0% found this document useful (0 votes)
31 views19 pages

Cyber Security

Uploaded by

HASSAN KADAPPADI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views19 pages

Cyber Security

Uploaded by

HASSAN KADAPPADI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Securing Your

Digital World
Cybersecurity Awareness for Everyone
Agenda

• Introduction to Cybersecurity
• Common Cyber Threats
• Best Practices for Staying Safe Online
• Importance of Password Security
• Recognizing Phishing Attempts
• Mobile Device Security
• Data Privacy and Social Media Risks
• Q&A Session
What is Cybersecurity?

• Measures and practices to protect devices, networks, and


data from unauthorized access or harm.

• Importance:
• Prevents financial loss
• Safeguards personal and sensitive information
• Protects business continuity
Recent Incident

• Oxigox Account Hacked. But recovered.


Common Cyber Threats

• Phishing: Fraudulent attempts to steal personal


information.
• Malware: Harmful software like viruses, worms,
ransomware.
• Social Engineering: Manipulating individuals into revealing
sensitive data.
• DDoS Attacks: Disrupting services by overwhelming
systems.
• Insider Threats: Risks from employees or partners.
Types of Hackers

Black hat Steal data, damage systems, or cause chaos.


Hackers

White Hat Work to protect systems and find vulnerabilities legally.

Explore systems without permission but often


Grey Hat report flaws to owners.May operate in ethically
ambiguous ways.

Script Use pre-written tools or scripts to perform attacks


Kiddies without deep knowledge.

Hacktivists: Hack to promote political or social agendas.


Best Practices for Staying Safe Online

• Keep software and systems up to date.


• Use antivirus and firewall software.
• Avoid clicking on suspicious links or downloading unknown
files.
• Use secure Wi-Fi; avoid public Wi-Fi for sensitive activities.
• Regularly back up important data.
Password Security

• Tips for Strong Passwords:Use a mix of upper- and


lowercase letters, numbers, and symbols.
• Avoid using personal information like birthdays or names.
• Change passwords regularly.
• Password Managers: Tools to store and generate secure
passwords.
Recognizing Phishing Attempts

• Red Flags:
• Emails or messages with urgent requests for personal information.
• Suspicious sender email addresses.
• Links that redirect to unrecognized URLs.
• What to Do:
• Verify the sender’s identity before responding.
• Avoid clicking links or downloading attachments from unknown
sources.
Mobile Device Security

• Install apps only from trusted sources.


• Use strong passwords, patterns, or biometric locks.
• Enable remote wipe and tracking features.
• Avoid rooting or jailbreaking your device.
• Regularly update your operating system and apps.
Data Privacy and Social Media Risks

• Challenges:
• Oversharing personal information.
• Fake profiles and scams.
• Privacy settings often ignored.
• Solutions:
• Limit personal data sharing.
• Review and adjust privacy settings.
• Be cautious of friend requests from unknown individuals.
Famous Data Breaches

• Yahoo 2013 – 3 billion users


• Aadhaar 2018 – 1.1 Billion including names, addresses,
photos, phone numbers, and emails, as well as biometric
data like fingerprints and iris scans. also held information
about bank accounts connected with unique 12-digit
numbers, it became a credit breach too.
• LinkedIn -700 million
• Marriott International - Reservation Data
Action Plan

• Conduct regular cybersecurity awareness training.


• Implement multi-factor authentication.
• Secure all connected devices, including IoT.
• Monitor and report suspicious activities immediately.
Why Choose Cybersecurity as a Career?

• High Demand: Employers are actively seeking


cybersecurity professionals.
• Entry level salary: 30,000
• 3 Years Salary: 60,000
• Senior Level Salary: 1,00,000
The Vast Scope of IT

• Why IT Matters:
• IT drives innovation and transforms industries.
• Demand for skilled professionals is increasing globally.

• Marketing, Development, Media, AI Engineer

• High Income Skill


Conclusion

• Cybersecurity is everyone’s responsibility.


• Staying informed and proactive can minimize risks.
• Protect your data, devices, and identity—always think
before you click.
Q&A

• Thank You! Open Floor for Questions

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy