Professional Documents
Culture Documents
Online Security: Empowerment Technologies
Online Security: Empowerment Technologies
SECURITY
EMPOWERMENT TECHNOLOGIES
Warm up question:
What is your idea about computer hacking?
Have you encountered a security threat?
Explain how?
How can we protect ourselves from
computer hacking
What is Online
Security?
is the awareness of the user in
implementing counter measures to avoid
compromise of sensitive personal data and
assets.
An ‘asset’ is a data that has certain value
to its owner.
As technology evolves, security in the web
is being raised as a concern.
Scamming
It is a type of attack where the
perpetrator seeks the victim’s
trust.
As a result, victims were able to
provide personal information.
Scams do not involve technical
skills, but social engineering.
Social Engineering is when the
perpetrator communicates with
the user until such time that it will
divulge his or her sensitive
personal information.
Phishing
It is when the perpetrator
impersonates a trusted third party
device in order to gain the
victim’s trust.
Mostly of the hacked ‘assets’ are
social media credentials, credit
card’s sensitive information, bank
accounts and etc.
We can avoid this attack by
making sure that the website that
we are visiting are secured and
trusted.
Cross-site Scripting
It is being
performed on
vulnerable web or
desktop
applications.
Mostly this happens
when web
applications did not
pass quality
assurance on
application security.
How to know if the website is
secured or not?
Always check the URL (Uniform Resource Locator) – especially
when you are performing actions which involve sensitive
information (e.g. Social Media sites, email, banking and etc.)
Always remember the URL name of the sites that you are
visiting in order to avoid hacking.