Presentation is loading. Please wait.

Presentation is loading. Please wait.

Luís Filipe Roque February 19th , 2019.

Similar presentations


Presentation on theme: "Luís Filipe Roque February 19th , 2019."— Presentation transcript:

1 Luís Filipe Roque February 19th , 2019

2 responsible for entire school group Teachers Trainer
@Luís Roque ICT Teacher ICT Coordinator responsible for entire school group Teachers Trainer 2

3

4 Concerns as Citizens 4

5 Concerns as Teachers 5

6 How to make a PC safe? A German security specialist presented its already famous "2 rules" of total security

7 The 2 rules of Herbert Rule number 1 Don´t buy a computer!

8 The 2 rules of Herbert Rule number 2 If you purchased a computer, do not turn it on!

9 What is CyberSpace? Norbert Wiener, an American mathematician, was the first, in 1948, to speak about Cyberspace.

10 technological equipment and digital networks, including the internet
What is CyberSpace? Complex environment, values and interests materializing an area of collective responsibility, which results from the interaction between people, information, information systems, technological equipment and digital networks, including the internet

11 What is CyberSecurity? Set of measures and actions of prevention, monitoring, detection, reaction, analysis and correction which aim to maintain the desired security state and guarantee the confidentiality, integrity and availability of information, digital networks and information systems in cyberspace

12 Dimensions of Safety Physical Security Logical Security Best Practices

13 Physical security How to protect equipment and information against users who do not have authorization to access them.

14 Logic Security A set of resources run to protect the system, data and programs against attempts by unknown people or programs.

15 I have nothing to hide Automatic access to websites (e.g. Bank
accounts ) Miscellaneous Documents Conversations with family and friends Photos Videos Lists of passwords 15

16

17 Main Types of CyberAttacks
Password Attacks Malware Phishing DDoS Drive-by Download Rogue Software Man in the middle Malvertis ing

18 Malware Malicious software is any part of software that has been written to cause damage to data, devices, or persons

19 Phishing Attacks usually carried out by e- mails apparently from trusted entities where people are invited to enter sensitive data

20 Passwords Attacks An attempt to obtain or decrypt a user’s password for ilegal use. Hackers can use cracking programs, dictionary attacks, and password sniffers in password attacks.

21 DDoS Distributed denial of services (DDoS) attacks are a subclasse of denial of services (DoS) attacks. A DDoS attack envolves multiple connected online devices, collectively know as a botnet, wich are used to overwhelm a target website with fake traffic.

22 Man in the middle Form of attack in which the data exchanged between two parties (e.g. you and your bank) are somehow intercepted, recorded and possibly altered by the attacker without the victims noticing

23 Drive-by download Occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security threat to worry about.

24 Malvertising Criminally-controlled adverts which intentionally infect people and businesses. These can be any ad on any site – often ones which you use as part of your everyday Internet usage.

25 Rogue Software Also called smitfraud or scareware, this type of software is defined as malware. It is designed specifically to damage or disrupt a computer system. In this case, not only is the software going to disrupt your system, it´s going to try and trick you into making a purchase using your credit card.

26

27 Do Backup The loss of personal information can cause even more problems than the loss of the device itself. So, make sure that all your important information is well stored in various places.

28 Stay up to date Make sure your device's operating systems and applications have up-to- date security updates. This prevents software with known vulnerabilities from being abused by cybercriminals.

29 Use Robust Passwords With 10 or more characters Character combination
Words with purposeful errors They do not derive from the name of the user or any close relative Not derived from personal information

30 Passwords Fails @2013, SplashData

31 Block intruders Regardless of the devices, make sure that your screen is protected with a strong and unique password or PIN code, or one of the biometric authentication methods available, such as fingerprint reader or facial recognition.

32 Reduce Digital Footprint
Consider becoming a digital minimalist for a while and leave most of your devices at home. In this way, not only will you have less equipment than you can afford to lose as you are giving less opportunities for personal information being stolen by cybercriminals.

33 Moderate in Social Networks
Resist the temptation to share on social networks, for example, that you and your family will be away from home in a certain period of time. Doing so may expose you to a physical intrusion of your home.

34 Browse incognito

35 Use a secure

36 Beware of Wi-Fi free zones
Carefully choose the network Disable file sharing and mark the Wi-Fi connection as a public network Never make updates or install applications using these networks Use two-factor authentication Make sure to log off after accessing any service you have accessed Forget the network after using it

37 Beware of card cloning Card cloning happens when all information about a particular card (your PIN - Personal Identification Number and its number) is copied

38 Beware of Card Payments
When making payments at establishments never lose sight of your card When entering the PIN code, be discreet and try to make sure no one is trying to watch you Avoid choosing a PIN code that is too obvious Do not provide data about your cards over the phone, even if the person asking you to identify yourself as an employee of your bank Avoid carrying out ATM operations in low-traffic areas Do not shop online in computers with access to public Wi-Fi networks and prefer sites with "https: //" in the URL

39 Be careful: leaving the e-mail open

40 Be Careful: Passwords saved in browsers

41 Be careful: Students knowing passwords

42 Be careful: Accessing Insecure Sites

43 Be Careful: Computer Maintenance Companies

44 In Summary +Caution -Risk +Safety -Privacy

45 Thank you


Download ppt "Luís Filipe Roque February 19th , 2019."

Similar presentations


Ads by Google