Created by:- Sailesh Mathur School:- k.v.5 Jaipur

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Quiz Review.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Topic 5: Basic Security.
What is Spam? d min.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Security Risks Todays Lesson Security Risks Security Precautions
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Securing Information Systems
What they are and how to protect against them
Done by… Hanoof Al-Khaldi Information Assurance
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Network security threats
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
The Internet: Encryption & Public Keys
What is Phishing? Pronounced “Fishing”
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Week 7 - Wednesday CS363.
Introduction-Cyber Safety
Cybersecurity Simplified: Phishing
Presentation transcript:

Created by:- Sailesh Mathur School:- k.v.5 Jaipur Informatics Practices online access and Computer security class :- Xi Chapter no. :- 18 Created by:- Sailesh Mathur School:- k.v.5 Jaipur

introduction We live in a world at a time which is often called Information Age. Internet has revolutionized the world and people are getting used to having access to whatever information they want anytime, anywhere. Unfortunately, this also has resulted in increased security concerns. This chapter talks about the threats that are associated with online access and the measures to prevent and counter them.

Threats to cyber security Malware: Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious .

computer virus: It is a small piece of software that can spread from one infected computer to another. It can corrupt, steal, or delete data on your computer/hard drive. Trojan horse: can do anything from record your passwords by logging keystrokes (known as a keylogger) to hijacking your webcam to watch and record your every move.

Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Spam: unwanted messages in your email inbox. Phishing:Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website.

spyware: spyware is used to spy on their victims. An e. g spyware: spyware is used to spy on their victims. An e.g. is keylogger software that records a victim’s every keystroke on his or her keyboard. Adware : unwanted ads shown while surfing internet.

Eavesdropping : is the act of intercepting communications between two points.

Solutions to computer security threats How to prevent/remove Adware/malware Uninstall the malicious programs from Windows Use antivirus program for malware and unwanted programs Reset the browser settings to their original defaults Scan for malicious programs antivirus/antimalware program

How to prevent/remove virus Beware of Fake Download Buttons Use a Secure Browser Avoid Public Torrent Sites Don’t Open Email Attachments Forwarded to You Don’t Use Your PC’s Admin Account Scan All New Files and Disk

How to prevent/remove Trojan Never open unsolicited emails from unknown senders Avoid downloading and installing programs unless you fully trust publisher Use firewall software Use a fully updated antivirus program

Secure Connections A secure connection refers to the connection which is encrypted by one or more security protocols for security of data flowing between two or more nodes. When it is not encrypted, it can be easily listened by anyone with the knowledge on how to do it.

Secure Sockets Layer (SSL) is a computer networking protocol used for insecure network, between network application clients and servers .Due to various flaws, SSL was deprecated for use on the internet by the Internet Engineering Task Force (IETF) in 2015 by the Transport Layer Security (TLS) protocol. Both are not interoperable, TLS is backwards-compatible with SSL 3.0

Transport Layer Security (TLS) encrypts data moving over the network or Internet to ensure that any body(hacker/eavesdropper) will not be able to see what is transmitting. It is useful for private and sensitive information such as passwords, credit card numbers, and personal correspondence.

How tls works TLS uses a combination of symmetric and asymmetric cryptography both for better security . With symmetric cryptography, data is encrypted and decrypted with a secret key known to both sender and recipient; typically 128 but preferably 256 bits in length (anything less than 80 bits is now considered insecure). Symmetric cryptography uses a common secret key ,which is shared a secure manner. Asymmetric cryptography uses 2 keys – a public key, and a private key. The public key of the recipient to be used by the sender to encrypt the data they wish to send to them, but that data can only be decrypted with the private key of the recipient.

Secure Connections Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website server. HTTPS pages typically use one of two secure protocols to encrypt communications - SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

Eavesdropping eavesdropping in a man in middle attack and the message is passing from the client to server. The solutions to this problem are: to encrypt the message to encrypt the channel Both are appropriate in different situations. To prevent Eavesdropping in any kind of communication channel can be achieved by usage of "Secure Tunneling" of your channel data.

Phishing Phishing are fraudulent attempts by cybercriminals to obtain private information. For e.g.a message prompt your personal information by pretending that bank/mail service provider is updating its website. There are various phishing techniques used by attackers: o Embedding a link in an email to redirect to an unsecure website that requests sensitive information o Installing a Trojan via a malicious email attachment o Spoofing the sender’s address in an email to appear as a reputable source and request sensitive information o Attempting to obtain information over the phone by impersonating a known company vendor.

Few steps to protect against phishing Deploy a SPAM filter, Keep all systems current with the latest security patches and updates, Install an antivirus solution, Develop a security policy, Deploy a web filter to block malicious websites, Encrypt all sensitive information

Identity verification methods Knowledge-Based Authentication (KBA)-by asking them to answer specific security questions. Two Factor Authentication (2FA)-not only a password and username, but also something that the user has with them. Database Solutions-behavioral patterns to detect if an online ID is authentic, a fraudster or a bot. Online Identity Verification-A mix of artificial intelligence, computer vision, and verification experts to determine if a government-issued ID is authentic and belongs to the user. Biometric verification -by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.

Firewall-an important solution for computer security An Internet Firewall is a device or a software that is designed to protect your computer from data and viruses that you do not want. A firewall is so called because of the real firewalls used to secure buildings.

software firewall A software firewall is a special type of software running on a computer. It protects your computer from outside attempts to control or gain access.

Hardware Firewall It is a physical piece of equipment designed to perform firewall duties. A hardware firewall may actually be another computer or dedicated piece of equipment which serves as a firewall.

Thanks for watching the slide and always remember “be safe online”