Download presentation
Presentation is loading. Please wait.
1
Luís Filipe Roque February 19th , 2019
2
responsible for entire school group Teachers Trainer
@Luís Roque ICT Teacher ICT Coordinator responsible for entire school group Teachers Trainer 2
4
Concerns as Citizens 4
5
Concerns as Teachers 5
6
How to make a PC safe? A German security specialist presented its already famous "2 rules" of total security
7
The 2 rules of Herbert Rule number 1 Don´t buy a computer!
8
The 2 rules of Herbert Rule number 2 If you purchased a computer, do not turn it on!
9
What is CyberSpace? Norbert Wiener, an American mathematician, was the first, in 1948, to speak about Cyberspace.
10
technological equipment and digital networks, including the internet
What is CyberSpace? Complex environment, values and interests materializing an area of collective responsibility, which results from the interaction between people, information, information systems, technological equipment and digital networks, including the internet
11
What is CyberSecurity? Set of measures and actions of prevention, monitoring, detection, reaction, analysis and correction which aim to maintain the desired security state and guarantee the confidentiality, integrity and availability of information, digital networks and information systems in cyberspace
12
Dimensions of Safety Physical Security Logical Security Best Practices
13
Physical security How to protect equipment and information against users who do not have authorization to access them.
14
Logic Security A set of resources run to protect the system, data and programs against attempts by unknown people or programs.
15
I have nothing to hide Automatic access to websites (e.g. Bank
accounts ) Miscellaneous Documents Conversations with family and friends Photos Videos Lists of passwords … 15
17
Main Types of CyberAttacks
Password Attacks Malware Phishing DDoS Drive-by Download Rogue Software Man in the middle Malvertis ing
18
Malware Malicious software is any part of software that has been written to cause damage to data, devices, or persons
19
Phishing Attacks usually carried out by e- mails apparently from trusted entities where people are invited to enter sensitive data
20
Passwords Attacks An attempt to obtain or decrypt a user’s password for ilegal use. Hackers can use cracking programs, dictionary attacks, and password sniffers in password attacks.
21
DDoS Distributed denial of services (DDoS) attacks are a subclasse of denial of services (DoS) attacks. A DDoS attack envolves multiple connected online devices, collectively know as a botnet, wich are used to overwhelm a target website with fake traffic.
22
Man in the middle Form of attack in which the data exchanged between two parties (e.g. you and your bank) are somehow intercepted, recorded and possibly altered by the attacker without the victims noticing
23
Drive-by download Occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security threat to worry about.
24
Malvertising Criminally-controlled adverts which intentionally infect people and businesses. These can be any ad on any site – often ones which you use as part of your everyday Internet usage.
25
Rogue Software Also called smitfraud or scareware, this type of software is defined as malware. It is designed specifically to damage or disrupt a computer system. In this case, not only is the software going to disrupt your system, it´s going to try and trick you into making a purchase using your credit card.
27
Do Backup The loss of personal information can cause even more problems than the loss of the device itself. So, make sure that all your important information is well stored in various places.
28
Stay up to date Make sure your device's operating systems and applications have up-to- date security updates. This prevents software with known vulnerabilities from being abused by cybercriminals.
29
Use Robust Passwords With 10 or more characters Character combination
Words with purposeful errors They do not derive from the name of the user or any close relative Not derived from personal information
30
Passwords Fails @2013, SplashData
31
Block intruders Regardless of the devices, make sure that your screen is protected with a strong and unique password or PIN code, or one of the biometric authentication methods available, such as fingerprint reader or facial recognition.
32
Reduce Digital Footprint
Consider becoming a digital minimalist for a while and leave most of your devices at home. In this way, not only will you have less equipment than you can afford to lose as you are giving less opportunities for personal information being stolen by cybercriminals.
33
Moderate in Social Networks
Resist the temptation to share on social networks, for example, that you and your family will be away from home in a certain period of time. Doing so may expose you to a physical intrusion of your home.
34
Browse incognito
35
Use a secure
36
Beware of Wi-Fi free zones
Carefully choose the network Disable file sharing and mark the Wi-Fi connection as a public network Never make updates or install applications using these networks Use two-factor authentication Make sure to log off after accessing any service you have accessed Forget the network after using it
37
Beware of card cloning Card cloning happens when all information about a particular card (your PIN - Personal Identification Number and its number) is copied
38
Beware of Card Payments
When making payments at establishments never lose sight of your card When entering the PIN code, be discreet and try to make sure no one is trying to watch you Avoid choosing a PIN code that is too obvious Do not provide data about your cards over the phone, even if the person asking you to identify yourself as an employee of your bank Avoid carrying out ATM operations in low-traffic areas Do not shop online in computers with access to public Wi-Fi networks and prefer sites with "https: //" in the URL
39
Be careful: leaving the e-mail open
40
Be Careful: Passwords saved in browsers
41
Be careful: Students knowing passwords
42
Be careful: Accessing Insecure Sites
43
Be Careful: Computer Maintenance Companies
44
In Summary +Caution -Risk +Safety -Privacy
45
Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.