Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
You are responsible for security of your internet banking transactions ONLINE.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Identity: What to Know, What to Do.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Hacking Phishing Passwords Sourendu Gupta (TIFR).
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity theft: Real or Virtual? By: Alex Metzler.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft: Protect Yourself Ronald J. Leach.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Learn how to protect yourself against common attacks
Protecting What’s Yours: Your Identity
I S P S loss Prevention.
Security Hardening through Awareness August 2018
Presentation transcript:

Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15

Computer security: why? Secure your computer, accounts, and the data Hackers break laws: consequences will be yours Infected machines send millions/billions of messages closing down the network, our servers get black listed. Intruders may destroy data: scientific, pay roll... Hackers may launch attacks from your machine on more sensitive installations: banks, defence

Protect your PC / data : To-dos Use security software Windows defender / TIFR licensed antivirus Always login as normal user (not admin) Leave admin job to sysadmin if you are novice Use updated software Back up important documents / files regularly Check URL & think before you click a link. No unwanted / copyrighted downloads

What can you do about hacking? Always check the URL for correctness. inspect login messages check last login date / time, close sessions and log out Ask a system administrator for security tips to administer your own machine / laptop Be aware of social hacking tricks like phishing NEVER share your password / credentials

Varieties of social hacking Social hacking=confidence tricking to get sensitive information (passwords, ATM PINs...) Identify sensitive information and refuse to give it. Got any seemingly genuine mail (phishing) / phone ? Check back, Don’t be in a hurry to respond. Refuse freebies : million $ or £ to be credited to your account, IT refund …

What can you do? Are you at the right URL before keying in ? Your passwords are secret. Do not give them away. Legitimate users and system administrators never ask for your password Choose strong passwords Choose a different password for every application. How do you remember so many? Log out of every application when you leave a public terminal

What is a strong password? Not easy ones-”tifr123” “abcd1234” “password” Never use personal information: that can always be found out. Use random combinations of any character that you have on the keyboard: Lcase + Ucase + Nos + spl chars at least 8. or cA-nuS3e or Sy5OuCa.n

How do you remember passwords? High tech solution: your browser can remember passwords for you. Then lock the set using a single strong password Low tech solution: use the same security that you use for your money; keep in your wallet or lock it up in a drawer. But encrypt them before writing them down. Tokenize: GenToken+Specifickeyword: e.g. Gu_e$tWb, Gu_e$tMl, Gu_e$tIci, Gu_e$tcBi

Main points to remember You are liable for crimes committed in your name: so protect your identity from theft. In cyberspace protect your passwords. They must be secret, strong and all different. System administrators never ask for your password Be suspicious of all attempts to get personal information by or phone. Check back Always check the URL before you click Helpline for IT Security : 2121 /