We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
DARKNET.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Dark net . . Invisible Web . . Hidden Web . .
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
Cracking down on international cyberterrorism
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Customer Websites and Web Applications Web Application Security.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CCT355H5 F Presentation: Phishing November Jennifer Li.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Hurdles in implementation of cyber security in India.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Is the Dark Web Legit? Robert W. Gehl University of Utah
Computer Security Keeping you and your computer safe in the digital world.
Anonymous Proxy server - Exactly what is An Anonymous Proxy server? Being a computer system geek and also energetic in the IT area for 20 plus years I.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Nation State Actors Lex Dunlap.
Social Engineering Dr. X.
SECURITY STANDARDS AND CYBER LAWS
Common Methods Used to Commit Computer Crimes
CYBER SECURITY...
The Onion Router Hao-Lun Hsu
The Hidden face of the Darknet
Dark Web – the modern threat for the Internet Security
Cyber Security Awareness Workshop
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Working to Keep our Children Safe in a World Filled with Technology
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Exercise ?: TOR.
Dark Web, I2P, and Deep Web Team 5
Social Engineering No class today! Dr. X.
Introduction to Computers
الانترنت والبريد الإلكتروني
The vulnerability of the modern society
Social Issues in Computing
Kharavets Dmitriy, group №641301
Social Issues in Computing
The dark web By Riley. Sampare.
Sunday Morning 12th August, 2018
Information Technology Services Education and Awareness Team
The Internet: Encryption & Public Keys
Security in mobile technologies
How does the deep web work?
Dark Web Domain Status Report
Crime Behind The Keyboard(Dark Web)
Presentation transcript:

We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY Creators of THE JOY OF GIVING; RIGHT every WRONG and KARMAVEER movements. We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY to rekindle the spirit of our constitution that was adopted on this day in 1949

I cannot TEACH anyone anything, I can only make you THINK!!!

Protection of Critical Infrastructure from CYBER ATTACKS!

Are we truly PLANNING to be PREPARED???

Clear & Current Danger!

Two Noteworthy Critical Infrastructure Attacks of 2014 According to security firm CrowdStrike, a Russian hacker group called “Energetic Bear” caused significant disruption for companies in the United States in the energy sector

At the end of 2014, an attack launched against a steel plant in Germany resulted in physical damage, according to a report by the Germany’s Federal Office for Information Security. The attackers had apparently first compromised the steel mill’s office network by using spear-phishing emails and clever social engineering.

The Deep Web The deep web, deep net, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. Deep web counters the surface web. Computer scientist Mike Bergman coined the term in 2000. The term "deep web" is often conflated with its subset dark web which refers to the content that is purposefully obscured from the public internet.

The Dark Web eTerrorism There are at least some real and fraudulent websites claiming to be used by ISIL, including a fake one seized in Operation Onymous. In the wake of the November 2015 Paris attacks an actual such site was hacked by an Anonymous affiliated hacker group GhostSec and replaced with an advert for Prozac

Operation Onymous Operation Onymous was an international law enforcement operation targeting darknet markets and other hidden services operating on the Tor network.

Tor Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.