Cyber Safety & Security
Cyber Safety & Security
SECURITY
Example:
Confidentiality Criminal steals
customers’
usernames,
passwords, or
credit card
information
Protecting
information from
unauthorized
access and
disclosure
CIA TRIAD
Integrit
y
Protecting
information from
unauthorized
modification
Example:
Someone alters
payroll information
or a proposed
product design
CIA TRIAD
Availability Example:
Your
customers
are unable
to access
your online
services
Preventing
disruption
in how
informatio
n is
accessed
THREATS AND VULNERABILITIES
192.168.1.10
PHISHING AND SPEAR- PHISHING ATTACKS
Motives & Aims: The difference is, they don’t want to rob people
nor want to help people in particular. Rather, they enjoy
experimenting with systems to find loopholes, crack defenses, and
generally find a fun hacking experience.
3. WHITE HAT HACKERS
WHITE HAT HACKERS ARE TYPES OF HACKERS WHO’RE PROFESSIONALS
WITH EXPERTISE IN CYBERSECURITY. THEY ARE AUTHORIZED OR
CERTIFIED TO HACK THE SYSTEMS. THESE WHITE HAT HACKERS WORK
FOR GOVERNMENTS OR ORGANIZATIONS BY GETTING INTO THE
SYSTEM. THEY HACK THE SYSTEM FROM THE LOOPHOLES IN THE
CYBERSECURITY OF THE ORGANIZATION.
• Or be more creative!
46
SECURITY AWARENESS – SOCIAL MEDIA
• Social Media (FB, Instagram, twitter, etc) is now an integral
part of our daily life
• Be sensitive in what you upload on your social networking
account (status, pics, etc)
• Use security and privacy options provided by social media
sites
• SMS based second factor authentication
• Access control (who can see what)
• Keep your personal details, personal.
SECURITY AWARENESS – SMART MOBILE DEVICES
• Connect to ONLY authorized wifi access
• Use auto lock features
• Download apps from authorized app stores ONLY
• Use Privacy options provided by various mobile
Operating system
• Do NOT accept calls from weird numbers OR do not give
a call back
SECURITY AWARENESS – DESKTOPS/LAPTOPS
• Ensure your Antivirus is updated and scans are configured for a
routine check
• Implement personal firewall
• Keep your Operating system updated with latest patches
• Avoid installing cracked softwares
• Keep OS files and personal files in different HDD partition
• Factory Restore is the best option to clean your system
SECURITY AWARENESS – INTERNET
• Internet use is a two edge sword. Be SMART on using Internet
• NEVER visit untrusted websites
• NEVER user referral links to visit a website. Instead type in the URL
address in the browser
• Always download software from authorized / Trusted sources
• Do Not Connect to unknown or unprotected wi-fi zones
ANTI-VIRUS AND ANTI-SPYWARE SOFTWARE
• Anti-virus software detects certain types of malware and can
destroy it before any damage is done.
• Install and maintain anti-virus and anti-spyware software.
• Be sure to keep anti-virus software updated.
51
HOST-BASED FIREWALLS
• A firewall acts as a barrier between your computer/private
network and the internet. Hackers may use the internet to
find, use and install applications on your computer. A firewall
prevents many hacker connections to your computer.
• Firewalls filter network packets that enter or leave your
computer
52
SUMMARY
• Cybersecurity will require
a significant workforce
with deep domain
knowledge.
• Almost everything is
hooked up to the internet
in some sort of form.
• Could one click of the
mouse start World War
III?