CyberSecurityPPT V3 1
CyberSecurityPPT V3 1
CyberSecurityPPT V3 1
Awarenes
s
Presentatio
n Contents 01 Introduction Cyber Security
02 Causes of concern
05 News
Cyber Security
Salient Differences
1) Computer Virus:
• Needs a host file
Internet • Copies itself
• Executable
2) Network Worm:
• No host (self-contained)
• Copies itself
• Executable
3) Trojan Horse:
• No host (self-contained)
Hackers & Governments • Does not copy itself
Internet Service
• Imposter Program
Providers
Snoopers
• Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as UID, credit card numbers, login IDs or
passwords. It is a kind of social engineering attack where a person steals the sensitive information of user in a fraud
manner by disguising as a legitimate person.
• Spoofing is a kind of computer virus attack where a person steals the details of important a legitimate user and acts as
another user. It is a kind of identity theft. Cyber criminals use spoofing to fool victims into giving up sensitive
information or money or downloading malware
• Ransomware is a new type of malware that encrypts documents, pictures and other files, making them unreadable.
The attacker then holds the decryption key for ransom until you agree to pay money, usually through an untraceable method
such as Bitcoin or other digital currency.
Do:
• Always verify the sender of a message.
• Always hover over web page links (URLs) in email messages to see where they link to – beware URL
shortening services (like bit.ly) that may obscure the final web site destination.
• Be skeptical of messages with odd spelling/grammar, improper logos or that ask you to upgrade or verify your
account.
• Report suspicious emails to [email protected] or NIC
• Take backups of important files to avoid ransomware
Don’t:
• Open an attachment from an unknown sender. Consider the source and whether or not the file was
expected.
• Click on a link from an unknown sender.
Social engineering manipulates people into performing actions or divulging confidential information. Similar
to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit
fraud, or access computer systems.
Email:
Phone Call: ABC Bank has
This is John, noticed a
the System problem with I have come
Admin. What In Person:
What ethnicity
your account… to repair
is your your
password? are you? Your
and have machine…
mother’s
maiden name? some
software
patches
Mobile Device Security
• Keep your device software up to date – unpatched software leaves your device vulnerable to attack. Install
operating system updates as well as updates to applications.
• Have anti-virus and/or anti-malware software installed, enabled and set to automatically update.
• Never leave your laptop or mobile device unattended. Thefts do happen.
• Encrypt laptops and external media that contains restricted or sensitive data.
• Make sure you backup your data frequently in case your device is ever lost or stolen.
• Ensure access to your mobile device is protected with a passcode and use built-in encryption settings to
ensure
that your data is safe if your device is ever lost or stolen.
• Consider using a remote tracking/wipe function if supported. For iOS devices, iCloud provides the “Find my
iPhone” service for free. Android and other mobile operating systems also have similar functionality.
News…!!!
THANK
YOU…!!!