SlideShare a Scribd company logo
INFORMATION
SECURITY AWARENESS
London Metropolitan University -
Odniel
PEOPLE MAKES HACKER’S JOB EASY
Audio
Format
Text
Format
Graphical
Format
INFORMATION
Information is data that has been processed in such a
way as to be meaningful
Graphical Format
Images, Videos
Text Format
Text Messages, Username,
Password
Audio Format
Voice Messages on WhatsApp,
Facebook messenger etc.
What is Information
Security?
Effects of being careless
on Information Security
To prevent
unauthorized access to
our sensitive/Privacy
information
Importance of
Information Security
Privacy Issues
Money Loss
Leads to
Suicide
INFORMATION
SECURITY
is a set of
practices intended
to keep data
secure from
unauthorized
access or
alterations
To Stop Hackers from
Stealing our Information
PUBLIC WI-FI AWARENESS
JUICE JACKING AWARENESS
SOCIAL MEDIA AWARENESS
01
02
03
We Makes Hacker’s Job
easy without our
Concern
UNWANTED APPS/SOFTWARE
INSTALLATION
WEAK PASSWORDS
PHISHING – URL
DARK WEB / DEEP WEB
01
02
03
04
We Makes Hacker’s
Job easy with our
Concern
HACKING
What is Hacker
The person who has knowledge
in programming, perform
information theft
White Hat
Protects system in the ongoing
battle against cyber threats.
Find vulnerabilities and provide
solutions to solve them before
hacker finds
Grey Hat
Break into systems but they
don’t steal information, gives
the solution instead
What is Hacking
The process of attempting to
gain unauthorized access to
computer resource
Types of Hacker
White Hat
Black Hat
Grey Hat
Black Hat
Break into systems and steal
data for their own gain.
01
02
03
Risks of PUBLIC WIFI
Man-in-the-Middle Attacks
When a computer device makes
a connection to the internet on
public Wi-Fi, vulnerabilities can
allow an attacker to get in
between and read them.
Malware Distribution
Hacker can inject malware onto
your device through the public
Wi-Fi.
Problems
If we make an online transaction
on public Wi-Fi, attacker can get
the card details and he will get
the money from our account.
Also if we log in to our accounts,
he can easy get the credentials
through these attacks.
Solution – VPN (Virtual Private
Network)
A simple software that was created to
protect your online privacy by creating a
private network.
How does it works?
VPN encrypt all the data you send over
the internet.
C
B
A
Is a type of cyber attack involving a
charging port that doubles as a data
connection, typically over USB.
Attacker uses a USB connection to load
malware directly onto the charging station,
When you use the infected charging port,
attacker can steal your data.
Avoid public charge stations or portable wall
chargers
Power Down the phone before charging
Disable auto pairing mode on your device.
JUICE JACKING
Identity theft
Criminals and Hackers trawl social media for
information
Shop receipts to duplicate barcodes
Holiday posts to facilitate burglary
Personal Information to crack passwords or steal Identities
Threats on Social Media
Facebook, Twitter, Instagram etc.
Think before post any of these on your social
accounts
Full name
Date of Birth
Hometown
Relationship status
Pet Names
** Everything you like, share, and comment on says
something about you **
Issues of Unauthorized Software
Installation
Apps on Apple® AppStore
and Google Play™ ,
Microsoft Store
Authorized
Software
 Apps made by someone
other than the
manufacturer of a
mobile device or its
operating system.
 Cracked Software.
Unauthorized
Software
What are the problems ????
• Some unauthorized software contains malwares that infects
user’s device
What is Malware ????
• Malware, short for malicious software, is a blanket
term for viruses, worms, trojans and other harmful
computer programs hackers use to wreak destruction
and gain access to sensitive information
Most Common issues of unauthorized software/apps installation
• RAT – Remote Access Trojan
• Keylogger
RAT – Remote Access Trojan
 Remote access Trojan (RAT) is a malware program
that includes a back door for administrative
control over the target computer.
 RATs are usually downloaded invisibly with a user-
requested program. Such as cracked files or
unauthorized apps.
Hacker can do these things with the use of RAT
• Accessing confidential information, such as credit
card and social security numbers.
• Activating a system's webcam and recording
video.
• Taking screenshots.
• Distributing viruses and other malware.
• Formatting drives.
• Deleting, downloading or altering files and file
systems.
Keylogger
 Keyloggers are a type of monitoring software
designed to record keystrokes made by a user.
 intercepts signals from your keyboard and records
every keystroke you make.
Solution for these issues
 Don’t download and install unauthorized apps
 Keep your device updated
 Use Anti-Virus & Internet Security Application.
Weak Passwords
 Weak Passwords are easily guessable.
 Example :- Yourname@123 , Password@321 , Own mobile
number
 Stop using passwords that are related to your personal info.
 Example :- Passwords on parents name, GF/BF Name
Some password cracking methods you have to
know
 Brute-Force Attack
In a brute force attack, a hacker uses a computer program to
login to a user’s account with all possible password combinations.
 Dictionary Attack
dictionary attacks rely on a few key factors of users’
psychology. For example, users tend to pick short passwords and
base their passwords off common words.
Social Media – Instagram
Username & Password
Sample Phishing
Attack
• Phishing is a type of social
engineering attack often
used to steal user data,
including login credentials
and credit card numbers
• Phishing works like Fishing
What is Phishing
Phishing
Dark Web / Deep
Web
What is Dark Web / Deep Web
The dark web is a dark side of the internet that isn't
indexed by search engines
What will u find there ?
You can buy credit card numbers, all manner of drugs,
guns, counterfeit money, stolen subscription credentials,
hacked Netflix accounts and software that helps you break
into other people’s computers

More Related Content

Similar to pp.pptx

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
HugoReglezRodrguez
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
Infusionsoft
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
Nagarro
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 

Similar to pp.pptx (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 

Recently uploaded

Pro Tips for Effortless Contract Management
Pro Tips for Effortless Contract ManagementPro Tips for Effortless Contract Management
Pro Tips for Effortless Contract Management
Eternity Paralegal Services
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
advik4387
 
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
irhcs
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
concepsionchomo153
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
obriengroupinc04
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
ZevinAttisha
 
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper PresentationKirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
Harwinder Singh
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
my Pandit
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Herman Kienhuis
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
Ksquare Energy Pvt. Ltd.
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
RedSeer
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
hello960827
 

Recently uploaded (20)

Pro Tips for Effortless Contract Management
Pro Tips for Effortless Contract ManagementPro Tips for Effortless Contract Management
Pro Tips for Effortless Contract Management
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
 
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
1Q24_HYUNDAI CAPITAL SERVICES INC. AND SUBSIDIARIES
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
IMG_20240615_091110.pdf dpboss guessing
 
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注外围盘口-欧洲杯投注盘口app|【​网址​🎉ac22.net🎉​】
 
Discover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling ServiceDiscover the Beauty and Functionality of The Expert Remodeling Service
Discover the Beauty and Functionality of The Expert Remodeling Service
 
CULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for dukeCULR Spring 2024 Journal.pdf testing for duke
CULR Spring 2024 Journal.pdf testing for duke
 
Kirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper PresentationKirill Klip GEM Royalty TNR Gold Copper Presentation
Kirill Klip GEM Royalty TNR Gold Copper Presentation
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
Efficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web ApplicationsEfficient PHP Development Solutions for Dynamic Web Applications
Efficient PHP Development Solutions for Dynamic Web Applications
 
The Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac SignThe Steadfast and Reliable Bull: Taurus Zodiac Sign
The Steadfast and Reliable Bull: Taurus Zodiac Sign
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
Presentation by Herman Kienhuis (Curiosity VC) on Investing in AI for ABS Alu...
 
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
 

pp.pptx

  • 1. INFORMATION SECURITY AWARENESS London Metropolitan University - Odniel PEOPLE MAKES HACKER’S JOB EASY
  • 2. Audio Format Text Format Graphical Format INFORMATION Information is data that has been processed in such a way as to be meaningful Graphical Format Images, Videos Text Format Text Messages, Username, Password Audio Format Voice Messages on WhatsApp, Facebook messenger etc.
  • 3. What is Information Security? Effects of being careless on Information Security To prevent unauthorized access to our sensitive/Privacy information Importance of Information Security Privacy Issues Money Loss Leads to Suicide INFORMATION SECURITY is a set of practices intended to keep data secure from unauthorized access or alterations To Stop Hackers from Stealing our Information
  • 4. PUBLIC WI-FI AWARENESS JUICE JACKING AWARENESS SOCIAL MEDIA AWARENESS 01 02 03 We Makes Hacker’s Job easy without our Concern
  • 5. UNWANTED APPS/SOFTWARE INSTALLATION WEAK PASSWORDS PHISHING – URL DARK WEB / DEEP WEB 01 02 03 04 We Makes Hacker’s Job easy with our Concern
  • 6. HACKING What is Hacker The person who has knowledge in programming, perform information theft White Hat Protects system in the ongoing battle against cyber threats. Find vulnerabilities and provide solutions to solve them before hacker finds Grey Hat Break into systems but they don’t steal information, gives the solution instead What is Hacking The process of attempting to gain unauthorized access to computer resource Types of Hacker White Hat Black Hat Grey Hat Black Hat Break into systems and steal data for their own gain.
  • 7. 01 02 03 Risks of PUBLIC WIFI Man-in-the-Middle Attacks When a computer device makes a connection to the internet on public Wi-Fi, vulnerabilities can allow an attacker to get in between and read them. Malware Distribution Hacker can inject malware onto your device through the public Wi-Fi. Problems If we make an online transaction on public Wi-Fi, attacker can get the card details and he will get the money from our account. Also if we log in to our accounts, he can easy get the credentials through these attacks. Solution – VPN (Virtual Private Network) A simple software that was created to protect your online privacy by creating a private network. How does it works? VPN encrypt all the data you send over the internet.
  • 8. C B A Is a type of cyber attack involving a charging port that doubles as a data connection, typically over USB. Attacker uses a USB connection to load malware directly onto the charging station, When you use the infected charging port, attacker can steal your data. Avoid public charge stations or portable wall chargers Power Down the phone before charging Disable auto pairing mode on your device. JUICE JACKING
  • 9. Identity theft Criminals and Hackers trawl social media for information Shop receipts to duplicate barcodes Holiday posts to facilitate burglary Personal Information to crack passwords or steal Identities Threats on Social Media Facebook, Twitter, Instagram etc. Think before post any of these on your social accounts Full name Date of Birth Hometown Relationship status Pet Names ** Everything you like, share, and comment on says something about you **
  • 10. Issues of Unauthorized Software Installation Apps on Apple® AppStore and Google Play™ , Microsoft Store Authorized Software  Apps made by someone other than the manufacturer of a mobile device or its operating system.  Cracked Software. Unauthorized Software What are the problems ???? • Some unauthorized software contains malwares that infects user’s device What is Malware ???? • Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information Most Common issues of unauthorized software/apps installation • RAT – Remote Access Trojan • Keylogger
  • 11. RAT – Remote Access Trojan  Remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.  RATs are usually downloaded invisibly with a user- requested program. Such as cracked files or unauthorized apps. Hacker can do these things with the use of RAT • Accessing confidential information, such as credit card and social security numbers. • Activating a system's webcam and recording video. • Taking screenshots. • Distributing viruses and other malware. • Formatting drives. • Deleting, downloading or altering files and file systems.
  • 12. Keylogger  Keyloggers are a type of monitoring software designed to record keystrokes made by a user.  intercepts signals from your keyboard and records every keystroke you make. Solution for these issues  Don’t download and install unauthorized apps  Keep your device updated  Use Anti-Virus & Internet Security Application.
  • 13. Weak Passwords  Weak Passwords are easily guessable.  Example :- Yourname@123 , Password@321 , Own mobile number  Stop using passwords that are related to your personal info.  Example :- Passwords on parents name, GF/BF Name Some password cracking methods you have to know  Brute-Force Attack In a brute force attack, a hacker uses a computer program to login to a user’s account with all possible password combinations.  Dictionary Attack dictionary attacks rely on a few key factors of users’ psychology. For example, users tend to pick short passwords and base their passwords off common words.
  • 14. Social Media – Instagram Username & Password Sample Phishing Attack • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers • Phishing works like Fishing What is Phishing Phishing
  • 15. Dark Web / Deep Web What is Dark Web / Deep Web The dark web is a dark side of the internet that isn't indexed by search engines What will u find there ? You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers