Workshop on Information Security Awareness

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Workshop on Information Security

Awareness

Safety is not a slogan, it’s a way of life.

www.infosecawareness.in

ISEA Team
Centre for Development of Advanced Computing, Mohali.
Govt. of India.

By
CHETAN SONI
Cyber Security Expert
Objective
• The objective of this presentation is to educate and
create awareness amongst the community on use of
Technology, Internet Media and its implications on
possible cyber crimes.
Cyber Security Threats Scenario
• 92% of the Indian youth was found to have shared
private information online despite being aware that
this is risky.

• 53% of youngsters trust the virtual world and


interact with strangers.

• 51% of those polled didn’t care about their online


privacy at all.
What it covers ?
Awareness Program Covers –
▫ Password Security
▫ USB Device Security
▫ Data Protection and Destruction
▫ Email Security & Phishing Awareness
▫ Protecting Against Ransom Virus
▫ URL and Safer Web Browsing
▫ Safe Social Networking
▫ Mobile Device Security
Password Security
Why would someone wants to steal your password ?
 Passwords are the only keys that prevent
unauthorized entry to many systems

Password Security Preventions –


1. It should be separate for diff-2 email accounts.
2. Don’t ever reveal your passwords to anyone.
3. Write down in a secure location.
4. Change your passwords if compromised suspected.
5. Add Complexity to passwords
USB Security
USB flash drives are hard to track physically, being
stored in bags, backpacks, laptop cases, jackets or
left at unattended workstations.

A survey shows end users most frequently copy:


- Customer Data (25%)
- Financial Information (25%)
- Business Plans (15%)
- Employee Data (13%)
- Source Code (6%)
USB Security
How to Secure USB Drive –
- Manually save files with a password.
- Avoid Direct Plug-Ins.
- Lock your flash drive with USB Safeguard.
- Encrypting the drive with third party tools like True
Crypt.
- Ensure that all USB devices are checked for malware
before they are connected to the network.
Data Protection
Computer data security is the process of preventing
and detecting unauthorized use of your computer
data.

It is concerned with 4 main areas –


▫ Confidentiality
▫ Integrity
▫ Availability
▫ Authentication
Email Security
Email is important because it creates a fast, reliable
form of communication that is free and easily
accessible.

Basic Reasons of attacks on Email Accounts –


- When one discloses his or her password to other
person.
- Forgetting to logout from public computers.
- Lack of awareness about legal remedies to sue a bad
man.
Ransomware
• A Ransomware is a type of malware that locks your
files, data or the PC itself and extorts money from
you in order to provide access.

• Ransomware is considered “scare virus” as it forces


users to pay a fee (or ransom) by scaring or
threatening them.
Ransomware Protection
• Backup your data.
• Show hidden file extensions.
• Filter EXEs in email
• Disable file running from AppData/LocalAppData Folders
• Disable RDP (Remote Desktop Protocol)
• Patch or Update your software.
• Disconnect your Wi-Fi or unplug.
• Use System Restore to get back to a known clean state.
• Set the BIOS clock back.
URL & Safe Web Browsing
Secure web browsing is a game of changing tactics.
Just when you think you’ve made your computer as
safe to use as possible, the landscape changes.

Always use HTTPS for


banking transactions.
URL & Safe Web Browsing
• Don’t download free media.
• Don’t store your payment information online.
• Don’t over share personal information on social media accounts.
• Change passwords regularly.
• Keep your browser software up-to-date.
• Run Anti-Virus software.
• Scan downloaded files before executing.
• Watch out for phishing.
• Don’t Reuse Passwords.
• Use HTTPS for banking transactions.
• Read Privacy Policies.
• Avoid Public or Free Wi-Fi.
• Disable Stored Passwords.
Safe Social Networking
• Today’s world is a global village. Everyone is
connected to one another in this vast network
generated by network.

• As of 2015, the world’s largest social networking


company, Facebook has 1.49 billion active users, and
the no. of users are increasing every year.

72% - High School Students


78% - College Students
Safe Social Networking
Advice for young adults on social media NOT TO DO!

• Never post illegal activities.


• Avoid Bullying class mates.
• Don’t trash your teachers.
• Don’t post objectionable content from school
computers or networks.
• Don’t post confidential information.
• Don’t overlay specific location check-ins.
• Never rely on privacy settings 100%.
Android Devices Security
1) Do not save all of your passwords
2) Use Android in-built security
3) Lock your apps (Ex. App Lock)
4) Importance of App Permissions
5) Securing your network (Ex. Hideninja VPN, Wi-Fi Protector)
6) Use Mobile Security App
7) Create Multiple User Account to protect privacy
8) Prepare a Backup of your data
9) Enable Remote Wipe (Ex. 3cx Mobile Device Manager)
10) Track your lost device (Ex. Where’s My Droid, Plan B,
SeekDroid Lite, AntiDroidTheft, Prey AntiTheft)
Women’s Security Android Apps
1) VithU App – (Push your power button twice to
instantly send an SOS alert to contacts)
2) Circle of 6 App – (That lets you connect to up to 6 close
contacts)
3) I’m Shakti App – (Press power button5 times in 2 seconds
to trigger the app)
4) Lifetime360 Family Locator App – (Location Alert
with Family members)
5) Famy Family Chat & Locator App – (GPS Locator)
6) Nirbhaya: Be Fearless App – (Shake to alert)
Code Red Worm (Year 2001)
History
The first recorded cyber crime was
recorded in the year 1820.

The first spam email took place in


year 1978 when it was sent over the
Arpanet.

The first Virus was installed on an


Apple Computer in year 1982.
(Rich Skrenta wrote first Elk Cloner virus)
(On every 50th boot the Elk Cloner virus would
display a short poem)
What Cyber Crime Includes ?

- Illegal access - Hacking


- Illegal Interception - Denial of Service Attack

- System Interference - Virus Dissemination

- Data Interference - Computer Vandalism

- Misuse of devices - Cyber Terrorism

- Fraud - Software Piracy


Safety Tips
1) Use antivirus software (AVAST, AVG…..)
2) Insert firewalls , pop up blocker (Windows, Comodo)
3) Uninstall unnecessary software (Adwares)
4) Maintain backup (Weekly/Monthly)
5) Check security settings (Netstat)
6) Use secure connection (HTTPS)
7) Open attachments carefully
8) Use strong passwords , don’t give personal information
unless required.
I Promise
1) I will not fill out any forms that take asks for any
personal information.
2) I will not get into arguments or fights online.
3) I won’t keep online secrets from my parents.
4) If anyone sends me any bad picture, I’ll inform to
my parents.
5) If anyone asks me to do something which I am not
supposed to do, I’ll inform to my parents.
6) I’ll not meet in person anyone whom I met online.
7) I won’t use bad or rude language online.
CONCLUSION
The only system which is truly secure is one
which is switched off and unplugged.

So , only way to be safe is Pay attention and Act smart.

THANK YOU
For any query / help, drop a mail at [email protected]

You might also like