Security of Personal Information

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

Security of Personal

Information
Lecture 9
Threats to Personal Security
Threats to personal security encompass various risks and dangers that can compromise an
individual's privacy, data, and overall safety in the digital world. Common threats to personal
security are:

1. Phishing Attacks
2. Malware
3. Identity Theft
4. Password Attacks
5. Public Wi-Fi Risks
6. Social Engineering
7. Lack of Software Updates
8. Fake Apps and Software
9. Scams
10. Physical Theft of Devices
1. Phishing Attacks:
Phishing is a social engineering technique where attackers masquerade as trustworthy entities
through emails, messages, or websites. They aim to trick users into revealing sensitive
information like login credentials, credit card numbers, or personal details.
Example of Phishing URL:

-https://faccbook.com/profile.jar/
-https://facebo0k.com/profile.jar/
-https://faecbook.com/profile.jar/
-https://mail.googlc.com/mail/u/0/
-https://mail.google.com.diu.edu.bd/mail/u/0/
-https://youtube.gov.bd/
Example: Gmail Phishing
Preventive Measures of Phishing Attack
1. Educate yourself about phishing techniques and common scams.

2. Be cautious with emails, especially from unknown sources.

3. Verify the sender's email address and be wary of suspicious messages.

4. Avoid clicking on links directly from emails; hover over them to check the URL.

5. Use Multi-Factor Authentication (MFA) whenever possible.

6. Use a reputable antivirus and anti-malware program.

7. Be cautious about the information you share on social media.

8. Report suspected phishing attempts to the appropriate authorities.


2. Malware
Malware is a short term for "malicious software." It refers to any type of software specifically
designed to harm, exploit, or gain unauthorized access to computer systems, networks, or
devices. Malware can take various forms, such as viruses, worms, Trojans, ransomware,
spyware, adware, and more. Its primary purpose is to cause damage, steal sensitive information,
disrupt operations, or perform other harmful actions without the user's knowledge or consent.
There are several common ways that malware can attack computer systems and networks.
Those are Infected Downloads, USB and Removable Media, Email Attachments, File
Sharing and Peer-to-Peer Networks, Torrent and Crack Software.
Preventive Measures Of Malware Attack
1. Use reputable antivirus and anti-malware software.

2. Keep all software and operating systems updated.

3. Be cautious with email attachments and links from unknown sources.

4. Download software and apps only from trusted sources.

5. Secure your network with a strong password and encryption.

6. Regularly back up your important data.

7. Use strong, unique passwords for all accounts.

8. Educate yourself about social engineering tactics.


3. Identity Theft
Identity theft is a type of crime in which an individual's personal information is stolen and used
by someone else for fraudulent purposes. The stolen information may include the person's
name, address, Social Security number, date of birth, credit card details, bank account numbers,
and other sensitive data. The identity thief uses this stolen information to impersonate the
victim, essentially assuming their identity to conduct various illicit activities.
Preventive Measures Of Identity Theft
1. Secure personal information and documents.

2. Use strong passwords and enable MFA.

3. Beware of phishing attempts and unsolicited requests.

4. Avoid public Wi-Fi for sensitive activities.

5. Monitor financial accounts regularly.

6. Shred documents with personal information.

7. Be cautious with personal data online.

8. Consider freezing credit reports.

9. Limit sharing of personal information.


4. Password Attacks
Attackers use various methods to obtain passwords, such as brute force (trying all possible
combinations), dictionary attacks (trying common words), or leveraging stolen passwords from
data breaches. Example of easy passwords are

- 12345
- Password
- YourBirthday
- YourName123
- YourMobileNumber
- StudentIdNumber
- PetName
- BestFriendName
- FamillyMembersName
- RelagiousKeywords
Preventive Measures Of Password Attacks
1. Use strong password

least 12 characters long

!, @, #, $, %, etc.). mixing different types of characters

Avoid personal information . e.g., Name, Birthday

Avoid common patterns. e.g., 123456 or abcdefg

2. Use password manager

3. Regularly change passwords


5. Public Wi-Fi Risks
Unsecured public Wi-Fi networks expose users to potential data interception and man-in-the-
middle attacks, where attackers intercept communication between two parties.
Preventive Measures Of Public Wi-Fi Risks
1. Use secure and encrypted connections (HTTPS) whenever possible

2. Avoid connecting to unsecured or public Wi-Fi networks

3. Verify the authenticity of websites and digital certificates

4. Use VPN (Virtual Private Network) for added security

5. Be cautious of unexpected or unusual website behavior


6. Social Engineering
Attackers manipulate individuals into divulging sensitive information or performing actions that
compromise security, often through psychological manipulation.
Preventive Measures Of Public Wi-Fi Risks
1. Be cautious with sharing personal information online and offline

2. Verify the identity of people requesting sensitive data or access

3. Be wary of unsolicited emails, calls, or messages asking for personal information

4. Educate yourself and others about common social engineering tactics

5. Use strong passwords and enable multi-factor authentication (MFA)

6. Limit the information shared on social media platforms


7. Lack of Software Updates
Failing to update software and operating systems can leave devices vulnerable to known
exploits and security risks. Updating software can privent.
8. Fake Apps and Software
Downloading applications or software from unofficial sources can result in installing malware or
compromised software on devices.
9. Scams
Scammers use various schemes, like fake online stores, lottery scams, and charity fraud, to
deceive individuals into providing money or personal information.
10. Physical Theft of Devices
Theft of laptops, smartphones, or other devices can lead to unauthorized access to personal data.
Questions
Thanks!

You might also like