaS) applications and the
public cloud.
5. Application security: applications are specifically coded at the time of their creation to be as
secure as possible, to ensure they are not vulnerable to attacks.
Certificate in Digital Skills
Malware, Phishing, Information Theft
1. Malware
➢ these are malicious computer program that are installed without the consent
of users and can cause a number of unpleasant effects
➢ Types of Malware
a) Viruses
b) Spyware
c) Adware
Certificate in Digital Skills
Viruses
➢ most commonly-known form of malware
➢ that replicates by copying itself to another program, computer boot
sector or document and changes how a computer works.
➢ potentially the most destructive.
Certificate in Digital Skills
Spyware
➢ Collects your personal information and passes it on to interested
third parties without your knowledge or consent.
➢ Secretly records your browsing habits, the websites you visit, and
your online purchases. Some types of spyware also record your
passwords, login credentials, and credit card details.
Certificate in Digital Skills
Adware
➢ Displays pop-up advertisements when you are online.
➢ Adware uses the browser to collect your web browsing history in
order to ’target’ advertisements that seem tailored to your interests.
Certificate in Digital Skills
 Signs of Malware in your system
1. Rapid Battery loss
2. Random reboots and shutdowns
3. Frequent crashes
4. Unusually slow computer performance
5. Strange emails and text messages
6. High data Traffic
7. Activity when the computer is not in use
8. Delayed shutdown
9. Unexpected popups with urgent messages
10.Unknown programs that start up when you turn on your computer.
Certificate in Digital Skills
Facts about Malware
➢ Malware is often bundled with other software and may be installed
without your knowledge.
➢ Malware is very difficult to remove.
➢ Malware threatens your privacy.
Certificate in Digital Skills
Phishing
 Phishing is a cybercrime and is a type of cyber attack that uses
email, SMS, phone, or social media to entice a victim to share
sensitive information — or to download a malicious file that will
install viruses on their computer or phone.
Certificate in Digital Skills
 Characteristics Of Phishing Messages
i. Asks for sensitive information:Legitimate businesses won’t request
ii. Uses a different domain:Check the domain by looking at the Sent
field.
iii. Contains links that don’t match the domain:Hover the cursor over
any links to make sure they will take you to the site you expect. Also
look for https:// at the start of the URL, and do not click on any link
that does not use HTTPS.
iv. Includes unsolicited attachments
v. Is not personalized
vi. Uses poor spelling and grammar
Certificate in Digital Skills
Certificate in Digital Skills
Notice the generic salutation at the beginning, and the unsolicited web link
attachment?
Certificate in Digital Skills
Phishing mail example
Certificate in Digital Skills
1. The message claims to be from UMass Amherst, but the actual address is a
"umass.department" address rather than a trusted "@umass.edu" address.
2. The message contains a link titled "SIGN IN HERE," which does not show
it's actual address. Hover over links to check them before clicking!
Hovering over this link shows that it leads to a non-UMass address.
3. The link in the message directs to a fraudulent UMass Amherst login page
with a "abcdesign.ca" url, rather than a trusted UMass address.
Certificate in Digital Skills
 How to Protect Against Phishing Attacks
✓ Be cautious about all communications you receive, and remember
that although phishing may most commonly happen through email,
it can also occur through cell phone, SMS and social media.
✓ Before downloading an app, check the reviews for quantity and
quality, only connect to trusted devices.
Certificate in Digital Skills
Information Theft or Identity Theft
 Identity theft occurs when someone stolen your personal
information and used that to commit fraud or other crimes.
 Types
i. Financial identity theft
ii. Identity cloning
iii. Criminal identity theft
iv. Medical identity theft
Certificate in Digital Skills
 How to protect from information theft
i. Protect your personal information
ii. routinely monitoring your financial accounts and billing statements
for suspicious activities
iii. If you identify potential identity theft, take steps to stop further
damage.
Certificate in Digital Skills
Software Vulnerability
 A software vulnerability is a glitch, flaw, or weakness present in the
software or in an OS (Operating System).
 all systems include vulnerabilities. The thing is whether or not
they’re exploited to cause damage.
 Software vulnerabilities are explained by three ideal factors. These
are:
• Existence – The existence of a vulnerability in the software.
• Access – The possibility that hackers gain access to the
vulnerability.
• Exploit – The capability of the hacker to take advantage of that
vulnerability via tools or with certain techniques.
Certificate in Digital Skills
Protecting Data on Devices
1. Keep the Firewall On and update it regularly
2. Prevent unauthorized access to your data or computing devices
3. Use updated Antivirus
4. Only download software from trusted websites
5. Manage Your Operating System and Browser
6. Encrypt the data
7. Back up your Data
Certificate in Digital Skills
Use a firewall
➢ "Firewalls assist in blocking dangerous programs, viruses or
spyware before they infiltrate your system.
➢ Various software companies offer firewall protection, but hardware-
based firewalls, like those frequently built into network routers,
provide a better level of security,"
Certificate in Digital Skills
Prevent unauthorized access to your data or computing devices
➢ By using Passwords or Paraphrases
➢ By turn off the devices while unattended
Certificate in Digital Skills
Encrypt the data.
➢ encryption is the process of encoding information.
➢ Ensure data protection by using publicly available tools
Certificate in Digital Skills
Backup your data
➢ One of the most basic, yet often overlooked, data protection tips is
backing up your data.
➢ Basically, this creates a duplicate copy of your data so that if a
device is lost, stolen, or compromised, you don't also lose your
important information.
Certificate in Digital Skills
Manage Your Operating System ,software's and Browser
➢ Operating system updates are necessary, as these updates contain
critical security patches that will protect your computer from
recently discovered threats.
➢ It's best to set automatic updates for the operating system and other
software's.
Certificate in Digital Skills
Use Antivirus
➢ helps protect your computer against malware and cybercriminals.
➢ Antivirus looks at data — web pages, files, software, applications —
traveling over the network to your devices.
➢ It searches for known threats and monitors the behaviour of all
programs, flagging suspicious behaviour.
➢ It seeks to block or remove malware as quickly as possible.
Certificate in Digital Skills
Search Safely Online and Evaluate Web Content
Search Safely Online
➢ The risks associated with online search
• Exposure to material that may be offensive or illegal.
• Visibility to search engine providers of your search activity.
• Chances of Security Threats
Certificate in Digital Skills
 Pop-ups are small windows that ‘pop up’ over the top of web pages in
your internet browser.
 A plugin is a software add-on that is installed on a program, enhancing
its capabilities.
 Virtual proxy networks or VPNs help you maintain your privacy by
encrypting your data and internet requests before they ever hit the
internet.
Certificate in Digital Skills
 Cookies
✓ are text files with small pieces of data — like a username and password —
that are used to identify your computer.
✓ Data stored in a cookie is created by the server upon your connection. This
data is labeled with an ID unique to you and your computer.
✓ types of cookies
1. Magic Cookies :this would be used for a login to computer database
systems, such as a business internal network.
2. HTTP Cookies:or internet cookies, are built specifically for Internet web
browsers to track, personalize, and save information about each user’s
session. A “session” just refers to the time you spend on a site.
Certificate in Digital Skills
Things to remember for online search
1. Be picky about what Wi-Fi you’re using
2. Keep your browser and plugins updated
3. Block Pop-ups
4. Use an ad blocker
5. Enable “do not track” in your browser
6. Clear your web browser cache and cookies
7. Use a VPN
8. Ensure you have up-to-date antivirus and firewall protection
Certificate in Digital Skills
Evaluate Web Content
 consider these criteria for evaluating Web resources
1. Currency
2. Relevance
3. authority
4. Accuracy
5. purpose.
Certificate in Digital Skills
Certificate in Digital Skills
Thank You
Certificate in Digital Skills

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Dr. B T Sampath Kumar
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
dilahkmpk
 
Information security
Information securityInformation security
Information security
Shanthamallachar D B
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
CreatorsCircle
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
cyber_security
cyber_securitycyber_security
cyber_security
Jana Baxter
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
anandraje
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Computer security and
Computer security andComputer security and
Computer security and
Rana Usman Sattar
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
4.1.2 area 2016
4.1.2 area 20164.1.2 area 2016
4.1.2 area 2016
 
Information security
Information securityInformation security
Information security
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer security and
Computer security andComputer security and
Computer security and
 
1 security goals
1   security goals1   security goals
1 security goals
 

Similar to It security,malware,phishing,information theft

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
WK8.pptx
WK8.pptxWK8.pptx
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Samuel862293
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
techalpha07
techalpha07techalpha07

Similar to It security,malware,phishing,information theft (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security
Computer securityComputer security
Computer security
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital AssetsCybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber security
Cyber securityCyber security
Cyber security
 
techalpha07
techalpha07techalpha07
techalpha07
 

More from Deepak John

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
Deepak John
 
Information management
Information managementInformation management
Information management
Deepak John
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
Deepak John
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
Deepak John
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set
Deepak John
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
Deepak John
 
Registers and counters
Registers and counters Registers and counters
Registers and counters
Deepak John
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
Deepak John
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
Deepak John
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
Deepak John
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
Deepak John
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters
Deepak John
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
Deepak John
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
Deepak John
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
Deepak John
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
Deepak John
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
Deepak John
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gates
Deepak John
 
Module 1 number systems and code1
Module 1  number systems and code1Module 1  number systems and code1
Module 1 number systems and code1
Deepak John
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
Deepak John
 

More from Deepak John (20)

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Information management
Information managementInformation management
Information management
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
 
Registers and counters
Registers and counters Registers and counters
Registers and counters
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gates
 
Module 1 number systems and code1
Module 1  number systems and code1Module 1  number systems and code1
Module 1 number systems and code1
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 

Recently uploaded

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 

Recently uploaded (20)

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 

It security,malware,phishing,information theft

  • 1. IT Security Deepak John, Assistant Lecturer Department of Computing, Lyit
  • 2. Topics to be covered 1. Introduction to IT security 2. malware, phishing, information theft 3. Protecting data on all devices 4. Search safely online and evaluate web content Certificate in Digital Skills
  • 3. IT Security ➢ It is a set of security strategies that prevents unauthorized access to the systems, networks, and data. ➢ Types of IT security 1. Network security: used to prevent unauthorized or malicious users from getting inside your network. 2. Internet security: involves the protection of information that is sent and received in browsers. 3. Endpoint security: provides protection at the device level. 4. Cloud security: help secure the usage of software-as-a-service (SaaS) applications and the public cloud. 5. Application security: applications are specifically coded at the time of their creation to be as secure as possible, to ensure they are not vulnerable to attacks. Certificate in Digital Skills
  • 4. Malware, Phishing, Information Theft 1. Malware ➢ these are malicious computer program that are installed without the consent of users and can cause a number of unpleasant effects ➢ Types of Malware a) Viruses b) Spyware c) Adware Certificate in Digital Skills
  • 5. Viruses ➢ most commonly-known form of malware ➢ that replicates by copying itself to another program, computer boot sector or document and changes how a computer works. ➢ potentially the most destructive. Certificate in Digital Skills
  • 6. Spyware ➢ Collects your personal information and passes it on to interested third parties without your knowledge or consent. ➢ Secretly records your browsing habits, the websites you visit, and your online purchases. Some types of spyware also record your passwords, login credentials, and credit card details. Certificate in Digital Skills
  • 7. Adware ➢ Displays pop-up advertisements when you are online. ➢ Adware uses the browser to collect your web browsing history in order to ’target’ advertisements that seem tailored to your interests. Certificate in Digital Skills
  • 8.  Signs of Malware in your system 1. Rapid Battery loss 2. Random reboots and shutdowns 3. Frequent crashes 4. Unusually slow computer performance 5. Strange emails and text messages 6. High data Traffic 7. Activity when the computer is not in use 8. Delayed shutdown 9. Unexpected popups with urgent messages 10.Unknown programs that start up when you turn on your computer. Certificate in Digital Skills
  • 9. Facts about Malware ➢ Malware is often bundled with other software and may be installed without your knowledge. ➢ Malware is very difficult to remove. ➢ Malware threatens your privacy. Certificate in Digital Skills
  • 10. Phishing  Phishing is a cybercrime and is a type of cyber attack that uses email, SMS, phone, or social media to entice a victim to share sensitive information — or to download a malicious file that will install viruses on their computer or phone. Certificate in Digital Skills
  • 11.  Characteristics Of Phishing Messages i. Asks for sensitive information:Legitimate businesses won’t request ii. Uses a different domain:Check the domain by looking at the Sent field. iii. Contains links that don’t match the domain:Hover the cursor over any links to make sure they will take you to the site you expect. Also look for https:// at the start of the URL, and do not click on any link that does not use HTTPS. iv. Includes unsolicited attachments v. Is not personalized vi. Uses poor spelling and grammar Certificate in Digital Skills
  • 12. Certificate in Digital Skills Notice the generic salutation at the beginning, and the unsolicited web link attachment?
  • 14. Phishing mail example Certificate in Digital Skills 1. The message claims to be from UMass Amherst, but the actual address is a "umass.department" address rather than a trusted "@umass.edu" address. 2. The message contains a link titled "SIGN IN HERE," which does not show it's actual address. Hover over links to check them before clicking! Hovering over this link shows that it leads to a non-UMass address. 3. The link in the message directs to a fraudulent UMass Amherst login page with a "abcdesign.ca" url, rather than a trusted UMass address.
  • 16.  How to Protect Against Phishing Attacks ✓ Be cautious about all communications you receive, and remember that although phishing may most commonly happen through email, it can also occur through cell phone, SMS and social media. ✓ Before downloading an app, check the reviews for quantity and quality, only connect to trusted devices. Certificate in Digital Skills
  • 17. Information Theft or Identity Theft  Identity theft occurs when someone stolen your personal information and used that to commit fraud or other crimes.  Types i. Financial identity theft ii. Identity cloning iii. Criminal identity theft iv. Medical identity theft Certificate in Digital Skills
  • 18.  How to protect from information theft i. Protect your personal information ii. routinely monitoring your financial accounts and billing statements for suspicious activities iii. If you identify potential identity theft, take steps to stop further damage. Certificate in Digital Skills
  • 19. Software Vulnerability  A software vulnerability is a glitch, flaw, or weakness present in the software or in an OS (Operating System).  all systems include vulnerabilities. The thing is whether or not they’re exploited to cause damage.  Software vulnerabilities are explained by three ideal factors. These are: • Existence – The existence of a vulnerability in the software. • Access – The possibility that hackers gain access to the vulnerability. • Exploit – The capability of the hacker to take advantage of that vulnerability via tools or with certain techniques. Certificate in Digital Skills
  • 20. Protecting Data on Devices 1. Keep the Firewall On and update it regularly 2. Prevent unauthorized access to your data or computing devices 3. Use updated Antivirus 4. Only download software from trusted websites 5. Manage Your Operating System and Browser 6. Encrypt the data 7. Back up your Data Certificate in Digital Skills
  • 21. Use a firewall ➢ "Firewalls assist in blocking dangerous programs, viruses or spyware before they infiltrate your system. ➢ Various software companies offer firewall protection, but hardware- based firewalls, like those frequently built into network routers, provide a better level of security," Certificate in Digital Skills
  • 22. Prevent unauthorized access to your data or computing devices ➢ By using Passwords or Paraphrases ➢ By turn off the devices while unattended Certificate in Digital Skills
  • 23. Encrypt the data. ➢ encryption is the process of encoding information. ➢ Ensure data protection by using publicly available tools Certificate in Digital Skills
  • 24. Backup your data ➢ One of the most basic, yet often overlooked, data protection tips is backing up your data. ➢ Basically, this creates a duplicate copy of your data so that if a device is lost, stolen, or compromised, you don't also lose your important information. Certificate in Digital Skills
  • 25. Manage Your Operating System ,software's and Browser ➢ Operating system updates are necessary, as these updates contain critical security patches that will protect your computer from recently discovered threats. ➢ It's best to set automatic updates for the operating system and other software's. Certificate in Digital Skills
  • 26. Use Antivirus ➢ helps protect your computer against malware and cybercriminals. ➢ Antivirus looks at data — web pages, files, software, applications — traveling over the network to your devices. ➢ It searches for known threats and monitors the behaviour of all programs, flagging suspicious behaviour. ➢ It seeks to block or remove malware as quickly as possible. Certificate in Digital Skills
  • 27. Search Safely Online and Evaluate Web Content Search Safely Online ➢ The risks associated with online search • Exposure to material that may be offensive or illegal. • Visibility to search engine providers of your search activity. • Chances of Security Threats Certificate in Digital Skills
  • 28.  Pop-ups are small windows that ‘pop up’ over the top of web pages in your internet browser.  A plugin is a software add-on that is installed on a program, enhancing its capabilities.  Virtual proxy networks or VPNs help you maintain your privacy by encrypting your data and internet requests before they ever hit the internet. Certificate in Digital Skills
  • 29.  Cookies ✓ are text files with small pieces of data — like a username and password — that are used to identify your computer. ✓ Data stored in a cookie is created by the server upon your connection. This data is labeled with an ID unique to you and your computer. ✓ types of cookies 1. Magic Cookies :this would be used for a login to computer database systems, such as a business internal network. 2. HTTP Cookies:or internet cookies, are built specifically for Internet web browsers to track, personalize, and save information about each user’s session. A “session” just refers to the time you spend on a site. Certificate in Digital Skills
  • 30. Things to remember for online search 1. Be picky about what Wi-Fi you’re using 2. Keep your browser and plugins updated 3. Block Pop-ups 4. Use an ad blocker 5. Enable “do not track” in your browser 6. Clear your web browser cache and cookies 7. Use a VPN 8. Ensure you have up-to-date antivirus and firewall protection Certificate in Digital Skills
  • 31. Evaluate Web Content  consider these criteria for evaluating Web resources 1. Currency 2. Relevance 3. authority 4. Accuracy 5. purpose. Certificate in Digital Skills
  • 33. Thank You Certificate in Digital Skills