SlideShare ist ein Scribd-Unternehmen logo
1 von 34
1




Internet Fraud
•Learning Objectives

 Identify the nature of internet fraud

 Identify ways to prevent internet fraud.


 List the tools used for internet fraud
“Internet fraud is a form of fraud which uses
any component of the Internet to accomplish
the intended fraudulent activity.”
 - National White Collar Crime Center, USA
•Tools Used for Internet Fraud

 •   Email
 •   Chat rooms
 •   Websites
 •   Message Boards
 •   Portals
 •   Web Application
•Types of Internet Fraud

 •   Credit/Debit Card Fraud
 •   Business Deceit
 •   Recruitment Deceit
 •   Freight Forwarding Scam
 •   Advance Fee Fraud
 •   Spoofing/Phishing Scam
 •   Investment Rip-Off
 •   Identity Theft
 •   Non-Delivery of Goods/Service Fraud
•Credit & Debit Card Fraud

This involves the use of
 credit/debit card to obtain
 money or acquire properties
 without appropriate
 authorization.

Fraudsters obtain credit/debit
 card numbers of victims from
 unsecured web media.
•Business Deceit

 In this case, fraudsters present themselves as genuine business
   people and attempt to collect personal information such as
   social security number and date of birth from respondents, in
   order to use the data for purchasing goods which would most
   likely be transferred or shipped out of the country.
•Recruitment Deceit

 Generic public or private portals can be used for advertising fake
  job openings with the intention to collect vital information from
  applicants, and deploy them for purchasing goods.
•Freight Forwarding Scam

 This is an internet fraud that involves the movement of
  merchandise from one party to another without informing them
  that the goods were bought with fake credit cards.
•Non-Delivery of Goods/Service Fraud

 This refers to scam in which people are encouraged to pay for
  goods and or service via a web portal, and thereafter nothing
  would be delivered to the buyers.
•Phishing

     •   Phishing is a form of Internet fraud that aims to steal valuable
         information such as credit cards, social security numbers, user
         IDs and passwords
     •   Refers to the stealing of personal identifiers such as Pin
         numbers, Credit card numbers and passwords via a spoof web
         site or email.




11                                                                     Bits, Bytes & Chips
•Identity Theft

 This entails the use of another’s personal information without
  appropriate consent, for the purpose of fraudulent practices.
Internet Fraud

     •PROTECTING YOURSELF




13
•Step 1. Keep your firewall turned on

     •   A firewall is a software program that helps screen out hackers, viruses, and
         worms that try to reach your computer over the Internet.
     •   A firewall helps protect your computer from hackers who might try to
         delete information, make your computer crash, or even steal personal
         information such as passwords or credit card numbers.

     •   You should make sure your firewall is always turned on. if you have a small-
         office network, it is important to protect every computer.




14                                                                               Bits, Bytes & Chips
•How Firewalls Work

     •   When someone on the Internet or on a network tries to connect to your
         computer, the attempt is called an "unsolicited request." When your
         computer gets an unsolicited request, Firewalls block the connection. If you
         run a program such as an instant messaging program or a multiplayer
         network game that needs to receive information from the Internet or a
         network, the firewall asks if you want to block or unblock (allow) the
         connection.




15                                                                              Bits, Bytes & Chips
•Step 2. Keep your operating system up-to-date

     •   High priority updates are critical to the security and reliability
         of your computer. They offer the latest protection against
         malicious online activities. Microsoft provides new updates, as
         necessary, on the second Tuesday of the month.
     •   Automatic Updates is the easiest, most reliable way to help
         protect your computer from the latest Internet threats by
         delivering security updates right to your computer
         automatically.




16                                                                     Bits, Bytes & Chips
•Step 3. Use updated antivirus software
     •   Viruses are usually malicious software. You need antivirus technology to help
         prevent viruses, and you need to keep it regularly updated.
     •   Here are a few primary indicators that your computer might be infected:
           •   Your computer runs more slowly than normal
           •   Your computer stops responding or locks up often
           •   Your computer crashes and restarts every few minutes
           •   Your computer restarts on its own and then fails to run normally
           •   Applications on your computer don't work correctly
           •   Disks or disk drives are inaccessible
           •   You can't print correctly
           •   You see unusual error messages
           •   You see distorted menus and dialog boxes




17                                                                                       Bits, Bytes & Chips
•Step 4. Use updated antispyware
     technology
     •   Spyware is usually malicious software. You need antispyware technology to
         help prevent spyware, and you need to keep it regularly updated.
     •   Spyware is a general term used to describe software that performs certain
         behaviors such as advertising, collecting personal information, or changing
         the configuration of your computer, generally without appropriately
         obtaining your consent first.




18                                                                             Bits, Bytes & Chips
•Internet Safety Guidelines

     •   Recognize phishing scams and fake e-mails
     •   Phishing is a type of deception designed to steal your valuable personal
         data, such as credit card numbers, passwords, account data, or other
         information.
     •   Con artists might send millions of fraudulent e-mail messages that appear
         to come from Web sites you trust, like your bank or credit card company,
         and request that you provide personal information.




19                                                                             Bits, Bytes & Chips
•Internet Safety Guidelines

     •   How to handle suspicious e-mail
           1.   If you think you've received a phishing e-mail message, do not respond
                to it.
           2.   Report suspicious e-mail to the faked or "spoofed" organization.
           3.   Contact the organization directly—not through the e-mail you
                received—and ask for confirmation. Or call the organization's toll-free
                number and speak to a customer service representative.
           4.   Don't click links in e-mail messages.




20                                                                                 Bits, Bytes & Chips
•Internet Safety Guidelines
     1.   If you need to update your account information or change your password,
          visit the Web site by using your personal bookmark or by typing the URL
          directly into your browser.
     2.   Check the security certificate before you enter personal or financial
          information into a Web site.
     3.   Links in phishing e-mail messages often take you to phony sites that
          encourage you to transmit personal or financial information to con artists.
          Avoid clicking a link in an e-mail message unless you are sure of the
          destination. Even if the address bar displays the correct Web address, don't
          risk being fooled. Con artists can display a fake URL in the address bar on
          your browser. Type addresses directly into your browser or use your personal
          bookmarks.
     4.   Make sure the site is secure before you type.




21                                                                               Bits, Bytes & Chips
•Anti-spam and anti-phishing
     technologies
     •   Microsoft Phishing Filter
     •   Use e-mail software that filters spam
     •




22                                               Bits, Bytes & Chips
•Watch for Key Phishing Words

     •   "Verify your account.“
     •   "If you don't respond within 48 hours, your account will be
         closed.“
     •   "Dear Valued Customer.“
     •   "Click the link below to gain access to your account.“
     •   Slightly modified URLs
           •   www.micosoft.com
               www.mircosoft.com
               www.verify-microsoft.com




23                                                                     Bits, Bytes & Chips
•Protect your personal information

     •   Create strong passwords
           •   Make it lengthy
           •   Combine letters, numbers, and symbols
           •   Avoid your login name
           •   Test your password at
               http://www.microsoft.com/athome/security/privacy/password_checker
               .mspx
     •   Use online payment services
           •   Use a third-party payment service to pay for things online




24                                                                          Bits, Bytes & Chips
•Beyond the basics, how to protect
    yourself and your data.
     •   ID theft
           •   Social engineering is a way for criminals to gain access to your
               computer. The purpose of social engineering is usually to secretly
               install spyware or other malicious software or to trick you into
               handing over your passwords or other sensitive financial or personal
               information.

     •   Use Strong Passwords
     •   Recognize Spam and Phishing




25                                                                              Bits, Bytes & Chips
•Using a public computer

     •   Don't save your logon information. Always log out of Web sites
         by clicking "log out" on the site. It's not enough to simply close
         the browser window or type in another address
     •   Don't leave the computer unattended with sensitive
         information on the screen.
     •   Erase your tracks
           •   Here’s how




26                                                                     Bits, Bytes & Chips
•How to remove your presence.
     •   To disable the feature that stores passwords
         Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.
         1. In Internet Explorer, click Tools, and then click Internet Options.
         2. Click the Content tab, and then click AutoComplete.
         3. Click to clear both check boxes having to do with passwords.
         To delete your temporary Internet files and your history
         When you finish your use of a public computer, you should delete all the temporary files and your Internet
         history.
         1. In Internet Explorer, click Tools, and then click Internet Options.
         2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.
         3. Under History, click Clear History.




27                                                                                                                   Bits, Bytes & Chips
•5 safety tips for using a public computer
     (continued)
     •   Watch for over-the-shoulder snoops.
     •   Don't enter sensitive information into a public computer.
         These measures provide some protection against casual hackers
         who use a public computer after you have.
           •   If you really want to be safe, avoid typing your credit card number or
               any other financial or otherwise sensitive information into any public
               computer.




28                                                                                 Bits, Bytes & Chips
•Malware

     •   Software designed to infiltrate or damage a computer system without the
         owner's informed consent
     •   It can hijack your browser, redirect your search attempts, serve up nasty
         pop-up ads, track what web sites you visit
     •   Usually poorly-programmed and can cause a computer to become
         unbearably slow and unstable
     •   Can reinstall themselves even after you think you have removed them




29                                                                              Bits, Bytes & Chips
•Let’s Review.
     How to have a safe internet browsing experience
     •   Keep your operating system current with the most recent
         updates.
     •   Use a Firewall
     •   Use an Anti-Virus program and keep it updated.
     •   Use an Anti-Spyware program and keep it updated.
     •   Use an Anti-Spam program and keep it updated.




30                                                                 Bits, Bytes & Chips
•Where do I get the tools I need?

     •   Many ISPs provide Anti-Virus with your subscription. BUT! It
         must be downloaded and installed.
     •   You could use a free anti virus like AVGFree, but a paid license of
         an anti virus like Norton or Quick Heal is recommended,
         because, usually these include Anti-Spyware and Anti-Malware
         tools also.




31                                                                      Bits, Bytes & Chips
•Where do I get the tools I need?
     (continued)
     •   Many companies offer Anti-Phishing capabilities either as a part
         of their email UI or as a part of their browsers.
     •   Firewalls are often a feature of Anti-virus programs but if not,
         turn on the Windows Firewall built into XP and above editions.
     •   And finally, the most powerful protection available!




32                                                                   Bits, Bytes & Chips
•Where do I get the tools I need?
     (continued)
     •   Common Sense.

          •   If the program is FREE, read the Licence Agreement of the software.
          •   Do not respond to bogus Emails
          •   Do not click on links in Emails to other sites
          •   Passwords, Passwords, Passwords
          •   Watch for encryption signals. Padlocks and Certificates.




33                                                                              Bits, Bytes & Chips
Thank You




34

Weitere ähnliche Inhalte

Was ist angesagt?

Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safetyBISWAJITGHORAI2
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud Mikael Wagner
 
Phishing
PhishingPhishing
PhishingSagar Rai
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud PreventionGerald Johnson
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 

Was ist angesagt? (20)

Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Hacking
HackingHacking
Hacking
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Phishing
PhishingPhishing
Phishing
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Andere mochten auch

Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
The 10 Most Valued Work Skills In 2020
The 10 Most Valued Work Skills In 2020The 10 Most Valued Work Skills In 2020
The 10 Most Valued Work Skills In 2020Donna Murdoch
 
Business objects activities web intelligence
Business objects activities web intelligenceBusiness objects activities web intelligence
Business objects activities web intelligenceDmitry Anoshin
 
What Is Insight? The Five Principles of Effective Insight Definition
What Is Insight? The Five Principles of Effective Insight DefinitionWhat Is Insight? The Five Principles of Effective Insight Definition
What Is Insight? The Five Principles of Effective Insight DefinitionJonathan Dalton
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud pptjasonsirmon
 
Internet fraud
Internet fraudInternet fraud
Internet fraudYasha Singh
 
Tax Saving Investments
Tax Saving InvestmentsTax Saving Investments
Tax Saving InvestmentsCA Jimmit Mehta
 
Leadership workshop
Leadership workshopLeadership workshop
Leadership workshopMohammed Maina
 
Tax saving schemes
Tax saving schemesTax saving schemes
Tax saving schemesVikas Soni
 
16 most searched stories of 2015 on the world (Infographic)
16 most searched stories of 2015 on the world (Infographic)16 most searched stories of 2015 on the world (Infographic)
16 most searched stories of 2015 on the world (Infographic)Pengyuan Zhao
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentationguest561f62
 
Bar code technology
Bar code technologyBar code technology
Bar code technologybhupathi vikas
 
Breaking The Internet - TNW Europe 2015
Breaking The Internet - TNW Europe 2015Breaking The Internet - TNW Europe 2015
Breaking The Internet - TNW Europe 2015Brendan Gahan
 

Andere mochten auch (20)

Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Web Spam Techniques
Web Spam TechniquesWeb Spam Techniques
Web Spam Techniques
 
The 10 Most Valued Work Skills In 2020
The 10 Most Valued Work Skills In 2020The 10 Most Valued Work Skills In 2020
The 10 Most Valued Work Skills In 2020
 
Tableau API
Tableau APITableau API
Tableau API
 
Gears
GearsGears
Gears
 
Business objects activities web intelligence
Business objects activities web intelligenceBusiness objects activities web intelligence
Business objects activities web intelligence
 
What Is Insight? The Five Principles of Effective Insight Definition
What Is Insight? The Five Principles of Effective Insight DefinitionWhat Is Insight? The Five Principles of Effective Insight Definition
What Is Insight? The Five Principles of Effective Insight Definition
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Good/Bad Web Design
Good/Bad Web DesignGood/Bad Web Design
Good/Bad Web Design
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Tax Saving Investments
Tax Saving InvestmentsTax Saving Investments
Tax Saving Investments
 
How to implement Slack
How to implement SlackHow to implement Slack
How to implement Slack
 
Leadership workshop
Leadership workshopLeadership workshop
Leadership workshop
 
Tax saving schemes
Tax saving schemesTax saving schemes
Tax saving schemes
 
16 most searched stories of 2015 on the world (Infographic)
16 most searched stories of 2015 on the world (Infographic)16 most searched stories of 2015 on the world (Infographic)
16 most searched stories of 2015 on the world (Infographic)
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
 
Bar code technology
Bar code technologyBar code technology
Bar code technology
 
Breaking The Internet - TNW Europe 2015
Breaking The Internet - TNW Europe 2015Breaking The Internet - TNW Europe 2015
Breaking The Internet - TNW Europe 2015
 

Ă„hnlich wie E business internet fraud

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Day 2
Day 2Day 2
Day 2sefreed
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimesACCA Global
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Online reputation
Online reputationOnline reputation
Online reputationEslam Mohammed
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 

Ă„hnlich wie E business internet fraud (20)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Day 2
Day 2Day 2
Day 2
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 

Mehr von Radiant Minds

Corona virus and mental health
Corona virus and mental healthCorona virus and mental health
Corona virus and mental healthRadiant Minds
 
Campus 2 Corporate
Campus 2 CorporateCampus 2 Corporate
Campus 2 CorporateRadiant Minds
 
E business cms
E business cmsE business cms
E business cmsRadiant Minds
 
E business scm_crm
E business scm_crmE business scm_crm
E business scm_crmRadiant Minds
 
E business n_tier_arch
E business n_tier_archE business n_tier_arch
E business n_tier_archRadiant Minds
 
E business edi_vads
E business edi_vadsE business edi_vads
E business edi_vadsRadiant Minds
 
E business edi_messaging
E business edi_messagingE business edi_messaging
E business edi_messagingRadiant Minds
 
E business edi_basics
E business edi_basicsE business edi_basics
E business edi_basicsRadiant Minds
 
E business intro_toseo
E business intro_toseoE business intro_toseo
E business intro_toseoRadiant Minds
 
E business internet_basics
E business internet_basicsE business internet_basics
E business internet_basicsRadiant Minds
 
E business case-studies
E business case-studiesE business case-studies
E business case-studiesRadiant Minds
 

Mehr von Radiant Minds (20)

Corona virus and mental health
Corona virus and mental healthCorona virus and mental health
Corona virus and mental health
 
Campus 2 Corporate
Campus 2 CorporateCampus 2 Corporate
Campus 2 Corporate
 
E business cms
E business cmsE business cms
E business cms
 
E business scm_crm
E business scm_crmE business scm_crm
E business scm_crm
 
E business n_tier_arch
E business n_tier_archE business n_tier_arch
E business n_tier_arch
 
E business edi_vads
E business edi_vadsE business edi_vads
E business edi_vads
 
E business edi_messaging
E business edi_messagingE business edi_messaging
E business edi_messaging
 
E business edi_basics
E business edi_basicsE business edi_basics
E business edi_basics
 
E business intro_toseo
E business intro_toseoE business intro_toseo
E business intro_toseo
 
E business internet_basics
E business internet_basicsE business internet_basics
E business internet_basics
 
E business case-studies
E business case-studiesE business case-studies
E business case-studies
 
Ism 4
Ism 4Ism 4
Ism 4
 
Ism 3
Ism 3Ism 3
Ism 3
 
ISM 2
ISM 2ISM 2
ISM 2
 
ISM-1
ISM-1ISM-1
ISM-1
 
Pm 2 planning
Pm 2 planningPm 2 planning
Pm 2 planning
 
Pm 3 approach
Pm 3 approachPm 3 approach
Pm 3 approach
 
Pm 4 scope
Pm 4 scopePm 4 scope
Pm 4 scope
 
Pm 5 time
Pm 5 timePm 5 time
Pm 5 time
 
Pm 6 testing
Pm 6 testingPm 6 testing
Pm 6 testing
 

KĂĽrzlich hochgeladen

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

KĂĽrzlich hochgeladen (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

E business internet fraud

  • 2. •Learning Objectives Identify the nature of internet fraud Identify ways to prevent internet fraud. List the tools used for internet fraud
  • 3. “Internet fraud is a form of fraud which uses any component of the Internet to accomplish the intended fraudulent activity.” - National White Collar Crime Center, USA
  • 4. •Tools Used for Internet Fraud • Email • Chat rooms • Websites • Message Boards • Portals • Web Application
  • 5. •Types of Internet Fraud • Credit/Debit Card Fraud • Business Deceit • Recruitment Deceit • Freight Forwarding Scam • Advance Fee Fraud • Spoofing/Phishing Scam • Investment Rip-Off • Identity Theft • Non-Delivery of Goods/Service Fraud
  • 6. •Credit & Debit Card Fraud This involves the use of credit/debit card to obtain money or acquire properties without appropriate authorization. Fraudsters obtain credit/debit card numbers of victims from unsecured web media.
  • 7. •Business Deceit In this case, fraudsters present themselves as genuine business people and attempt to collect personal information such as social security number and date of birth from respondents, in order to use the data for purchasing goods which would most likely be transferred or shipped out of the country.
  • 8. •Recruitment Deceit Generic public or private portals can be used for advertising fake job openings with the intention to collect vital information from applicants, and deploy them for purchasing goods.
  • 9. •Freight Forwarding Scam This is an internet fraud that involves the movement of merchandise from one party to another without informing them that the goods were bought with fake credit cards.
  • 10. •Non-Delivery of Goods/Service Fraud This refers to scam in which people are encouraged to pay for goods and or service via a web portal, and thereafter nothing would be delivered to the buyers.
  • 11. •Phishing • Phishing is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords • Refers to the stealing of personal identifiers such as Pin numbers, Credit card numbers and passwords via a spoof web site or email. 11 Bits, Bytes & Chips
  • 12. •Identity Theft This entails the use of another’s personal information without appropriate consent, for the purpose of fraudulent practices.
  • 13. Internet Fraud •PROTECTING YOURSELF 13
  • 14. •Step 1. Keep your firewall turned on • A firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. • A firewall helps protect your computer from hackers who might try to delete information, make your computer crash, or even steal personal information such as passwords or credit card numbers. • You should make sure your firewall is always turned on. if you have a small- office network, it is important to protect every computer. 14 Bits, Bytes & Chips
  • 15. •How Firewalls Work • When someone on the Internet or on a network tries to connect to your computer, the attempt is called an "unsolicited request." When your computer gets an unsolicited request, Firewalls block the connection. If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. 15 Bits, Bytes & Chips
  • 16. •Step 2. Keep your operating system up-to-date • High priority updates are critical to the security and reliability of your computer. They offer the latest protection against malicious online activities. Microsoft provides new updates, as necessary, on the second Tuesday of the month. • Automatic Updates is the easiest, most reliable way to help protect your computer from the latest Internet threats by delivering security updates right to your computer automatically. 16 Bits, Bytes & Chips
  • 17. •Step 3. Use updated antivirus software • Viruses are usually malicious software. You need antivirus technology to help prevent viruses, and you need to keep it regularly updated. • Here are a few primary indicators that your computer might be infected: • Your computer runs more slowly than normal • Your computer stops responding or locks up often • Your computer crashes and restarts every few minutes • Your computer restarts on its own and then fails to run normally • Applications on your computer don't work correctly • Disks or disk drives are inaccessible • You can't print correctly • You see unusual error messages • You see distorted menus and dialog boxes 17 Bits, Bytes & Chips
  • 18. •Step 4. Use updated antispyware technology • Spyware is usually malicious software. You need antispyware technology to help prevent spyware, and you need to keep it regularly updated. • Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. 18 Bits, Bytes & Chips
  • 19. •Internet Safety Guidelines • Recognize phishing scams and fake e-mails • Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. • Con artists might send millions of fraudulent e-mail messages that appear to come from Web sites you trust, like your bank or credit card company, and request that you provide personal information. 19 Bits, Bytes & Chips
  • 20. •Internet Safety Guidelines • How to handle suspicious e-mail 1. If you think you've received a phishing e-mail message, do not respond to it. 2. Report suspicious e-mail to the faked or "spoofed" organization. 3. Contact the organization directly—not through the e-mail you received—and ask for confirmation. Or call the organization's toll-free number and speak to a customer service representative. 4. Don't click links in e-mail messages. 20 Bits, Bytes & Chips
  • 21. •Internet Safety Guidelines 1. If you need to update your account information or change your password, visit the Web site by using your personal bookmark or by typing the URL directly into your browser. 2. Check the security certificate before you enter personal or financial information into a Web site. 3. Links in phishing e-mail messages often take you to phony sites that encourage you to transmit personal or financial information to con artists. Avoid clicking a link in an e-mail message unless you are sure of the destination. Even if the address bar displays the correct Web address, don't risk being fooled. Con artists can display a fake URL in the address bar on your browser. Type addresses directly into your browser or use your personal bookmarks. 4. Make sure the site is secure before you type. 21 Bits, Bytes & Chips
  • 22. •Anti-spam and anti-phishing technologies • Microsoft Phishing Filter • Use e-mail software that filters spam • 22 Bits, Bytes & Chips
  • 23. •Watch for Key Phishing Words • "Verify your account.“ • "If you don't respond within 48 hours, your account will be closed.“ • "Dear Valued Customer.“ • "Click the link below to gain access to your account.“ • Slightly modified URLs • www.micosoft.com www.mircosoft.com www.verify-microsoft.com 23 Bits, Bytes & Chips
  • 24. •Protect your personal information • Create strong passwords • Make it lengthy • Combine letters, numbers, and symbols • Avoid your login name • Test your password at http://www.microsoft.com/athome/security/privacy/password_checker .mspx • Use online payment services • Use a third-party payment service to pay for things online 24 Bits, Bytes & Chips
  • 25. •Beyond the basics, how to protect yourself and your data. • ID theft • Social engineering is a way for criminals to gain access to your computer. The purpose of social engineering is usually to secretly install spyware or other malicious software or to trick you into handing over your passwords or other sensitive financial or personal information. • Use Strong Passwords • Recognize Spam and Phishing 25 Bits, Bytes & Chips
  • 26. •Using a public computer • Don't save your logon information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address • Don't leave the computer unattended with sensitive information on the screen. • Erase your tracks • Here’s how 26 Bits, Bytes & Chips
  • 27. •How to remove your presence. • To disable the feature that stores passwords Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords. 1. In Internet Explorer, click Tools, and then click Internet Options. 2. Click the Content tab, and then click AutoComplete. 3. Click to clear both check boxes having to do with passwords. To delete your temporary Internet files and your history When you finish your use of a public computer, you should delete all the temporary files and your Internet history. 1. In Internet Explorer, click Tools, and then click Internet Options. 2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies. 3. Under History, click Clear History. 27 Bits, Bytes & Chips
  • 28. •5 safety tips for using a public computer (continued) • Watch for over-the-shoulder snoops. • Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have. • If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer. 28 Bits, Bytes & Chips
  • 29. •Malware • Software designed to infiltrate or damage a computer system without the owner's informed consent • It can hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit • Usually poorly-programmed and can cause a computer to become unbearably slow and unstable • Can reinstall themselves even after you think you have removed them 29 Bits, Bytes & Chips
  • 30. •Let’s Review. How to have a safe internet browsing experience • Keep your operating system current with the most recent updates. • Use a Firewall • Use an Anti-Virus program and keep it updated. • Use an Anti-Spyware program and keep it updated. • Use an Anti-Spam program and keep it updated. 30 Bits, Bytes & Chips
  • 31. •Where do I get the tools I need? • Many ISPs provide Anti-Virus with your subscription. BUT! It must be downloaded and installed. • You could use a free anti virus like AVGFree, but a paid license of an anti virus like Norton or Quick Heal is recommended, because, usually these include Anti-Spyware and Anti-Malware tools also. 31 Bits, Bytes & Chips
  • 32. •Where do I get the tools I need? (continued) • Many companies offer Anti-Phishing capabilities either as a part of their email UI or as a part of their browsers. • Firewalls are often a feature of Anti-virus programs but if not, turn on the Windows Firewall built into XP and above editions. • And finally, the most powerful protection available! 32 Bits, Bytes & Chips
  • 33. •Where do I get the tools I need? (continued) • Common Sense. • If the program is FREE, read the Licence Agreement of the software. • Do not respond to bogus Emails • Do not click on links in Emails to other sites • Passwords, Passwords, Passwords • Watch for encryption signals. Padlocks and Certificates. 33 Bits, Bytes & Chips

Hinweis der Redaktion

  1. In this section, we will discuss how can we protect ourselves from Internet Fraud. Please pay attention if you don’t want to be a victim.
  2. A firewall maybe a software or hardware or a combination of both. It is essentially a system that keeps viruses and unsolicited connections away from your machine. The best explain I can give to you people is Cyber Roam, the firewall our college uses. It is a combination of hardware and software, and as we know blocks sites which might be harmful for the machines or eat up a lot of bandwidth.
  3. A firewall allows trusted connections, blocks dubious connections and prompts about the ones its not sure about. Even a firewall should be updated frequently.
  4. Your anti virus should be updated as soon as the publisher releases new virus definitions, merely installing an anti virus doesn’t matter because new viruses are released every second.On the screen you can see some indicators your system has been affected by a virus. In such a position, get your system fixed by a technician asap.
  5. Spyware is a piece of software that sits on your machine and steals your personal data. Use a software that fights spyware and keep it updated, usually anti spyware tools are a part of the anti virus package.
  6. Someone may hack your social networking account and use your network to market dubious products. There have been cases of images of people used for pornography and such.
  7. Last but not the least, you should use common sense. Beware of free downloads, don’t respond to dubious emails or click links provided in the same. Use strong passwords and do not share them, even with your boyfriends and girlfriends. Watch for encryption signals. Padlocks and Certificates like the lock and security certificate icons in your browser.