ASHISH KUMAR ANKAN MOOKHERJEE SHRAVYA NARAYAN SARMA.

Slides:



Advertisements
Similar presentations
CMU has been said to be the “most wired campus in the US” for two years in a row. What kind of impact does such a infrastructure has on the daily academic.
Advertisements

Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Ethical Hacking by Shivam.
Password Management Strategies for Online Accounts Gaw & Felten Optional Reading.
E-Commerce Strategy By Callum Kirkman.
Privacy in a Public World ISACA North Alabama Chapter March 11, 2008.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
Kavya and Aatna 8cc. A brief on Web2.0 Web2.0 is the second generation of the World wide web, created by the successful Tim O’reilly. It includes developed.
ESCCO Data Security Training David Dixon September 2014.
Making your website work for your company Andrew Talbot
Staying Safe Online Keep your Information Secure.
DIGIT Directorate-General for Informatics DIGIT Directorate-General for Informatics EUSURVEY Creating online surveys DIGIT EUSURVEY SUPPORT.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Reliability & Desirability of Data
APPA Business & Financial Conference 2006 September 18, 2015 Business Intelligence Solutions for the Workplace Enhancing Analytical Reporting Presented.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online communities 2. Starter: Signing up to an online account: When signing up to a new account you sometimes have to fill in one of these: This is called.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Banking & Retail in the Digital Age Hiba Fayad Al-Iktissad #DGTLU.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
CHAPTER 6 Concept of Virtual Store for Marketing Products and Services.
Group 5 Julian Cheung Duncan Wu Flanda Vuong Aximon Zhao.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
David Wigley HCC Security Architect Security Trends for 2016.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
PART II Chapter 2 Needs Assessment. MASLOW b Physiological Needs b Safety Needs b Social Needs b Esteem Needs b Self-actualization Needs.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Statistics Terminology. What is statistics? The science of conducting studies to collect, organize, summarize, analyze, and draw conclusions from data.
All about Hotmail & its Relevance for Users.

Welcome.
Globalization and Information Technology
Hotspot Shield Protect Your Online Identity
Biometric Security Technology Acceptance Study
Shift Happens 2016.
Understanding The Computer Login Account
E-Safety Briefing
Information Security.
Payment Instruments, Financial Privacy and Online Purchases
Password Management Limit login attempts Encrypt your passwords
Types of Websites.
Biometrics : Password Replacement for Elderly
Population & Settlement
Factors influencing customer behavior
Social Media Cybersafety.
ONLINE BANKING ON YOUR PHONE
Qualitative vs. Quantitative Research
The introduction and the essential elements of E- Commerce.
Top Emerging E-commerce Magento trends. The progress of E-commerce industry is changing year by year, this evolution has made super easy for the online.
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Hype or The Real Deal? Eric Leiserson
Electronic Transactions
Cybercrime and Canadian Businesses
Business and Management Research
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Procedure for adding a Trusted Site
ICT Market Follow up in Morocco Market Observatory/ANRT MOROCCO
Information Technology Services Education and Awareness Team
Survey Design.
Company Name | Phone Number | Website | Address
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Presentation transcript:

ASHISH KUMAR ANKAN MOOKHERJEE SHRAVYA NARAYAN SARMA

 Survey Deals with Finding statistical data for vulnerability and security of account on the internet.  These accounts can be banking, social media, amazon PayPal or accounts.  It also attempts to find the prevalent practices.  It also tries to find out intrinsic reasoning behind such practices and some real insights which would allow us to make our accounts more secure.

 The Survey Responses were anonymously saved  Encourages users to give unbiased information  Makes the response set a REPRESENTATIVE SAMPLE  Questions chosen were based on online transaction security.

 We created a survey of questionnaire. It consisted of 17 questions.  A total of 112 responses were generated.  84 of them were male and the remaining 28 of them were female.  Male to Female ratio was 3:1.  Women in the age group of 18 to 25 were found to be aware of online transactions.

 Based on Age, Gender.  Occupation.  Hacked/Not Hacked.  Male/Female Hacking Ratio.  Category of people affected(Student/working in the IT/Non-IT sector).  Services affected because of hacking i.e. social networking,banking,online shopping and .

 Is gender a factor ?  Is age a factor ?  Is occupation a factor ?  Do people trust storing sensitive information on browsers or merchant web site ?  Do people perform online transaction over unsecured network (given a choice) ?

 General Trend with regards to updating of passwords and keeping same set of passwords across different account.  Hacking does not happen randomly but chances are more if you are not cautious.

 Most of the users turned out to be pretty tech-savvy.  They contributed for the betterment of the network.  The reason why we started this survey was to analyze user habits and the result we gained can be utilized in the improvement of online transactions.

 Clip Board  MS Excel – Filtering option used for analyzing data  Online graph generating tool  Weka

 [1] S. Talib, N.L.Clarke and S.M.Furnell, "An Analysis of Information Security Awareness within Home and Workplace Environments," in ARES‟10 International Conference on Availability, Reliability and Security, vol. 2010, pp , 2010.