The document discusses cyber security and provides information on protecting networks, computers, smartphones, and social media from cyber threats. It outlines common cyber threats like malware, hacking, and phishing. It recommends security measures like firewalls, antivirus software, strong passwords, and digital hygiene. The document also discusses responding to cyber incidents, the importance of cyber forensics, and taking responsibility as social media users to avoid becoming targets of cyber crimes.
The document discusses cyber security and provides information on protecting networks, computers, smartphones, and social media from cyber threats. It outlines common cyber threats like malware, hacking, and phishing. It recommends security measures like firewalls, antivirus software, strong passwords, and digital hygiene. The document also discusses responding to cyber incidents, the importance of cyber forensics, and taking responsibility as social media users to avoid becoming targets of cyber crimes.
The document discusses cyber security and provides information on protecting networks, computers, smartphones, and social media from cyber threats. It outlines common cyber threats like malware, hacking, and phishing. It recommends security measures like firewalls, antivirus software, strong passwords, and digital hygiene. The document also discusses responding to cyber incidents, the importance of cyber forensics, and taking responsibility as social media users to avoid becoming targets of cyber crimes.
BY- S N JHA 2IC (PROV/IT) CYBER SECURITY CYBER SECURITY?
A DEFENSIVE SOLUTION TO PROTECT ANY INTERNET-
CONNECTED SYSTEM FROM CYBER THREATS AND ATTACKS. PROTECTION OF COMPUTER SYSTEMS THEFT OF OR DAMAGE TO THEIR HARDWARE, SOFTWARE, OR ELECTRONIC DATA, DISRUPTION OF SERVICES ENCOMPASSES A SYSTEM OF HARDWARE & SOFTWARE USER AWARENESS SCOPE CONCEPT OF NETWORK/INTERNET IMPORTANCE/BENEFITS OF CYBER SECURITY THREATS WHY CYBER CRIME? MEASURES INTERNET SECURITY COMPUTERS SECURITY SMARTPHONE SECURITY SOCIAL MEDIA SECURITY RESPONSE CYBER FORENSICS QUESTIONS? BASICS OF INTERNET/NETWORK A TYPICAL NETWORK NETWORK ESSENTIALS WHY NETWORKING?? WHAT IS THE INTERNET?? INTERCONNECTED(INTER) NETWORKS(NET) I.E. INTERNET (NETWORK OF NETWORKS) EXPANSIVE & EVERCHANGING CONCEPT EXISTED SINCE EARLY 1990s (NIKOLA TESLA) FIRST MSG WAS SENT THROUGH APRANET IN 1969 UNIV OF CA, LA TO SRI, CA FUNDED BY US DEPTT OF DEF( DARPA) ROBERT ELLIOT KAHN/VINTON GRAY SERF (F/O OF INTERNET-TCP/IP) WHO’S VULNERABLE? EVERYONE!
WHO USES COMPUTERS OR
NETWORKS IN THE PROCESS OF DOING THEIR JOB.
BOTH SERVERS AND END-USERS
ARE SUBJECT TO ATTACK
SOCIAL MEDIA USERS
ONLINE SERVICES USERS
CYBER CRIME, WHY? PASSION OF YOUNGSTERS DESIRE OF MAKING QUICK MONEY
MISCONCEPTION OF FIGHTING A JUST CAUSE
CAPACITY TO STORE DATA IN COMPARATIVELY SMALL SPACE CONFIDENTIAL INFORMATION IS ONLINE USER NEGLIGENCE COMPLEXITY IN UNDERSTANDING TECHNOLOGY VULNERABILITIES IN SYSTEM NEW FORM OF CRIME EASY ACCESSIBILITY TO VICTIMS INACCESSIBILITY TO CRIMINALS ANONYMITY
VOLATILE EVIDENCE DRAWBACKS IN CRIMINAL JUSTICE SYSTEM COMPUTER AS A TARGET
COMPUTER AS A WEAPON IMPORTANCE OF CYBER SECURITY
GOVERNMENT, MILITARY DATA
CORPORATE DATA FINANCIAL DATA MEDICAL RECORDS/ DATA PERSONAL INFORMATION UNAUTHORIZED ACCESS OR EXPOSURE HAVE NEGATIVE CONSEQUENCES BENEFITS: CYBER SECURITY PROTECTION MALWARE, RANSOMWARE PHISHING/CYBER CRIMES SOCIAL ENGINEERING PROTECTION FOR DATA & NETWORKS PREVENTION OF UNAUTHORIZED USERS ACCESSING DIGITAL ASSETS IMPROVEMENT OF RECOVERY TIME AFTER A BREACH PROTECTION OF END USERS AND THEIR PERSONAL INFORMATION IMPROVEMENT OF CONFIDENCE IN THE ORGANIZATION SOCIAL MEDIA (RESPONSIBLE USER) THREATS MALWARES (BACKDOOR, KEY/SCREEN LOGGERS, VIRUS, SPYWARES, RANSOMWARES) DDoS ATTACKS DIRECT ACCESS ATTACKS EVESDROPPING/SPYING PHISHING SOCIAL ENGINEERING SOCIAL MEDIA ( PIO, HONEYTRAP, BLACKMAIL, ESPIONAGE, PERSONAL/PHYSICAL SECURITY, OS INT) THREATS CYBER-STALKING EMAIL SPOOFING COMPUTER VANDALISM CYBER TERRORISM CHILD PORNOGRAPHY CYBER CONTRABAND CYBER LAUNDERING BANKING FRAUDS ONLINE SHOPPING/SELLING FRAUDS ONLINE LOTTERY FRAUDS SECURITY MEASURES HARDWARE (UTMS, FIREWALL, IDS, HARDWARE PROTECTION SYSTEM) SOFTWARE (ANTIVIRUS, BLOCKERS, GENUINE SOFTWARES, UPDATE) ACCESS CONTROL (PHYSICAL/VIRTUAL) RESPONSE MECHANISM DIGITAL HYGIENE END USER EDUCATION COMPUTERS SECURITY WHERE IS YOUR COMPUTER LOCATED? WHO CAN GET TO IT? PHYSICAL SECURITY OF THE COMPUTER ROOM USE OF STAND ALONE COMPUTERS/ NO NETWORK ACCESS NETWORKED COMPUTER/ NO DATA/BLANK COMPUTER HARDWARE/SOFTWARE SECURITY LOCKS BE INSTALLED ON PCS TO PREVENT UNAUTHORISED ACCESS.
Remember! A stolen computer is the ultimate
loss of data and privacy COMBINE PHYSICAL AND PASSWORD PROTECTION INTRODUCE POWER ON/BIOS & ADMINISTRATOR PASSWORD. DISABLE THE ‘GUEST’ ACCOUNT. ACTIVATE THE SCREEN SAVER AND ENABLE PASSWORD PROTECT YOUR FILES WITH PASSWORD. GOOD PASSWORDS: EASY TO REMEMBER, HARD TO GUESS DO NOT SHARE THE PARTITIONS/FOLDERS ON YOUR SYSTEM. IF SHARED, PROTECT THEM WITH PROPER PERMISSIONS. IF POSSIBLE, PREVENT PHYSICAL ACCESS WHEN YOU’RE NOT AROUND LOG OUT WHEN YOU LEAVE THE ROOM SMARTPHONE SECURITY SMARTPHONE SECURITY EASILY ACCESSIBLE TO ALL/INCREASED VULNERABILITY USE SCREEN LOCK/PASSWORD PHYSICAL SECURITY REPAIRS/DATA PROTECTION DISABLE GEO TAGGING/LOCATION SHARING ENABLE REMOTE WIPE/LOCATER SIM LOCK SMARTPHONE SECURITY USE OF PUBLIC NETWORKS DUBIOUS APPS DUBIOUS WEBSITES OTP PROTECTION/AUTHENTICATION SIM SWAP FRAUD DISABLE DATA/INTERNET WHEN NOT USING NO USE POLICY ON DUTY BACKUP DATA INTERNET SECURITY YOU ARE A TARGET! FIREWALLS/UTMs ANTIVIRUS GENUINE SOFTWARES/UPDATES PASSWORD SELECTION/MANAGEMENT STICK TO OWN DEVICES BE AWARE OF SURROUNDINGS/PHYSICAL SECURITY TRACK/DELETE DEGITAL FOOTPRINT CONNECT SECURELY BEWARE OF SOCIAL ENGINEERING BACK UP YOUR DATA YOU ARE NOT IMMUNE CLICKING WITHOUT THINKING! SOCIAL MEDIA SECURITY ADDICTION? STRONG PASSWORD/MANAGEMENT DON’T BE FRIEND TO EVERYONE CAREFUL WHAT YOU SHARE (NAME, ADDRESS, WORK, FAMILY ETC) NO OFFICIAL INFO PICTURES IN UNIFORM MAKE YOU TARGET PIO, HONEYTRAP, FRAUD, BLACMAIL, SEXUAL CRIMES • CHECK PRIVACY SETTINGS • CHECK APP PERMISSIONS • DISABLE AUTO DOWNLOAD • DON’T RESPOND TO UNKOWN PEOPLE/SOURCES • NEVER POST/DISCLOSE PRIVATE/SESITIVE INFO • DISABLE LOCATION/GEOTAGGING • NEVER SHARE OTP/PASSWORDS/CREDIT CARD/BANK INFO ETC • BE THOUGHTFUL OF WHAT YOU SHARE, • YOUR REAL FRIENDS & FAMILY ARE IN THE REAL WORLD RESPONSE WHEN COMPROMISED MITIGATE IMPACT IDENTIFICATION OF SOURCE COMMUNICATION AFFECTED PARTIES REGULATORY BODIES LAW ENFORCEMENT PREVENTION CHANGE PASSWORDS SUSPEND ACCOUNTS DETECTION ENABLE LOGGING REVIEW LOGS PREVENT RECURRENCE REVIEW POLICIES/SECURITY ENHANCE CONTROLS CYBER FORENSICS BEWARE! NOTHING IS HIDDEN/SECURE IN CYBERWORLD! VARIETY OF TECHNIQUES, TOOLS AND SOFTWARE FOR FORENSIC APPLICATIONS DATA ONCE WRITTEN IS RECOVERABLE YOU ARE BEING WATCHED YOU ARE LEAVING DIGITAL FOOTPRINTS SEARCH/BROWSING/OTHER HISTORY IP ADDRESS MAC ADDRESSES/IMEI NUMBERS/MOBILE NUMBERS NETWORK/CELL/ISP/DEVICE/OS/GEO LOCATION INFO SUMMARY CONCEPT OF NETWORK/INTERNET IMPORTANCE/BENEFITS OF CYBER SECURITY THREATS WHY CYBER CRIME? MEASURES INTERNET SECURITY COMPUTERS SECURITY SMARTPHONE SECURITY SOCIAL MEDIA SECURITY CYBER FORENSICS RESPONSE IN THE LAST… QUERIES? THANKS!