SlideShare a Scribd company logo
1 of 39
The Net is Dangerous:

How to Protect Yourself and Your Company



              Gihan Dias
         University of Moratuwa
Why do we use the Internet?

   To get Information
   To provide information
   To communicate with other people
   To transact business, etc.
What can happen to me on the
Internet?
   can get caught to a fraud
   can be misled by falsehoods
   can waste my time
   can lose my money
   can lose my reputation
   can lose my identity
   can be lured into dangerous situations
If we don't use the Internet?

   Must go to the library to find information
   Should read the newspaper to get the cricket
    scores
   Have to send postal letters
   Need to visit your bank to check your balance


    We are back in the 20th century
So What do we Do?

   We need to be careful

   on the network
   on the computer
   what we do
What we'll cover today

   e-Mail
   Web
   Your Computer
   You
   Your company
e-Mail
e-Mail Scams




   Try to get you to do something by telling a story
Get Your password
 Dear Webmail User
 Your mailbox has exceeded the limit of Quota
 Usage, which is as set by your manager, and
 access to your mailbox via our mail portal will
 be unavailable for sometime during this
 maintenance
 period.

 You will not be able to create new e-mail to
 send or receive again
 until you validate your mailbox.

 To re-validate your mailbox, you can CLICK HERE
 https://docs.google.com/spreadsheet/viewform?
 formkey=dDdaOHc1MnlPUEVpc2FkVNNfdewk4xcHc6MQ

 Thanks
 System Administrator.
Send Malware to your computer

Attn: Owner/Manager
Here with the Better Business Bureau notifies you that we have
 received a complaint (ID 272854705) from one of your
customers with respect to their dealership with you.
Please open the COMPLAINT REPORT below to obtain more
information on this matter and let us know of your point of view
as soon as possible.
We are looking forward to your prompt reply.
Regards,
Allyssa BONDS
How to avoid e-Mail scams

   Make sure your e-mail program has security
    features enabled
       don't ignore warning messages
   Be suspicious of attachments or links
       attachments may contain malware
       links may go to sites which contain malware, or try
        to get your password
   Check who has sent the e-mail
       even if you recognise the "From:" adress, it may
        have been sent by a virus
How to avoid e-Mail scams (cont.)

   Ignore any offers to give / make money
   Be careful of people asking for money
   Don't give any personal info to website, unless
    you know who it is and have typed the address
    on the browser
       credit card / bank info
       phone no., address, e-mail
How to avoid e-Mail scams (cont.)

   Check the spelling, grammar and language of
    the message – many scam mails are in poor
    English
   Beware of messages which look just like
    message you get from Facebook, your bank,
    etc. - a scammer could have sent them
       may find your family members on Facebook and
        send mail as them
How to avoid e-Mail scams (cont.)

   Your company should run a spam / malware
    filter
       don't bypass it
   Deletes most viruses
   Can't delete all spam / scams
       one man's spam is another man's ham
       scammers are getting very sophisiticated
Junk Folder

   Today's e-mail programs are good at detecting
    viruses, spam, etc.
   They usually move spam to a "Junk" folder
       only problem, they may move good messages –
        usually from people not in your address book – to
        the junk folder
   Check your junk folder occasionally
Web
Secure connections

   A secure (https) connection
    1. secures connection between your computer and a
      website so outsiders can't read what you type
    2. confirms the identity of the site
      Indicated by a padlock or similar icon on your
      browser
   Verify the owner of the website by clicking on
    the address bar
   Don't type in passwords or credit card nos.
    unless you are on a verified secure connection
Personal Information

   Many websites ask for all sorts of personal
    information
   Do they really need it?
   Don't give them your main e-mail address
       create a webmail address just for site registrations
   Don't give any information they don't need
       just type in something
Passwords

   Most common way to authenticate you
   Use good passwords (next slide)
   Don't share passwords across sites
   Never give your password to another person
Good Passwords

   Hackers use software to check common
    passwords
       dont use "password" or "abc123" as your password
       a local site was hacked recently – its password was
        admin123
   Passwords should be a long as possibe
       at least 8 characters
   Use a mix of capitals, simples, numbers and
    symbols
       e.g. gR5h@@QT
How to Remember Passwords

   Think of a phrase – derive the password from it
    e.g. Strong passwords are safer
          s+rpW@saF3r
   Write it down in a safe place
       don't stick it on your computer
   Keep a copy in a safer place
Your Computer
Keep your Computer free of
Malware
   Make sure you run one antivirus software, and
    it is up to date
   Enable security settings on the computer
       should by done by corporate IT
   Beware of e-mail attachments
   Don't download videos, slides, etc. from
    unknown places
   Don't stick USB drives on your computer
       and don't stick your stick in unnecessary places
Vulnerabilities

   All computers and software have vulnerabilities
   Make sure your operating system (Windows)
    and all other software is up-to-date
       run windows update
       should be set by IT
   Disable features you don't use
   Don't download software
       who knows what they do
Sensitive Data

   What is on your computer?
   Should it be there?
       company data
       personal files
   Keep sensitive data where it should be
       on a server?
       encrypted?
   Don't send or receive sensitive data unless
    authorised
Backup

   What will happen if your hard disk crashes
    today
   or your computer is stolen?

   Make sure all your data is backed up
       IT should handle it
   Back up your home computer too
   Be careful of on-line backup services
You
Your Identity

   Your identity includes your name, e-mail,
    bank/credit card numbers, etc.
   Your identity can be stolen on-line
       your e-mail
       your credit card number
       your personal information
       your Facebook account
   Safeguard all of these (and more)
Your Reputation

   What you say and do
   What others say about you

   Guard what you say on the net (including e-mail
    and facebook)
       nothing is private
   You are not just you, but representing your
    company
   Difficult to control what others say about you
Your Company
Corporate Data and Reputation

   Your company has confidential information
       needs to be guarded
   What you say may be taken as coming from the
    company
       be careful what you say on the net
   Company should have an official net presence
       Facebook, too
   Others may post about your company
       respond appropriately
Social Engineering

   It's not necessary to hack a password by trying
    a million combinations
   Sometimes just asking will do it.
   People trust people – we try to help them
   If something is routine, then you don't think
    about it
       if a call or an e-mail seems legitimate, you act on it
Is Security Easy?

   No
       Security is a pain in the ...
   Tension Between Security and Other Values
       Ease of use
       Public Safety
But not having security is worse



   Your money, time, data, reputation etc. could
    be lost
What Should I Do?

   Follow security procedures
   Be vigilant
   Have a back-up plan
Questions?

   Gihan Dias
 gihan@uom.lk
   Do not install             strong passwords
    unnecessary software       sharing passwords
   Avoiding Email Traps    Don't open email attachments unless
                            you know for certain what it is
   update your operating   Be aware that actions have
    system and              consequences - ex: nude photos, bad
                            language, inappropriate conduct, etc. -
    applications (windows   could have legal impacts,
    update)                 embarrassment, or affect future job
                            opportunities
   backup
   The Internet is inescapable – both in your
    professional as well as your personal life. With
    our computers and phones, we are on the net
    at all times. But the net is dangerous. Whether
    you use e-mail, e-commerce, or even just a
    spreadsheet, you may not only be putting
    yourself in danger, but your whole company.
   In this presentation, Prof. Dias will explain
    some of the common ways you may be
    attacked when using Internet services, and how
    you can protect yourself against these attacks.
   spam                   sensitive data on your
   phishing                computer
   e-banking
                           loss of laptop / mobile
                            phone
   botnets                    address books
   keyloggers             gmail
   ssl certificates       vulnerabilities
       site identity      social engineering
       encryption
                           identity theft
   wireless
                           on-line postings

More Related Content

What's hot

CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 

What's hot (20)

CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 

Similar to The Net is Dangerous

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 

Similar to The Net is Dangerous (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Email
EmailEmail
Email
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

The Net is Dangerous

  • 1. The Net is Dangerous: How to Protect Yourself and Your Company Gihan Dias University of Moratuwa
  • 2. Why do we use the Internet?  To get Information  To provide information  To communicate with other people  To transact business, etc.
  • 3. What can happen to me on the Internet?  can get caught to a fraud  can be misled by falsehoods  can waste my time  can lose my money  can lose my reputation  can lose my identity  can be lured into dangerous situations
  • 4. If we don't use the Internet?  Must go to the library to find information  Should read the newspaper to get the cricket scores  Have to send postal letters  Need to visit your bank to check your balance  We are back in the 20th century
  • 5. So What do we Do?  We need to be careful  on the network  on the computer  what we do
  • 6. What we'll cover today  e-Mail  Web  Your Computer  You  Your company
  • 8. e-Mail Scams  Try to get you to do something by telling a story
  • 9. Get Your password Dear Webmail User Your mailbox has exceeded the limit of Quota Usage, which is as set by your manager, and access to your mailbox via our mail portal will be unavailable for sometime during this maintenance period. You will not be able to create new e-mail to send or receive again until you validate your mailbox. To re-validate your mailbox, you can CLICK HERE https://docs.google.com/spreadsheet/viewform? formkey=dDdaOHc1MnlPUEVpc2FkVNNfdewk4xcHc6MQ Thanks System Administrator.
  • 10. Send Malware to your computer Attn: Owner/Manager Here with the Better Business Bureau notifies you that we have received a complaint (ID 272854705) from one of your customers with respect to their dealership with you. Please open the COMPLAINT REPORT below to obtain more information on this matter and let us know of your point of view as soon as possible. We are looking forward to your prompt reply. Regards, Allyssa BONDS
  • 11. How to avoid e-Mail scams  Make sure your e-mail program has security features enabled  don't ignore warning messages  Be suspicious of attachments or links  attachments may contain malware  links may go to sites which contain malware, or try to get your password  Check who has sent the e-mail  even if you recognise the "From:" adress, it may have been sent by a virus
  • 12. How to avoid e-Mail scams (cont.)  Ignore any offers to give / make money  Be careful of people asking for money  Don't give any personal info to website, unless you know who it is and have typed the address on the browser  credit card / bank info  phone no., address, e-mail
  • 13. How to avoid e-Mail scams (cont.)  Check the spelling, grammar and language of the message – many scam mails are in poor English  Beware of messages which look just like message you get from Facebook, your bank, etc. - a scammer could have sent them  may find your family members on Facebook and send mail as them
  • 14. How to avoid e-Mail scams (cont.)  Your company should run a spam / malware filter  don't bypass it  Deletes most viruses  Can't delete all spam / scams  one man's spam is another man's ham  scammers are getting very sophisiticated
  • 15. Junk Folder  Today's e-mail programs are good at detecting viruses, spam, etc.  They usually move spam to a "Junk" folder  only problem, they may move good messages – usually from people not in your address book – to the junk folder  Check your junk folder occasionally
  • 16. Web
  • 17. Secure connections  A secure (https) connection 1. secures connection between your computer and a website so outsiders can't read what you type 2. confirms the identity of the site Indicated by a padlock or similar icon on your browser  Verify the owner of the website by clicking on the address bar  Don't type in passwords or credit card nos. unless you are on a verified secure connection
  • 18. Personal Information  Many websites ask for all sorts of personal information  Do they really need it?  Don't give them your main e-mail address  create a webmail address just for site registrations  Don't give any information they don't need  just type in something
  • 19. Passwords  Most common way to authenticate you  Use good passwords (next slide)  Don't share passwords across sites  Never give your password to another person
  • 20. Good Passwords  Hackers use software to check common passwords  dont use "password" or "abc123" as your password  a local site was hacked recently – its password was admin123  Passwords should be a long as possibe  at least 8 characters  Use a mix of capitals, simples, numbers and symbols  e.g. gR5h@@QT
  • 21. How to Remember Passwords  Think of a phrase – derive the password from it e.g. Strong passwords are safer s+rpW@saF3r  Write it down in a safe place  don't stick it on your computer  Keep a copy in a safer place
  • 23. Keep your Computer free of Malware  Make sure you run one antivirus software, and it is up to date  Enable security settings on the computer  should by done by corporate IT  Beware of e-mail attachments  Don't download videos, slides, etc. from unknown places  Don't stick USB drives on your computer  and don't stick your stick in unnecessary places
  • 24. Vulnerabilities  All computers and software have vulnerabilities  Make sure your operating system (Windows) and all other software is up-to-date  run windows update  should be set by IT  Disable features you don't use  Don't download software  who knows what they do
  • 25. Sensitive Data  What is on your computer?  Should it be there?  company data  personal files  Keep sensitive data where it should be  on a server?  encrypted?  Don't send or receive sensitive data unless authorised
  • 26. Backup  What will happen if your hard disk crashes today  or your computer is stolen?  Make sure all your data is backed up  IT should handle it  Back up your home computer too  Be careful of on-line backup services
  • 27. You
  • 28. Your Identity  Your identity includes your name, e-mail, bank/credit card numbers, etc.  Your identity can be stolen on-line  your e-mail  your credit card number  your personal information  your Facebook account  Safeguard all of these (and more)
  • 29. Your Reputation  What you say and do  What others say about you  Guard what you say on the net (including e-mail and facebook)  nothing is private  You are not just you, but representing your company  Difficult to control what others say about you
  • 31. Corporate Data and Reputation  Your company has confidential information  needs to be guarded  What you say may be taken as coming from the company  be careful what you say on the net  Company should have an official net presence  Facebook, too  Others may post about your company  respond appropriately
  • 32. Social Engineering  It's not necessary to hack a password by trying a million combinations  Sometimes just asking will do it.  People trust people – we try to help them  If something is routine, then you don't think about it  if a call or an e-mail seems legitimate, you act on it
  • 33. Is Security Easy?  No  Security is a pain in the ...  Tension Between Security and Other Values  Ease of use  Public Safety
  • 34. But not having security is worse  Your money, time, data, reputation etc. could be lost
  • 35. What Should I Do?  Follow security procedures  Be vigilant  Have a back-up plan
  • 36. Questions? Gihan Dias gihan@uom.lk
  • 37. Do not install  strong passwords unnecessary software  sharing passwords  Avoiding Email Traps Don't open email attachments unless you know for certain what it is  update your operating Be aware that actions have system and consequences - ex: nude photos, bad language, inappropriate conduct, etc. - applications (windows could have legal impacts, update) embarrassment, or affect future job opportunities  backup
  • 38. The Internet is inescapable – both in your professional as well as your personal life. With our computers and phones, we are on the net at all times. But the net is dangerous. Whether you use e-mail, e-commerce, or even just a spreadsheet, you may not only be putting yourself in danger, but your whole company.  In this presentation, Prof. Dias will explain some of the common ways you may be attacked when using Internet services, and how you can protect yourself against these attacks.
  • 39. spam  sensitive data on your  phishing computer  e-banking  loss of laptop / mobile phone  botnets  address books  keyloggers  gmail  ssl certificates  vulnerabilities  site identity  social engineering  encryption  identity theft  wireless  on-line postings