SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Module
                                                            6




              Module 6
Secure Internet Access & Usage




      © 2010 – Foreground Security. All rights reserved
Module
                                                Module Objectives   6


• This module will familiarize you with
  the following:
  – Internet Security Issues
  – Identity Theft
  – File Sharing
  – Downloading Programs
  – Secure Internet Practices



          © 2010 – Foreground Security. All rights reserved
Secure Sites




© 2010 – Foreground Security. All rights reserved
SSL




© 2010 – Foreground Security. All rights reserved
Phishing & Identity Theft




© 2010 – Foreground Security. All rights reserved
Countermeasures




© 2010 – Foreground Security. All rights reserved
Content Filtering




© 2010 – Foreground Security. All rights reserved
Cookies




© 2010 – Foreground Security. All rights reserved
© 2010 – Foreground Security. All rights reserved
© 2010 – Foreground Security. All rights reserved
Security Settings




© 2010 – Foreground Security. All rights reserved
Downloading Files




© 2010 – Foreground Security. All rights reserved
Downloading
                                           Applications




© 2010 – Foreground Security. All rights reserved
Secure Email Clients




© 2010 – Foreground Security. All rights reserved
Secure Transport
                                             Protocols




© 2010 – Foreground Security. All rights reserved
Instant Messengers




© 2010 – Foreground Security. All rights reserved
File Sharing (P2P)




© 2010 – Foreground Security. All rights reserved
Portable Devices




© 2010 – Foreground Security. All rights reserved
Wireless Devices




© 2010 – Foreground Security. All rights reserved
USB Devices




© 2010 – Foreground Security. All rights reserved
Media Files




© 2010 – Foreground Security. All rights reserved
3rd Party Software




© 2010 – Foreground Security. All rights reserved
Demonstration


• Downloading a Program or Game
• P2P Security Issues




         © 2010 – Foreground Security. All rights reserved

Weitere ähnliche Inhalte

Ähnlich wie Module6 secure internet-b

Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTechWell
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForge
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForgeMobile Application Lifecycle with Jekins, Trello and CollabNet TeamForge
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForgeLuca Milanesio
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyBettShow
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerPeter Wood
 
Smoothwall presentation feb open day
Smoothwall presentation feb open daySmoothwall presentation feb open day
Smoothwall presentation feb open dayVictoria College
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT securityRon Pascuzzi
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile AppsDenim Group
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityVitor Domingos
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxRicardoAndino9
 
Power center 10.4 getting started .pdf
Power center 10.4 getting started   .pdfPower center 10.4 getting started   .pdf
Power center 10.4 getting started .pdfVenkiInnConfUsion
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standardsgiladpn
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityRobert Hurlbut
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTechWell
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Eric Vanderburg
 

Ähnlich wie Module6 secure internet-b (20)

Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 
Portfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coatPortfolio security, analytics and forensic blue coat
Portfolio security, analytics and forensic blue coat
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForge
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForgeMobile Application Lifecycle with Jekins, Trello and CollabNet TeamForge
Mobile Application Lifecycle with Jekins, Trello and CollabNet TeamForge
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
The Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a HackerThe Ultimate Defence - Think Like a Hacker
The Ultimate Defence - Think Like a Hacker
 
Smoothwall presentation feb open day
Smoothwall presentation feb open daySmoothwall presentation feb open day
Smoothwall presentation feb open day
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
FTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptxFTNT_Icon-Library-External-June-2022.pptx
FTNT_Icon-Library-External-June-2022.pptx
 
Power center 10.4 getting started .pdf
Power center 10.4 getting started   .pdfPower center 10.4 getting started   .pdf
Power center 10.4 getting started .pdf
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
IOS security
IOS securityIOS security
IOS security
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
Today's technology and you: Safe computing in a digital world - Eric Vanderbu...
 

Module6 secure internet-b