Submit Search
Upload
Online Security
•
Download as PPT, PDF
•
0 likes
•
281 views
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Follow
Online Security, Threats & Countermeasures
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 47
Download now
Recommended
Information Security Challenges & Opportunities
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
Cyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
Matthew Rosenquist
Cisco ccna security
Cisco ccna security
Mt Mostafa
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
PECB
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC Advisory Group
Recommended
Information Security Challenges & Opportunities
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
Cyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
Matthew Rosenquist
Cisco ccna security
Cisco ccna security
Mt Mostafa
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
PECB
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC Advisory Group
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
Firoze Hussain
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
Metholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
EnergySec
Cyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
Neil Matatall
Computer Security Policy D
Computer Security Policy D
guest34b014
Introduction to information security
Introduction to information security
Dhani Ahmad
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
Tharindunuwan9
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
Information security policy
Information security policy
BalachanderThilakar1
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
Security solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon
The Role of Information Security Policy
The Role of Information Security Policy
Robot Mode
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
IT Policy
IT Policy
SensewareInfomedia
New Threats to Data Security
New Threats to Data Security
DriveSavers, Inc.
Threats to online security and data
Threats to online security and data
Anthonywheeler
More Related Content
What's hot
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
Firoze Hussain
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
Metholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST
Cy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
EnergySec
Cyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
Neil Matatall
Computer Security Policy D
Computer Security Policy D
guest34b014
Introduction to information security
Introduction to information security
Dhani Ahmad
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
Tharindunuwan9
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
Information security policy
Information security policy
BalachanderThilakar1
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
102 Information security standards and specifications
102 Information security standards and specifications
SsendiSamuel
Security solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon
The Role of Information Security Policy
The Role of Information Security Policy
Robot Mode
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
IT Policy
IT Policy
SensewareInfomedia
What's hot
(20)
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
Metholodogies and Security Standards
Metholodogies and Security Standards
Cy Cops Company Presentation
Cy Cops Company Presentation
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
Cyber security vs information assurance
Cyber security vs information assurance
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
Computer Security Policy D
Computer Security Policy D
Introduction to information security
Introduction to information security
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
CCNA Security 02- fundamentals of network security
CCNA Security 02- fundamentals of network security
Information security policy
Information security policy
5 Standards And Recommendations For Information Security On Internet
5 Standards And Recommendations For Information Security On Internet
102 Information security standards and specifications
102 Information security standards and specifications
Security solutions for a smarter planet
Security solutions for a smarter planet
The Role of Information Security Policy
The Role of Information Security Policy
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
IT Policy
IT Policy
Viewers also liked
New Threats to Data Security
New Threats to Data Security
DriveSavers, Inc.
Threats to online security and data
Threats to online security and data
Anthonywheeler
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
AVG Technologies AU
Salim ghauri
Salim ghauri
Murad Khan
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
AVG Technologies AU
Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!
Ratanak Roth Oeurn
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
sommerville-videos
NetSol Investor Presentation
NetSol Investor Presentation
NetSol Technologies
Solving the Language Barrier
Solving the Language Barrier
Luis Medina
Securing the Cloud
Securing the Cloud
GGV Capital
Bill gates presentation
Bill gates presentation
donmos
Presentatie nedap071010
Presentatie nedap071010
MarcelPater
The teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websites
jherring
IET Welcome
IET Welcome
Mike Sharples
02 классификация документов
02 классификация документов
Lidia Pivovarova
Scrum on rails
Scrum on rails
Thorsten Kamann
3. open innov organization
3. open innov organization
Michele Missikoff
Matkalla metaverseen?
Matkalla metaverseen?
Ilkka Kukkonen
Martin karlssons vykortssamling stadshotellet
Martin karlssons vykortssamling stadshotellet
hembygdsigtuna
Viewers also liked
(19)
New Threats to Data Security
New Threats to Data Security
Threats to online security and data
Threats to online security and data
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
Salim ghauri
Salim ghauri
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
Explosive presentation-AWESOME Business opportunity await you!
Explosive presentation-AWESOME Business opportunity await you!
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
NetSol Investor Presentation
NetSol Investor Presentation
Solving the Language Barrier
Solving the Language Barrier
Securing the Cloud
Securing the Cloud
Bill gates presentation
Bill gates presentation
Presentatie nedap071010
Presentatie nedap071010
The teacher librarian as resource creator: Developing learning websites
The teacher librarian as resource creator: Developing learning websites
IET Welcome
IET Welcome
02 классификация документов
02 классификация документов
Scrum on rails
Scrum on rails
3. open innov organization
3. open innov organization
Matkalla metaverseen?
Matkalla metaverseen?
Martin karlssons vykortssamling stadshotellet
Martin karlssons vykortssamling stadshotellet
Similar to Online Security
Network Security Threats and Solutions
Network Security Threats and Solutions
Colin058
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Cscu module 02 securing operating systems
Cscu module 02 securing operating systems
Sejahtera Affif
Data security
Data security
Soumen Mondal
Cyber tooth
Cyber tooth
Andrew Sispoidis
Mobile security
Mobile security
Stefaan
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
01-intro-thompson.ppt
01-intro-thompson.ppt
MarcoAntonioSotoVera
01-intro-thompson.ppt
01-intro-thompson.ppt
ROHITCHHOKER3
Information Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
Insecurity vssut
Insecurity vssut
RAVIKUMAR Digital Signal Processing
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
mccormicknadine86
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Cyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Ivanti
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
Similar to Online Security
(20)
Network Security Threats and Solutions
Network Security Threats and Solutions
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Cscu module 02 securing operating systems
Cscu module 02 securing operating systems
Data security
Data security
Cyber tooth
Cyber tooth
Mobile security
Mobile security
01-intro-thompson.ppt
01-intro-thompson.ppt
Computer and Network Security
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
Information Security Lecture Notes
Information Security Lecture Notes
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Insecurity vssut
Insecurity vssut
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Cyber tooth briefing
Cyber tooth briefing
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
E commerce Security for end Users
E commerce Security for end Users
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Application Security
Application Security
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Recent PCI Hacks
Recent PCI Hacks
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Integrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
Response To Criticism On E Crime Law
Response To Criticism On E Crime Law
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
More from Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
(11)
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
IoT - Rise of New Zombies Army
IoT - Rise of New Zombies Army
E commerce Security for end Users
E commerce Security for end Users
Role of Certification Authority in E-Commerce
Role of Certification Authority in E-Commerce
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Application Security
Application Security
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Recent PCI Hacks
Recent PCI Hacks
Integrating Multiple IT Security Standards
Integrating Multiple IT Security Standards
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Response To Criticism On E Crime Law
Response To Criticism On E Crime Law
Recently uploaded
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Andrey Dotsenko
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Recently uploaded
(20)
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
costume and set research powerpoint presentation
costume and set research powerpoint presentation
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
The transition to renewables in India.pdf
The transition to renewables in India.pdf
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Online Security
1.
© 2007 NetSol
Technologies, Inc. All rights reserved 1 Session Two Online Security, Threats & Countermeasures
2.
© 2007 NetSol
Technologies, Inc. All rights reserved 2 Online Security, Threats & Countermeasures E-Mails Messengers Communities Maps / GPS
3.
3 Preventing Password from Hacking
4.
© 2007 NetSol
Technologies, Inc. All rights reserved 4 Preventing Password from Hacking Your password should be like your Toothbrush, how? Choose a good password Use the password everyday Don’t share your password with anyone Change your password regularly
5.
© 2007 NetSol
Technologies, Inc. All rights reserved 5 Preventing Password from Hacking (Cont…) Attacks Brute Force Attacks Dictionary Attacks Password Guessing Scripts Man-in-the-middle attacks Social Engineering Shoulder Surfing / Video Recording Spy-ware/Key Loggers Keyboard Interceptor
6.
© 2007 NetSol
Technologies, Inc. All rights reserved 6 Preventing Password from Hacking (Cont…) Controls which should be managed properly: Length Legibility Life Last passwords’ history Limited attempts Lockout duration Log of failed attempts Limited Login time Logon banner Last username Last successful logon
7.
© 2007 NetSol
Technologies, Inc. All rights reserved 7 Preventing Password from Hacking (Cont…) Password/Pin should include: Upper-and lowercase letters Numbers (e.g. replace s with 5) And special characters (e.g. replace a with @) More words or first letter of each word of sentence Password/Pin should NOT be: User Name/mother’s name Country / City Name etc. Date/year of birth Digits of Phone No. Dictionary Words Saved/Written anywhere Should be different for different accounts
8.
© 2007 NetSol
Technologies, Inc. All rights reserved 8 Preventing Password from Hacking (Cont…) Protocols sending password as plain text: File Transfer Protocol (FTP) Password Authentication Protocol (PAP) Sites accepting password as plain text? Which don’t offer SSL protocol How can we know about SSL protocol? Yellow Lock icon on browser Hacker Profiling Project (HPP) isecom.org
9.
9 Avoiding Viruses & Worms
10.
© 2007 NetSol
Technologies, Inc. All rights reserved 10 Avoiding Viruses & Worms Prevention is better than cure Vaccination. Vaccine? E.g. Antivirus program
11.
© 2007 NetSol
Technologies, Inc. All rights reserved 11 Avoiding Viruses & Worms (Cont...) Types of Malicious Code: Viruses Worms Trojan Horses Hoaxes Logic Bombs Malicious Applets Trap Doors Hidden Code DOS Attacks Zombies / BotNets
12.
© 2007 NetSol
Technologies, Inc. All rights reserved 12 Trojan Horse
13.
© 2007 NetSol
Technologies, Inc. All rights reserved 13 Avoiding Viruses & Worms (Cont...) Sources of Viruses & Worms Removable Medium Local Area Networks World Wide Web Wireless Network E-mail File Sharing
14.
© 2007 NetSol
Technologies, Inc. All rights reserved 14 Avoiding Viruses & Worms (Cont...) Preventive Measures Keep removable medium Read-only Permissions of shared media Lock Hard Disk Boot Sector (from BIOS) Admin mode vs. normal user mode Software Firewall Backup Periodically
15.
© 2007 NetSol
Technologies, Inc. All rights reserved 15 Avoiding Viruses & Worms (Cont...) Preventive Measures for Mobile Phones: Sure about the consequences of ‘Yes’ btn. Destroy unknown MMS messages Unknown Bluetooth Connections
16.
© 2007 NetSol
Technologies, Inc. All rights reserved 16 Source: http://www.antiphishing.org
17.
© 2007 NetSol
Technologies, Inc. All rights reserved 17 Source: http://www.antiphishing.org
18.
© 2007 NetSol
Technologies, Inc. All rights reserved 18 Avoiding Viruses & Worms (Cont...) Preventive Measures for E-mail & WWW Spoofed e-mail address Unexpected attachments .exe, .com, .cmd, .vbs, .js, .scr, .bat, .reg etc. attachments Macros of documents “amazon.com/skdjfhskjdfskgf/ws” and “amazon.com.skdjfhskjdfskgf.ws” DNS Poisoning Multilingual domain name. MSN.com, ΜSΝ.com
19.
© 2007 NetSol
Technologies, Inc. All rights reserved 19 Avoiding Viruses & Worms (Cont...) Multilingual
20.
© 2007 NetSol
Technologies, Inc. All rights reserved 20
21.
© 2007 NetSol
Technologies, Inc. All rights reserved 21 Antivirus Types Signature based Behavior based Software based Hardware based
22.
22 Protecting Identity
23.
© 2007 NetSol
Technologies, Inc. All rights reserved 23 Protecting Identity
24.
© 2007 NetSol
Technologies, Inc. All rights reserved 24 Protecting Identity (Cont…)
25.
© 2007 NetSol
Technologies, Inc. All rights reserved 25 Protecting Identity (Cont…)
26.
© 2007 NetSol
Technologies, Inc. All rights reserved 26 Protecting Identity (Cont…)
27.
© 2007 NetSol
Technologies, Inc. All rights reserved 27 Protecting Identity (Cont…) Disclosing your Account/Credit Card (CC) Info. on e-mail / Phone Debit card v. Credit card for E-payment Photocopies of Cards Use CC Only with “yellow lock” website Keep your CC/ATM receipts Mother’s maiden name Selling your computer/mobile Having used computer/mobile
28.
© 2007 NetSol
Technologies, Inc. All rights reserved 28 Protecting Identity (Cont…) CC with photo CC Statement Security Your Letterbox Shred, to avoid dumpster diving Warnings/information by the Browser Websites of illegal software / cracks etc. Cracked / Illegally patched software Phishing
29.
© 2007 NetSol
Technologies, Inc. All rights reserved 29 Guidelines by SBP (7 pages) Source: http://www.sbp.org.pk/psd/2006/CardHolders_Guide_URDU.pdf
30.
© 2007 NetSol
Technologies, Inc. All rights reserved 30
31.
© 2007 NetSol
Technologies, Inc. All rights reserved 31
32.
© 2007 NetSol
Technologies, Inc. All rights reserved 32
33.
© 2007 NetSol
Technologies, Inc. All rights reserved 33 Source: http://www.antiphishing.org
34.
© 2007 NetSol
Technologies, Inc. All rights reserved 34 Source: http://www.antiphishing.org
35.
© 2007 NetSol
Technologies, Inc. All rights reserved 35 Most Targeted Industry Sectors Source: http://www.antiphishing.org
36.
© 2007 NetSol
Technologies, Inc. All rights reserved 36 Protecting Identity (Cont…) Aprox.10 million Identity thefts/year in USA 19 people/minute Becoming no.1 crime after drug trafficking Left in cabs of London during 6 months: 4973 Laptops 5939 Pocket PCs. 63135 Mobile phonesSource: East California University, www.ecu.edu
37.
© 2007 NetSol
Technologies, Inc. All rights reserved 37 Protecting Identity (Cont…) Technical Countermeasures: Encryption Digital certificate, Pvt. Pub. Key pair Authenticity of Identity Digital Signature Secure Private Key Two factor authentication Secure Socket Layer (SSL)
38.
© 2007 NetSol
Technologies, Inc. All rights reserved 38
39.
© 2007 NetSol
Technologies, Inc. All rights reserved 39
40.
© 2007 NetSol
Technologies, Inc. All rights reserved 40
41.
© 2007 NetSol
Technologies, Inc. All rights reserved 41 Protecting Identity (Cont…) Frauds: Certificate issued by an un trusted party Expired Certificate Certificate of someone else’s Site
42.
© 2007 NetSol
Technologies, Inc. All rights reserved 42
43.
© 2007 NetSol
Technologies, Inc. All rights reserved 43
44.
© 2007 NetSol
Technologies, Inc. All rights reserved 44
45.
© 2007 NetSol
Technologies, Inc. All rights reserved 45 Protecting Identity (Cont…)
46.
© 2007 NetSol
Technologies, Inc. All rights reserved 46 ?
47.
© 2007 NetSol
Technologies, Inc. All rights reserved 47 Thank You
Download now