Hacking Phishing Passwords Sourendu Gupta (TIFR).

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Security Awareness Presenter: Royce Wilkerson.
Information Security Awareness:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Checking Account Debit Card Safety Tips card-safety-10-tips.htm October.
10 Essential Security Measures PA Turnpike Commission.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Top 100 security tips. Topics Social Engineering Social Media Physical computer security Password security Smartphones Encryption Anti Virus Public computers.
Information Security Awareness Program. Agenda  What is Information Security?  Why is Information Security important?  Education Data Breach  Appropriate.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Fraud Protection.
Fraud protection.
Common Methods Used to Commit Computer Crimes
Protecting What’s Yours: Your Identity
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Top Ten Cyber Security Hygiene Tips
Security Hardening through Awareness August 2018
Presentation transcript:

Hacking Phishing Passwords Sourendu Gupta (TIFR)

Computer security: why? Hackers with access to your account will break laws and the consequences will be yours. Break-ins first result in machines being infected and sending millions/billions of messages: closing down the network and causing our system to be black listed. Intruders may destroy data: scientific, pay roll... Hackers may launch attacks from your machine on more sensitive installations: banks, defence

What can you do about hacking? System administrators all over TIFR are required to safeguard you from hacking....but only if you take commonsense precautions: inspect login messages to see your last login date and time, close sessions and log out if you don't plan to use a session again very soon If you administer your own machine, such as a laptop, ask a system administrator for tips. Be aware of social hacking tricks like phishing

Varieties of social hacking Social hacking=confidence tricking to get sensitive information (passwords, PINs,...) Identify sensitive information and refuse to give it without checking back face to face or over a channel known to you independently. Refuse free goodies unless trusted sources have used it for some time: downloads from the net, used memory sticks Most emergencies are concocted. Check back.

What can you do? Your passwords are secret. Do not give them away. Legitimate users and system administrators never ask for your password. Choose strong passwords: explained next Choose a different password for every application. How do you remember so many passwords? Answer coming up in 2 slides Log out of every application when you leave a public terminal

What can you do? Your passwords are secret. Do not give them away. Legitimate users and system administrators never ask for your password. Choose strong passwords: explained next Choose a different password for every application. How do you remember so many passwords? Answer coming up in 2 slides Log out of every application when you leave a public terminal

What is a strong password? Not silly ones like tifr123 or abcd1234. Don't try to be clever and use the password “password”. Never use personal information: that can always be found out. Use random combinations of any character that you have on the keyboard: gH5(?/qP You can use dictionary words, but intersperse them with some odd characters: cA-nuS3e or ;y5OuCa.n

How do you remember passwords? High tech solution: your browser can remember passwords for you. Then lock the set using a single strong password High tech solution: use ssh keyrings to store the passwords that you need often. Encrypt this using a single strong password Low tech solution: use the same security that you use for your money; keep them in your wallet or lock it up in a drawer. But encrypt them before writing them down.

Main points to remember You are liable for crimes committed in your name: so protect your identity from theft. In cyberspace protect your passwords. They must be secret, strong and all different. System administrators never ask for your password. Be suspicious of all attempts to get personal information by or phone. Check back with legitimate persons immediately.