Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

COMMON PRACTICES AND

PREVENTIVE MEASURES
By Hemant Pugaliya
Phishing
Criminal and
fraudulent attempts
to acquire sensitive
information by
creating websites.
Generic greetings
Poor grammar and
spelling.
Emails that request
urgent action.
Misleading URLs.
Cyber Stalking
Using internet or other electronic
means to stalk or harass an
individual, a group of individuals,
or an organization.
Avoiding Cyber Stalking
Avoid sharing personal info in public
spaces.
Be cautious about meeting online
acquaintances in person.
Create a different email account for
registering on social networking sites.
Identity Theft
Using someone's identity (like
credit card number or email
account) for any illegal purpose.

Avoiding Identity Theft
Continually check the accuracy of personal accounts.
Avoid questionable websites.
Immediately delete messages you suspect to be spam.
Use public computers with extreme caution.
Use antivirus protection.
BlueSnarfing
Act of stealing
personal data,
specifically
calendar and
contact information,
from a Bluetooth
enabled device.

Keep sensitive data off of
Bluetooth - enabled devices in
the first place.
Updating your devices
regularly.
Switch off the Bluetooth when
not in use.
Dont pair with unknown
devices.
MOBILE
SECURITY
By Anant K.
How to stay protected?
Keep a clean machine.
Best to have all current updates.
Protect all devices connected to the
internet.
Protect your personal
info
Use a strong passcode.
Think before installing apps.
Disable geotagging.
Connect with care
Beware of free Wi-Fi
Protect your banking credentials
Dont respond to unknown requests for
personal information.
STOP. THINK. CONNECT.
Be a good online citizen.
Practicing good online habits benefits the
global digital community.
BOTNETS
By Arpan Kapoor
What is a botnet?
Network of compromised computers being
controlled remotely as a group.

eg. Conficker, Zeus, Waledac, Mariposa,
etc.
History of botnets
Bots originally used to automate tasks.
o web crawlers used by search engines, IRC, etc

Evolved into automating malicious attacks.
o started around 2000 with DDoS attacks against
servers.
Some disturbing statistics
88% of all spam is sent from botnets.
50% of the Fortune 1000 organisations were
compromised by the data stealing botnet, Mariposa.
Operation of Botnets
1. Infect victim with malware using
a. Drive-by downloads
b. Email attachments & Social Engineering
2. Control the nodes through C&C server
Uses
DDoS attacks
Use of stolen
resources
Rental to other
spammers
Defences
Keep your antivirus and system software
upto date.

Be careful while opening attachments
and links in email and social networking
sites.

You might also like