SlideShare a Scribd company logo
Internet security
Phishing
O Phishing is a fake email masked as legitimate. Hackers
create phishing emails through which they intend to steal
your confidential information like passwords and bank
account details. This kind of email appears to have come
from a well-known person or organization like your bank or
company that you work for. These emails generally try to
create an urgency or panic to trick users into giving out their
personal details. For example, you receive an email from
your bank saying that your ATM card has been disabled and
you need to confirm your card number to re-activate it.
Phishing
O How can it steal your data?
O The phishing email might contain a link which on clicking will
take you to a fake web page. For example, the link might take
you to a fake bank website which looks very legitimate but in
reality is just a lookalike. If the victim falls for the scam and
enters his/her account details on the website, the details will
actually go to the hacker's server instead of going to the bank
and the hacker will have all the information that the victim has
provided on the website.
Phishing
O How to stay safe?
O Look for spelling or grammatical errors in domain names or email
addresses. Cyber criminals also often use email addresses that
resemble the names of well-known companies but are slightly altered.
For example, accounts@gmall.com instead of accounts@gmail.com (“l”
instead of “i”).
O Think twice before clicking any links. If you see a link in a suspicious
email message, don't click on it. Instead, hover your mouse on the link
to see if the URL matches the link that was provided in the message.
O Cyber criminals often use threats that your security has been
compromised or your account has been blocked. Don’t fall for such
tricks. Take your time to assess the situation.
Smishing
O Smishing is a form of phishing in which
someone tries to trick you into giving them
your private information via a phone call
or SMS message. Smishing is becoming
an emerging and growing threat in the
world of online security.
Malware
O Malware is a malicious software that is written with the intent of
compromising a system and stealing the data available on the
system. These programs can perform a variety of functions some of
which include stealing or deleting sensitive data, modifying system’s
core functionalities, and secretly tracking the victim’s activities.
There are various factors that can lead to the installation of malware
in your system. One is running an older or pirated version of an
operating system which is not safe or updated and thus vulnerable
to attacks. Clicking on unknown links or installing fake/pirated
software can also lead to downloading of malicious programs.
Malware
O Major types of malware
O Virus: A virus is a program that is capable of infecting software and
disabling or modifying a system’s core functionality. It tends to
replicate itself into data files, programs or boot sector of a
computer's hard drive and making the files/system inaccessible.
O Trojans: This type of malware tends to create backdoors in your
security to let attackers monitor your activities remotely. It disguises
itself as legitimate software or is included in legitimate software that
has been tampered with.
Malware
O Major types of malware
O Spyware: Spyware is malware designed to spy on you. It
hides in the background and tracks everything you do online,
including your passwords, credit card numbers, surfing habits
and chats. It can record keystrokes, video you from your
webcam and even listen from your microphone.
O Keylogger: This is a specific form of spyware that simply
records the keys you type and where you type them. These
logs are then sent to the attacker who can analyze them to
find your passwords, chats, credit card numbers and much
more.
Malware
O How to stay safe?
O Use a legitimate anti-virus software.
O Do not download any fake software as there are chances it
may contain malware.
O Never click on fake antivirus pop-ups that are generated from
websites.
O Always keep your operating system updated.
O Never download pirated apps/software as they always
contain some kind of malware
Physical security threats
O A physical threat is any threat to your sensitive information
that results from other people having a direct physical
access to your devices like laptops, hard drives and mobile
devices. Physical device threats occur when someone is
able to physically gain access to your confidential data like
data gathered from stolen devices.
O Physical security breaches can happen at your workplace
or even at your home. For example, someone could get
hold of your confidential files that they are not supposed to
see or access an unattended system which is not
password-protected.
Physical security threats
O How to stay safe?
O Be careful how you store confidential information.
Use encrypted computer hard drives, USBs, etc if
they contain sensitive information.
O Never write your passwords on a post-it or notepad.
O Never leave your system unattended. Always protect
it with a strong password.
O Don’t leave your phone unlocked and unattended.
O Make sure proper backup and remote wipe services
are enabled in case you lose your device.
Insecure networks
O Connecting your system or device to an insecure network
can create the possibility of a hacker gaining access to all
the files on your system and monitoring your activity
online. A hacker in control of your system can steal
passwords of your social accounts, bank accounts and
even inject malware on authentic websites that you trust.
With programs freely available on the Internet, anyone can
sit in a car outside your home and access your critical files,
accounting data, usernames and passwords, or any other
information on the network.
Insecure networks
O Connecting to a “free” airport/coffee shop
WiFis is dangerous especially when you are
carrying out critical activities online such as
banking, private conversation or even
browsing your email. These networks are
often left unprotected which can allow a
malicious hacker in the same shop/region to
snoop on you easily.
Insecure networks
O How to stay safe?
O Never connect to open Wi-Fi networks that you can't
trust. Just because it's free, it doesn’t mean it's safe
too.
O If you are using a public Wi-Fi, avoid performing any
bank transactions or accessing any critical
information while being connected.
O Use strong encryption like WPA2 on your home and
office WiFi router instead of Open or WEP security as
these can easily be hacked.

More Related Content

What's hot

Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
Resham Acharya
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
NetLockSmith
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
Mason Bird
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
Jon Loyd
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
aaberra
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
Rachael Lewis Anna
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
Nicole Payne
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 

What's hot (20)

Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Cybersecurity tips
Cybersecurity tipsCybersecurity tips
Cybersecurity tips
 
CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to S01.L06 - Internet Security

CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
vjom
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
PraveenKumar313855
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
Dhruvsinhbhati
 

Similar to S01.L06 - Internet Security (20)

CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 

More from selcukca84

Google forms
Google formsGoogle forms
Google forms
selcukca84
 
Wordpress - S03.L08 - Creating Sub-menus
Wordpress - S03.L08 - Creating Sub-menusWordpress - S03.L08 - Creating Sub-menus
Wordpress - S03.L08 - Creating Sub-menus
selcukca84
 
Wordpress - S03.L06 - Adding Videos
Wordpress - S03.L06 - Adding VideosWordpress - S03.L06 - Adding Videos
Wordpress - S03.L06 - Adding Videos
selcukca84
 
Wordpress - S03.L07 - Inserting Hyperlinks
Wordpress - S03.L07 - Inserting HyperlinksWordpress - S03.L07 - Inserting Hyperlinks
Wordpress - S03.L07 - Inserting Hyperlinks
selcukca84
 
Wordpress - S03.L05 - Adding Posts
Wordpress - S03.L05 - Adding PostsWordpress - S03.L05 - Adding Posts
Wordpress - S03.L05 - Adding Posts
selcukca84
 
Wordpress - S03.L04 - Creating Pages
Wordpress - S03.L04 - Creating PagesWordpress - S03.L04 - Creating Pages
Wordpress - S03.L04 - Creating Pages
selcukca84
 
Wordpress - S03.L03 - Customizing the Theme
Wordpress - S03.L03 - Customizing the ThemeWordpress - S03.L03 - Customizing the Theme
Wordpress - S03.L03 - Customizing the Theme
selcukca84
 
Wordpress - S03.L01 - Using Google Drive
Wordpress - S03.L01 - Using Google DriveWordpress - S03.L01 - Using Google Drive
Wordpress - S03.L01 - Using Google Drive
selcukca84
 
HTML Coding
HTML CodingHTML Coding
HTML Coding
selcukca84
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
selcukca84
 
Making PowerPoint Slides
Making PowerPoint SlidesMaking PowerPoint Slides
Making PowerPoint Slides
selcukca84
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
selcukca84
 
S01.L05 - Using Search Engines
S01.L05 - Using Search EnginesS01.L05 - Using Search Engines
S01.L05 - Using Search Engines
selcukca84
 
S01.L04 - Understanding the Cloud
S01.L04 - Understanding the CloudS01.L04 - Understanding the Cloud
S01.L04 - Understanding the Cloud
selcukca84
 
S01.L03 - Connecting to the Internet
S01.L03 - Connecting to the InternetS01.L03 - Connecting to the Internet
S01.L03 - Connecting to the Internet
selcukca84
 
S01.L02 - Internet Servers
S01.L02 - Internet ServersS01.L02 - Internet Servers
S01.L02 - Internet Servers
selcukca84
 
S01.L01 - Understanding the Internet
S01.L01 - Understanding the InternetS01.L01 - Understanding the Internet
S01.L01 - Understanding the Internet
selcukca84
 
Testi arritshmerise
Testi arritshmeriseTesti arritshmerise
Testi arritshmerise
selcukca84
 
Decimal vs binary
Decimal vs binaryDecimal vs binary
Decimal vs binary
selcukca84
 
Windows 7 Accessories
Windows 7 AccessoriesWindows 7 Accessories
Windows 7 Accessories
selcukca84
 

More from selcukca84 (20)

Google forms
Google formsGoogle forms
Google forms
 
Wordpress - S03.L08 - Creating Sub-menus
Wordpress - S03.L08 - Creating Sub-menusWordpress - S03.L08 - Creating Sub-menus
Wordpress - S03.L08 - Creating Sub-menus
 
Wordpress - S03.L06 - Adding Videos
Wordpress - S03.L06 - Adding VideosWordpress - S03.L06 - Adding Videos
Wordpress - S03.L06 - Adding Videos
 
Wordpress - S03.L07 - Inserting Hyperlinks
Wordpress - S03.L07 - Inserting HyperlinksWordpress - S03.L07 - Inserting Hyperlinks
Wordpress - S03.L07 - Inserting Hyperlinks
 
Wordpress - S03.L05 - Adding Posts
Wordpress - S03.L05 - Adding PostsWordpress - S03.L05 - Adding Posts
Wordpress - S03.L05 - Adding Posts
 
Wordpress - S03.L04 - Creating Pages
Wordpress - S03.L04 - Creating PagesWordpress - S03.L04 - Creating Pages
Wordpress - S03.L04 - Creating Pages
 
Wordpress - S03.L03 - Customizing the Theme
Wordpress - S03.L03 - Customizing the ThemeWordpress - S03.L03 - Customizing the Theme
Wordpress - S03.L03 - Customizing the Theme
 
Wordpress - S03.L01 - Using Google Drive
Wordpress - S03.L01 - Using Google DriveWordpress - S03.L01 - Using Google Drive
Wordpress - S03.L01 - Using Google Drive
 
HTML Coding
HTML CodingHTML Coding
HTML Coding
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
Making PowerPoint Slides
Making PowerPoint SlidesMaking PowerPoint Slides
Making PowerPoint Slides
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
S01.L05 - Using Search Engines
S01.L05 - Using Search EnginesS01.L05 - Using Search Engines
S01.L05 - Using Search Engines
 
S01.L04 - Understanding the Cloud
S01.L04 - Understanding the CloudS01.L04 - Understanding the Cloud
S01.L04 - Understanding the Cloud
 
S01.L03 - Connecting to the Internet
S01.L03 - Connecting to the InternetS01.L03 - Connecting to the Internet
S01.L03 - Connecting to the Internet
 
S01.L02 - Internet Servers
S01.L02 - Internet ServersS01.L02 - Internet Servers
S01.L02 - Internet Servers
 
S01.L01 - Understanding the Internet
S01.L01 - Understanding the InternetS01.L01 - Understanding the Internet
S01.L01 - Understanding the Internet
 
Testi arritshmerise
Testi arritshmeriseTesti arritshmerise
Testi arritshmerise
 
Decimal vs binary
Decimal vs binaryDecimal vs binary
Decimal vs binary
 
Windows 7 Accessories
Windows 7 AccessoriesWindows 7 Accessories
Windows 7 Accessories
 

Recently uploaded

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 

Recently uploaded (20)

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 

S01.L06 - Internet Security

  • 2. Phishing O Phishing is a fake email masked as legitimate. Hackers create phishing emails through which they intend to steal your confidential information like passwords and bank account details. This kind of email appears to have come from a well-known person or organization like your bank or company that you work for. These emails generally try to create an urgency or panic to trick users into giving out their personal details. For example, you receive an email from your bank saying that your ATM card has been disabled and you need to confirm your card number to re-activate it.
  • 3. Phishing O How can it steal your data? O The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.
  • 4. Phishing O How to stay safe? O Look for spelling or grammatical errors in domain names or email addresses. Cyber criminals also often use email addresses that resemble the names of well-known companies but are slightly altered. For example, accounts@gmall.com instead of accounts@gmail.com (“l” instead of “i”). O Think twice before clicking any links. If you see a link in a suspicious email message, don't click on it. Instead, hover your mouse on the link to see if the URL matches the link that was provided in the message. O Cyber criminals often use threats that your security has been compromised or your account has been blocked. Don’t fall for such tricks. Take your time to assess the situation.
  • 5. Smishing O Smishing is a form of phishing in which someone tries to trick you into giving them your private information via a phone call or SMS message. Smishing is becoming an emerging and growing threat in the world of online security.
  • 6. Malware O Malware is a malicious software that is written with the intent of compromising a system and stealing the data available on the system. These programs can perform a variety of functions some of which include stealing or deleting sensitive data, modifying system’s core functionalities, and secretly tracking the victim’s activities. There are various factors that can lead to the installation of malware in your system. One is running an older or pirated version of an operating system which is not safe or updated and thus vulnerable to attacks. Clicking on unknown links or installing fake/pirated software can also lead to downloading of malicious programs.
  • 7. Malware O Major types of malware O Virus: A virus is a program that is capable of infecting software and disabling or modifying a system’s core functionality. It tends to replicate itself into data files, programs or boot sector of a computer's hard drive and making the files/system inaccessible. O Trojans: This type of malware tends to create backdoors in your security to let attackers monitor your activities remotely. It disguises itself as legitimate software or is included in legitimate software that has been tampered with.
  • 8. Malware O Major types of malware O Spyware: Spyware is malware designed to spy on you. It hides in the background and tracks everything you do online, including your passwords, credit card numbers, surfing habits and chats. It can record keystrokes, video you from your webcam and even listen from your microphone. O Keylogger: This is a specific form of spyware that simply records the keys you type and where you type them. These logs are then sent to the attacker who can analyze them to find your passwords, chats, credit card numbers and much more.
  • 9. Malware O How to stay safe? O Use a legitimate anti-virus software. O Do not download any fake software as there are chances it may contain malware. O Never click on fake antivirus pop-ups that are generated from websites. O Always keep your operating system updated. O Never download pirated apps/software as they always contain some kind of malware
  • 10. Physical security threats O A physical threat is any threat to your sensitive information that results from other people having a direct physical access to your devices like laptops, hard drives and mobile devices. Physical device threats occur when someone is able to physically gain access to your confidential data like data gathered from stolen devices. O Physical security breaches can happen at your workplace or even at your home. For example, someone could get hold of your confidential files that they are not supposed to see or access an unattended system which is not password-protected.
  • 11. Physical security threats O How to stay safe? O Be careful how you store confidential information. Use encrypted computer hard drives, USBs, etc if they contain sensitive information. O Never write your passwords on a post-it or notepad. O Never leave your system unattended. Always protect it with a strong password. O Don’t leave your phone unlocked and unattended. O Make sure proper backup and remote wipe services are enabled in case you lose your device.
  • 12. Insecure networks O Connecting your system or device to an insecure network can create the possibility of a hacker gaining access to all the files on your system and monitoring your activity online. A hacker in control of your system can steal passwords of your social accounts, bank accounts and even inject malware on authentic websites that you trust. With programs freely available on the Internet, anyone can sit in a car outside your home and access your critical files, accounting data, usernames and passwords, or any other information on the network.
  • 13. Insecure networks O Connecting to a “free” airport/coffee shop WiFis is dangerous especially when you are carrying out critical activities online such as banking, private conversation or even browsing your email. These networks are often left unprotected which can allow a malicious hacker in the same shop/region to snoop on you easily.
  • 14. Insecure networks O How to stay safe? O Never connect to open Wi-Fi networks that you can't trust. Just because it's free, it doesn’t mean it's safe too. O If you are using a public Wi-Fi, avoid performing any bank transactions or accessing any critical information while being connected. O Use strong encryption like WPA2 on your home and office WiFi router instead of Open or WEP security as these can easily be hacked.