This document summarizes a presentation on cyber safety. It covers common cyber threats like viruses, hackers, identity theft and spyware. It then outlines seven actions people can take to protect themselves, including installing software updates, using anti-virus software, enabling firewalls, strong passwords, and backing up files. The presentation notes cyber safety laws in Nepal and includes sample true/false and multiple choice questions for discussion.
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
This presentation brings out few basic steps that every android phone user should configure to harden his/her device.Although the list is not completly exhaustive but it brings out basic necessities as expected from any smart user.
Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.
Cyber crime is an illegal activity committed on the internet.
hackin is an unauthorized access to the computer system by a hacker..
#Stay_Secure :)
Overview of Internet and network security protocols and architectures.
Network and Internet security is about authenticity, secrecy, privacy, authorization, non-repudiation, data integrity and protection from denial of service (DOS) attacks.
In the early days of the Internet, security was not a concern so most protocols were developed without protection from various kinds of attacks in mind. The Internet is now infested with malware like worms, viruses, trojan horses and killer packets. Unprotected hosts run the risk of being seized by hackers and become part of botnets to launch even more elaborate attacks.
Careful protection of hosts in a network is therefore of paramount importance. Hosts that need not be reachable from the Internet are typically placed in a protected LAN. Hosts with reachability requirements like mail and web servers are placed in a special network zone called DMZ (DeMilitarized Zone).
Firewalls protect the different networks. Firewall functionality ranges from simple port and address filters up to stateful application and deep packet inspection firewalls that provide more protection.
In general, security policies should be as restrictive as reasonable possible. So usually something not explicitly allowed should be classified as forbidden and thus be blocked.
Hacking is the process of attempting to gain or successfully gaining unauthorized access to computer resources.
In this presentation types of hacking, types of hackers, process of hacking, advantages of hacking and disvantages are illustrated.
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
This presentation brings out few basic steps that every android phone user should configure to harden his/her device.Although the list is not completly exhaustive but it brings out basic necessities as expected from any smart user.
Computer crime or Cyber Crime is criminal activity that involves unlawful access to computer systems.
Cyber crime is an illegal activity committed on the internet.
hackin is an unauthorized access to the computer system by a hacker..
#Stay_Secure :)
Overview of Internet and network security protocols and architectures.
Network and Internet security is about authenticity, secrecy, privacy, authorization, non-repudiation, data integrity and protection from denial of service (DOS) attacks.
In the early days of the Internet, security was not a concern so most protocols were developed without protection from various kinds of attacks in mind. The Internet is now infested with malware like worms, viruses, trojan horses and killer packets. Unprotected hosts run the risk of being seized by hackers and become part of botnets to launch even more elaborate attacks.
Careful protection of hosts in a network is therefore of paramount importance. Hosts that need not be reachable from the Internet are typically placed in a protected LAN. Hosts with reachability requirements like mail and web servers are placed in a special network zone called DMZ (DeMilitarized Zone).
Firewalls protect the different networks. Firewall functionality ranges from simple port and address filters up to stateful application and deep packet inspection firewalls that provide more protection.
In general, security policies should be as restrictive as reasonable possible. So usually something not explicitly allowed should be classified as forbidden and thus be blocked.
Hacking is the process of attempting to gain or successfully gaining unauthorized access to computer resources.
In this presentation types of hacking, types of hackers, process of hacking, advantages of hacking and disvantages are illustrated.
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
we have made this like computer application course material which is so functionable and any one can use it to develop your technological concept skill.
We Belete And Tadelech
Free ebook! Discussions around cybersecurity can be complex, but everyone must know that you should stay safe online, regardless of your technical expertise. This ebook gives you some essential tips for keeping yourself and your data secure on the internet.
ebook download link: https://zcu.io/nsTr
What else does it cover?
If you have been considering what steps you can take to protect yourself from threats, you’ll get great insights about what types of common risks exist and how you can prepare for them.
- Security Measures for General Public
- Security Measures for Remote Employees
- Common Cybersecurity Risks For Business By Employees
- Cybersecurity Career Opportunities for Tech Enthusiasts
Stay Safe in the Cyberspace!
#freeebook #ebook #cybersecurity #cybersecurityawareness #security #cybersecurity #cloudsecurity #infosec #privacy #datasecurity #cyberattack #databreach #dataprotection #digital #security #phishing #informationsecurityawareness #informationsecurity
It's been said nearly every two seconds a new malicious URL is created for use in a cyber attack. Statistics like these should give pause, knowing your agency’s data is constantly vulnerable to such risks. In this guide, we’ll give you the tools and information you need to defend against cyber threats. We start with some of the most recent tactics, so you and your staff can be alert for suspicious happenings. Next, we look at how to inform and protect your clients and staff. Finally, we explore how to keep your data secure in the power of the cloud.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
2. 2
This presentation explains about some basic information and practical
suggestions for protecting your personal information and computer from cyber-
attacks. Cyber-safety topics covered include:
-What is Cyber Safety?
Cyber Safety Threats,
Cyber Safety Action,
Discussion;
Question and Answers
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
3. 3
Cyber-safety is a common term used to describe a set
of practices, measures and/or actions you can take to
protect personal information and your computer
systems from attacks.
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
4. Information security means protecting
information and information systems from
unauthorized access, use, disclosure,
disruption, modification or destruction.
Information Security is not just technology, It
is a process, a policy, and a culture.
12/8/2019 4
Educational Training
centre,Dhulikhel , Kavre
5. 5
Viruses
Viruses infect computers through email
attachments and file sharing. They delete
files, attack other computers, and make
your computer run slowly. One infected
computer can cause problems for all
computers on a network.
Hackers
Hackers are people who “trespass” into
your computer from a remote location.
They may use your computer to send
spam or viruses, host a Web site, or do
other activities that cause computer
malfunctions.
Identity Thefts
People who obtain unauthorized access
to your personal information, such as
Social Security and financial account
numbers. They then use this information
to commit crimes such as fraud or theft.
Spyware
Spyware is software that “piggybacks” on
programs you download, gathers
information about your online habits, and
transmits personal information without
your knowledge. It may also cause a
wide range of other computer
malfunctions.
First, let’s talk about some common cyber-safety threats and the problems
they can cause . . .
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
6. The following slides describe the top seven actions you can take to protect
personal information and your computer.
By implementing all seven of these security measures, you will protect
yourself, others, and your computer from many common threats.
In most cases, implementing each of these security measures will only take
a few minutes.
612/8/2019
Educational Training
centre,Dhulikhel , Kavre
7. 7
1. Install OS/Software Updates
2. Run Anti-virus Software
3. Prevent Identity Theft
4. Turn on Personal Firewalls
5. Avoid Spyware/Adware/Malware
7. Back up Important Files & Data
Additional information about each of the actions below is provided on slides 8-14. Faculty
and staff should work with their technical support coordinator before implementing these
measures.
6. Protect Passwords
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
8. Updates-sometimes called patches-fix problems with your operating
system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and
software programs (e.g., Microsoft Office applications).
Most new operating systems are set to download updates by default.
After updates are downloaded, you will be asked to install them. Click
yes!
Be sure to restart your computer after updates are installed so that the
patches can be applied immediately.
812/8/2019
Educational Training
centre,Dhulikhel , Kavre
9. 9
To avoid computer problems caused by viruses, install and run an anti-virus
program
Periodically, check to see if your anti-virus is up to date by opening your anti-
virus program and checking the Last updated: date.
Anti-virus software removes viruses, quarantines and repairs infected files,
and can help prevent future viruses.
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
10. 10
Don't give out financial account numbers, Social Security numbers, driver’s license
numbers or other personal identity information unless you know exactly who's receiving
it. Protect others people’s information as you would your own.
Never send personal or confidential information via email or instant messages as these
can be easily intercepted.
Beware of phishing scams - a form of fraud that uses email messages that appear to be
from a reputable business (often a financial institution) in an attempt to gain personal or
account information. These often do not include a personal salutation. Never enter
personal information into an online form you accessed via a link in an email you were
not expecting. Legitimate businesses will not ask for personal information online.
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
11. Check your computer's security settings for a built-in personal firewall. If you have
one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls. For more
information.
Firewalls act as protective barriers between computers and the internet.
Hackers search the Internet by sending out pings (calls) to random computers and
wait for responses. Firewalls prevent your computer from responding to these calls.
1112/8/2019
Educational Training
centre,Dhulikhel , Kavre
12. 12
Spyware and adware take up memory and can slow down your computer or
cause other problems.
Use Spybot and Ad-Aware to remove spyware/adware from your computer.
UC Davis students, faculty and staff can get Spybot and Ad-Aware for free on
the Internet Tools CD (available from IT Express in Shields Library).
Watch for allusions to spyware and adware in user agreements before
installing free software programs.
Be wary of invitations to download software from unknown internet sources.
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
13. 13
Do not share your passwords, and always make new passwords difficult to guess by
avoiding dictionary words, and mixing letters, numbers and punctuation.
Do not use one of these common passwords or any variation of them: qwerty1, abc123,
letmein, password1, iloveyou1, (yourname1), baseball1.
Change your passwords periodically.
When choosing a password:
o Mix upper and lower case letters
o Use a minimum of 8 characters
o Use mnemonics to help you remember a difficult password
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
14. BACK UP IMPORTANT FILES
Reduce your risk of losing important files to a virus, computer crash, theft or
disaster by creating back-up copies.
Keep your critical files in one place on your computer’s hard drive so you
can easily create a back up copy.
Save copies of your important documents and files to a CD, online back up
service, flash or USB drive, or a server.
Store your back-up media in a secure place away from your computer, in
case of fire or theft.
Test your back up media periodically to make sure the files are accessible
and readable.
1412/8/2019
Educational Training
centre,Dhulikhel , Kavre
15. Physically secure your computer by using security cables and locking doors
and windows in the dorms and off-campus housing.
Avoid leaving your laptop unsupervised and in plain view in the library or
coffee house, or in your car, dorm room or home.
Set up a user account and password to prevent unauthorized access to your
computer files.
Do not install unnecessary programs on your computer.
15
CYBER-SAFETY AT HOME
12/8/2019
Educational Training
centre,Dhulikhel , Kavre
16. Be sure to work with your technical support coordinator before implementing
new cyber-safety measures.
Talk with your technical support coordinator about what cyber-safety
measures are in place in your department.
Report to your supervisor any cyber-safety policy violations, security
flaws/weaknesses you discover or any suspicious activity by unauthorized
individuals in your work area.
Physically secure your computer by using security cables and locking
building/office doors and windows.
Do not install unnecessary programs on your work computer.
1612/8/2019
Educational Training
centre,Dhulikhel , Kavre
17. Nepal has promulgated The Electronic Transaction
Act, 2063 ( December 8, 2006)
To make legal provisions for authentication and
regularization, validity, integrity and reliability of
generation, production, processing, storage of
electronic records
Controller of Certification Authority (CCA) has been
established
Sometime there is dilemma in working between
different entities say who regulates for content?
1712/8/2019
Educational Training
centre,Dhulikhel , Kavre
18. 1. True or False? Viruses can be transmitted via
email, email attachments or IM.
2. People who seek out your personal information
and then use it to commit crimes are
called:_____________________
3. Which of the following are ways to help prevent
identity theft. (Check all that apply.)
__A. Never send personal information
via email or instant messages.
__B. Always send personal information via
email or instant messages.
__C. Lock my office door.
__D. Don’t tell anybody my name. 1812/8/2019
Educational Training
centre,Dhulikhel , Kavre
19. 1.True or False? Iloveyou2 is a good password.
Why or why not?
2.Which anti-virus program is available to all UC
Davis students, faculty and staff for
free?________________________
3.I just downloaded a free program online and
now my computer is running very, very slowly.
Which of the following most likely happened?
__A. I didn’t install the program properly.
__B. I didn’t have enough space on my
hard drive for the new program.
__C. I downloaded spyware and/or
adware, too.
__D. Someone snuck in while the program
was downloading and changed my
password.
4.___________________help prevent your
computer from responding to pings (calls) from12/8/2019 19Dev Prasad Pandit
20. 1. True
2. Identity thieves
3. A and C are correct. D would probably help
too, but seems a bit extreme!
4. False. Iloveyou2 is a very common
password.
5. Sophos Anti-Virus is free to UC Davis
students, faculty and staff.
6. C. It’s most likely that you downloaded
spyware and/or adware.
7. Firewalls 2012/8/2019Dev Prasad Pandit
21. How did you do?
8-7correct : Fantastic! You can help write the
next quiz!
6-5 correct: Good. You can help write the
next quiz, but we’ll check it for
accuracy . . . just in case.
4-3 correct: You might want to review the
material for the questions you missed.
12/8/2019 21Dev Prasad Pandit