SlideShare ist ein Scribd-Unternehmen logo
1 von 33
What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must  have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around  57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
The Bottom Up Approach Secure  your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven What is a browser? Internet Explorer  “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience The next generation in desktop Web browsing  Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Please change that default SSID !!  Common/Default SSID can put your router at risk!  Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters)  I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall How to choose? Try the free demos and compare antivirus  Free antivirus scan/application are not always good  Google around for independent reviews  Read :  http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Must have features  On Demand scanner  Proactive detection  Anti Spyware/ tracking cookie detection  Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
Questions ? Presentation By : Tripad Mishra (me@Tripad.im)

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Internet security
Internet securityInternet security
Internet security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ähnlich wie Web Security

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of TechnologyAkash Mittal
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book ReviewTirtha Mal
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer securitySwati Bhonde
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?Jim Isaak
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Pratimesh Pathak
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 

Ähnlich wie Web Security (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Network security
Network securityNetwork security
Network security
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of Technology
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Network Security
Network SecurityNetwork Security
Network Security
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer security
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Web Security

  • 1. What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 2. What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
  • 3. A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
  • 4. IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
  • 5. IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
  • 6. IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
  • 7. IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
  • 8. Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
  • 9. Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around 57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 10. So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
  • 11. The Bottom Up Approach Secure your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
  • 12. Browser –your stairway to heaven What is a browser? Internet Explorer “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
  • 13. Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
  • 14. Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
  • 15. Opera– Experience The next generation in desktop Web browsing Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
  • 16. Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
  • 17. Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
  • 18. The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
  • 19. The Router(WiFi) Please change that default SSID !! Common/Default SSID can put your router at risk! Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
  • 20. The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters) I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
  • 21. Presentation By : Tripad Mishra (me@Tripad.im)
  • 22. The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
  • 23. Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
  • 24. Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
  • 25. Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
  • 26. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 27. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 28. Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
  • 29. Antivirus and Firewall How to choose? Try the free demos and compare antivirus Free antivirus scan/application are not always good Google around for independent reviews Read : http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
  • 30. Antivirus and Firewall Must have features On Demand scanner Proactive detection Anti Spyware/ tracking cookie detection Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
  • 31. Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
  • 32. Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
  • 33. Questions ? Presentation By : Tripad Mishra (me@Tripad.im)