SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Dos & Don'ts Of
Internet Security
Topics of Discussion:
• Most Popular OnlineActivities
• Who isWatchingYou Online
• Types Of OnlineThreats & HowTo Stay Safe FromThem
• Basic SecurityTips For Internet Hygiene
• How Quick Heal HelpsYou Stay Safe
Social NetworkingSearch EnginesE-Mails
Online Media
Consumption
Online BankingOnline Shopping
Most Popular Online Activities
• Scammers
• Hackers &Wannabe's
• Phishers
• Insiders
• Advertising Professionals
• Recruiters
Who isWatchingYou Online?
Types Of OnlineThreats
• Hacking
• Phishing
• Spyware
• Viruses,Worms &Trojans
• Adware
• Spams
• Freak Attacks -The Latest One
OnlineThreat:
Hacking
What is Hacking?
• Hacking is the act of gaining unauthorized
access to a system or the data within a
system.
• Information is extracted involuntarily
through sophisticated electronic methods
in a hacking attack.
• Hackers often use the information for
financial gains or spread of malicious viruses.
Photo credit: devdsp / Foter / CC BY
https://www.flickr.com/photos/devdsp/6999839463/
HowTo Avoid Getting Hacked
• Always use a Sophisticated Security
Software.
• Use a Personal Firewall which makes your
computer invisible to hackers.
• Make sure your security software, OS &
other software are up-to-date.
• Run frequent virus scans on your computer.
Photo credit: Danny Oosterveer / Foter / CC BY-ND
https://www.flickr.com/photos/dannyoosterveer/7913182734/
OnlineThreat :
Phishing
What Is Phishing?
What is Phishing?
• Phishing is a criminal activity that uses social
engineering techniques to steal user information.
• Phishers refers to scammers who fraudulently acquire
sensitive information such as passwords, personal
information, credit card/financial details, etc., by
masquerading as a trustworthy person or business.
• Phishing is usually carried out via emails, and also via
SMSs andVoice over IP (VoIP) calls.
Types Of Phishing
• Spear phishing
• Clone phishing
• Whaling
• Voice Phishing
• SMShing
ATypical Phishing Attempt
HowTo Stay Safe From Phishing
• Do not click any links in emails that pose to
be from your bank seeking for critical
information.
• Access your bank’s website by manually
typing its URL in the address bar.
• While giving away personal or financial
information on any website, check if its URL
begins with ‘https’.Also look for the lock
icon, which indicates that the connection is
secure.
• Never respond to SMSs or calls from
unknown numbers, especially when they
ask for your personal or financial
information.
OnlineThreat:
Spyware
What is a Spyware?
• Spyware is a software that gathers
information about a person or organization
without their knowledge or asserts control
over a computer without the consumer's
knowledge.
• Spyware often collects valuable data such
as passwords, software keys, etc.
How Does A Spyware Spread?
• A spyware usually gets installed without the
user’s knowledge, or by using deceptive
tactics.
• When the user accesses a web page
controlled by the spyware author, the page
forces the installation of the spyware.
• A spyware also gets installed when a user
installs a piece of free software.
Source : Wikipedia
Keylogger - ATypical Spyware
• A keylogger is a spyware that has the
capability to record use keystroke.
• Every password, every text you type
using your keyboard gets exposed to
the third party.
Photo credit: Robbert van der Steeg / Foter / CC BY-SA
https://www.flickr.com/photos/robbie73/4853086176/
HowTo Stay Safe From Spyware
• Make sure you have an antivirus with
spyware protection installed on your
computer.
• Regularly update your antivirus.
• Make use ofVirtualWeb Based
Keyboards provided on your banking
portals while making any financial
transactions.
• Keywords Provided By OS are not
very effective against keyloggers.
OnlineThreat :
Viruses,Worms &
Trojans
What areVirus,Worms &Trojans?
• Virus :Virus is a program that replicates. It spreads
from file to file on your system infecting them.
• Worm : A worm is a standalone program that
doesn’t require user intervention to spread.Worms
don’t infect existing files – they spread copies of
themselves instead.
• Trojan :Trojan horses pose as useful software, such
as a legitimate program, but are designed to perform
malicious activities.
HowTo Stay Safe FromVirus,Worms
&Trojans
• Regularly update your Antivirus Software.
• Always Keep theVirus Protection ON.
• Run weekly virus scans on your computer.
• Always scan external devices before use.
• Never download a file from an unverified source
or sender.This includes e-mail attachments
coming from unknown senders.
Photo credit: Yuri Yu. Samoilov / Foter / CC BY
Original image URL: https://www.flickr.com/photos/110751683@N02/15462325023/
OnlineThreat:
Adware
What Is An Adware?
• Adware is short for 'Advertising related
software'
• Adware is a software that automatically
displays or downloads advertising
material such as banners or pop-ups
when a user is online
HowTo Stay Safe From Adware?
• Do not download unnecessary software from the
Internet.
• If a download screen appears when you are not
trying to download anything, do not proceed.
• Avoid clicking on the advertisement pop-ups
which give something for free.
• Enable the pop-up blocker in your web browser.
Photo credit: perspec_photo88 / Foter / CC BY-SA
https://www.flickr.com/photos/111692634@N04/11407095883/
OnlineThreat:
Spam
What is Spam?
• Spam refers to unsolicited messages
sent over the Internet to a large
numbers of users.
• Often used for promotional use or to
spread malicious software.
• Clogs up the email server bandwidth &
makes the network slow for everyone.
Photo credit: comedy_nose / Foter / CC
BYhttps://www.flickr.com/photos/comedynose/4236355151/
Common Internet ScamsThrough
Spam E-Mails
• StrandedTraveler Scam
•Work from Home Scam
• Nigerian Scam
• Email Lottery Scam
• Astrology/Psychic Scam
HowTo Avoid Spam?
• Make use of the e-mail security feature in
your security product.
• Report unwanted or unsolicited emails as
spam.
• Delete spam emails.
• Never publish your email address on public
platforms.
• Never respond back to or unsubscribe to
spam emails
• Register only with email subscribers who
provide spam filters such as Gmail,Yahoo,
etc.
buggolo / Foter / CC BY
https://www.flickr.com/photos/buggolo/311134262/
OnlineThreat:
Freak Attack
What Is a Freak Attack?
• Freak attack enables malicious parties to
intercept web browsers and crack them
over a few hours.
• Right now the FREAK vulnerability primarily
affects Android and Apple Safari web
browsers.
• The attackers can steal confidential
passwords and other sensitive data.
Security Against Freak Attack -Way
Ahead
Basic SecurityTips For Internet
Hygiene
• Create long, unique, and hard-to-guess passwords. Never keep the same password for
different online accounts.
• Keep your computer’s antivirus protection & Firewall ON.
• Avoid public networks for accessing websites that require you to sign in to access any
information.
• Always update your Antivirus Software, OS, Internet browsers and software on your computer.
• Install software & apps only from trusted and official sources.
• Never download attachments from unknown senders
• Do not click on any links in emails to access your bank’s website.
• Access your bank’s website by manually typing its URL in the address bar.
How Can Quick Heal Help
Thank YouCorporateCommunications@quickheal.co.in
Follow us on:
Facebook -www.facebook.com/quickhealav
Twitter -www.twitter.com/quickheal
YouTube - www.youtube.com/quickheal
SlideShare - http://www.slideshare.net/QuickHealPPTs
Website -www.quickheal.com
Official Blog -www.blogs.quickheal.com
References
•http://en.wikipedia.org/
•http://blog.varonis.com/whats-difference-hacking-phishing/
•http://blogs.quickheal.com/wp/freak-image/
•http://blogs.quickheal.com/wp/50-dos-and-donts-of-internet-security-for-the-year-2015/

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security
Cyber securityCyber security
Cyber securityabithajayavel
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDmitriy Scherbina
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityAnkit Ranjan
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securitySamsil Arefin
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 

Was ist angesagt? (20)

MALWARE
MALWAREMALWARE
MALWARE
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 

Andere mochten auch

Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Web 2.0 Quiz
Web 2.0 QuizWeb 2.0 Quiz
Web 2.0 QuizVicky Casson
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSCamille Hazellie
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 

Andere mochten auch (10)

Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Web 2.0 Quiz
Web 2.0 QuizWeb 2.0 Quiz
Web 2.0 Quiz
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Ähnlich wie Dos and Don'ts of Internet Security

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimesACCA Global
 
Malware part 1
Malware part 1Malware part 1
Malware part 1ShouaQureshi
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptxChSheraz3
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 

Ähnlich wie Dos and Don'ts of Internet Security (20)

Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Cyber security
Cyber security Cyber security
Cyber security
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Malware
MalwareMalware
Malware
 
Computer security
Computer securityComputer security
Computer security
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Mehr von Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionQuick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Quick Heal Technologies Ltd.
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Mehr von Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

KĂźrzlich hochgeladen

WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp KrisztiĂĄn
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 

KĂźrzlich hochgeladen (20)

WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 

Dos and Don'ts of Internet Security

  • 1. Dos & Don'ts Of Internet Security
  • 2. Topics of Discussion: • Most Popular OnlineActivities • Who isWatchingYou Online • Types Of OnlineThreats & HowTo Stay Safe FromThem • Basic SecurityTips For Internet Hygiene • How Quick Heal HelpsYou Stay Safe
  • 3. Social NetworkingSearch EnginesE-Mails Online Media Consumption Online BankingOnline Shopping Most Popular Online Activities
  • 4. • Scammers • Hackers &Wannabe's • Phishers • Insiders • Advertising Professionals • Recruiters Who isWatchingYou Online?
  • 5. Types Of OnlineThreats • Hacking • Phishing • Spyware • Viruses,Worms &Trojans • Adware • Spams • Freak Attacks -The Latest One
  • 7. What is Hacking? • Hacking is the act of gaining unauthorized access to a system or the data within a system. • Information is extracted involuntarily through sophisticated electronic methods in a hacking attack. • Hackers often use the information for financial gains or spread of malicious viruses. Photo credit: devdsp / Foter / CC BY https://www.flickr.com/photos/devdsp/6999839463/
  • 8. HowTo Avoid Getting Hacked • Always use a Sophisticated Security Software. • Use a Personal Firewall which makes your computer invisible to hackers. • Make sure your security software, OS & other software are up-to-date. • Run frequent virus scans on your computer. Photo credit: Danny Oosterveer / Foter / CC BY-ND https://www.flickr.com/photos/dannyoosterveer/7913182734/
  • 10. What Is Phishing? What is Phishing? • Phishing is a criminal activity that uses social engineering techniques to steal user information. • Phishers refers to scammers who fraudulently acquire sensitive information such as passwords, personal information, credit card/financial details, etc., by masquerading as a trustworthy person or business. • Phishing is usually carried out via emails, and also via SMSs andVoice over IP (VoIP) calls.
  • 11. Types Of Phishing • Spear phishing • Clone phishing • Whaling • Voice Phishing • SMShing
  • 13. HowTo Stay Safe From Phishing • Do not click any links in emails that pose to be from your bank seeking for critical information. • Access your bank’s website by manually typing its URL in the address bar. • While giving away personal or financial information on any website, check if its URL begins with ‘https’.Also look for the lock icon, which indicates that the connection is secure. • Never respond to SMSs or calls from unknown numbers, especially when they ask for your personal or financial information.
  • 15. What is a Spyware? • Spyware is a software that gathers information about a person or organization without their knowledge or asserts control over a computer without the consumer's knowledge. • Spyware often collects valuable data such as passwords, software keys, etc.
  • 16. How Does A Spyware Spread? • A spyware usually gets installed without the user’s knowledge, or by using deceptive tactics. • When the user accesses a web page controlled by the spyware author, the page forces the installation of the spyware. • A spyware also gets installed when a user installs a piece of free software. Source : Wikipedia
  • 17. Keylogger - ATypical Spyware • A keylogger is a spyware that has the capability to record use keystroke. • Every password, every text you type using your keyboard gets exposed to the third party. Photo credit: Robbert van der Steeg / Foter / CC BY-SA https://www.flickr.com/photos/robbie73/4853086176/
  • 18. HowTo Stay Safe From Spyware • Make sure you have an antivirus with spyware protection installed on your computer. • Regularly update your antivirus. • Make use ofVirtualWeb Based Keyboards provided on your banking portals while making any financial transactions. • Keywords Provided By OS are not very effective against keyloggers.
  • 20. What areVirus,Worms &Trojans? • Virus :Virus is a program that replicates. It spreads from file to file on your system infecting them. • Worm : A worm is a standalone program that doesn’t require user intervention to spread.Worms don’t infect existing files – they spread copies of themselves instead. • Trojan :Trojan horses pose as useful software, such as a legitimate program, but are designed to perform malicious activities.
  • 21. HowTo Stay Safe FromVirus,Worms &Trojans • Regularly update your Antivirus Software. • Always Keep theVirus Protection ON. • Run weekly virus scans on your computer. • Always scan external devices before use. • Never download a file from an unverified source or sender.This includes e-mail attachments coming from unknown senders. Photo credit: Yuri Yu. Samoilov / Foter / CC BY Original image URL: https://www.flickr.com/photos/110751683@N02/15462325023/
  • 23. What Is An Adware? • Adware is short for 'Advertising related software' • Adware is a software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
  • 24. HowTo Stay Safe From Adware? • Do not download unnecessary software from the Internet. • If a download screen appears when you are not trying to download anything, do not proceed. • Avoid clicking on the advertisement pop-ups which give something for free. • Enable the pop-up blocker in your web browser. Photo credit: perspec_photo88 / Foter / CC BY-SA https://www.flickr.com/photos/111692634@N04/11407095883/
  • 26. What is Spam? • Spam refers to unsolicited messages sent over the Internet to a large numbers of users. • Often used for promotional use or to spread malicious software. • Clogs up the email server bandwidth & makes the network slow for everyone. Photo credit: comedy_nose / Foter / CC BYhttps://www.flickr.com/photos/comedynose/4236355151/
  • 27. Common Internet ScamsThrough Spam E-Mails • StrandedTraveler Scam •Work from Home Scam • Nigerian Scam • Email Lottery Scam • Astrology/Psychic Scam
  • 28. HowTo Avoid Spam? • Make use of the e-mail security feature in your security product. • Report unwanted or unsolicited emails as spam. • Delete spam emails. • Never publish your email address on public platforms. • Never respond back to or unsubscribe to spam emails • Register only with email subscribers who provide spam filters such as Gmail,Yahoo, etc. buggolo / Foter / CC BY https://www.flickr.com/photos/buggolo/311134262/
  • 30. What Is a Freak Attack? • Freak attack enables malicious parties to intercept web browsers and crack them over a few hours. • Right now the FREAK vulnerability primarily affects Android and Apple Safari web browsers. • The attackers can steal confidential passwords and other sensitive data.
  • 31. Security Against Freak Attack -Way Ahead
  • 32. Basic SecurityTips For Internet Hygiene • Create long, unique, and hard-to-guess passwords. Never keep the same password for different online accounts. • Keep your computer’s antivirus protection & Firewall ON. • Avoid public networks for accessing websites that require you to sign in to access any information. • Always update your Antivirus Software, OS, Internet browsers and software on your computer. • Install software & apps only from trusted and official sources. • Never download attachments from unknown senders • Do not click on any links in emails to access your bank’s website. • Access your bank’s website by manually typing its URL in the address bar.
  • 33. How Can Quick Heal Help
  • 34. Thank YouCorporateCommunications@quickheal.co.in Follow us on: Facebook -www.facebook.com/quickhealav Twitter -www.twitter.com/quickheal YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Website -www.quickheal.com Official Blog -www.blogs.quickheal.com