3. THE INTERNET
Desktop Computer
Owned by few people.
Telecom companies began serving internet thru their telephone lines.
Super Computers
Only owned by big companies and universities.
Smart Devices Owned by almost everyone. Each of devices are now capable of accessing the internet.
3
7. INTERNET OF THINGS
WHATIS THE PRICE?
Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks
In the article of
(2019), researchers
Khandelwal
from
Zimperium
security flaw
have discovered a
in M365 Folding
Electric Scooter by Xiaomi.
lock
Attackers
the scooter
can remotely
in the mid-traffic
and /or deploy
can full take
without
a malware that
control of the
the user
machine
knowledge.
Reference: Swati Khandelwal, The Hacker News
8. DEEP WEB
A huge part of
The Internet you
donât normally
See.
SURFACE WEB Anything that can
be search on
Google, Yahoo, etc.
The darker part of
Deep web that
contains Illegal
activities.
DARK WEB
Retrieved from:
https://blog.dashburst.com
/
9. Our Goal is providing order
The 3 key areasof Cyber Security that needs to be protected.
A
Availability
Information must be
accessible when and
where it is needed.
C
Confidentiality
Information must not be
exposed or accessed by
any unauthorized
individual.
I
Integrity
Information must be
consistent and
correct unless an
authorized change
was made.
10
10. 11
âą Being paranoid.
âą Thinking on the other side.
âą Continuous learning.
âą Providing awareness.
âą Practicing what you preach.
MINDSET
11. CYBERDEFENSING
<PHISHING>
A social engineering technique used by cybercriminals to fool computer users to disclose personal
information or installing a malware to your system. Usually in a form of website or emails with attachments.
Image taken from:Cloudfront.net
MASS-SCALE
PHISHING
Cyber criminalsuse
wide-rangeattacks
that arenât highly
targeted.
Image taken from:asstatic.com
WHALING
Same as spear
phish, butit
targets high
profileperson
such asCEOs,
CFOsetc.
Image takenfrom:yottaweb.net
SPEAR
PHISHING
Targets a specific
individual,
seekingunauthorized
access to sensitive
information.
17. 18
What y ou share can also be used
ag ainst y ou.
18. POSTING YOUR TANTRUMS
Hate post will not solve anything.
But it will have an impact your
personal image on cyber space and
real life.
CYBERDEFENSING
19
19. CHECK-IN AND LOCATION ON POST
Not only does your status information
tell somebody where you currently are, it
also tells them where you arenât. This
information can be just as dangerous in
the hands of criminals.
20
CYBERDEFENSING
20. PASSWORD SHARING
You donât need to share your
account password to your
partner. Relationships should
be trust- centric.
CYBERDEFENSING
20
21. PUTTING MIDDLE NAME
Your Motherâs maiden name is
being used as part of
verification on financial
institutions. This can be very
prone to identity theft.
CYBERDEFENSING
21
22. PUTTING MOBILE PHONES
Accounts can be searched thru mobile
number. A clear way of saying that
everyone you like or not can reach you
thru SMS.
CYBERDEFENSING
22
23. TREATING SOCIAL MEDIA AS A DIARY
The more information you provide, the higher
chance of you being victimized.
CYBERDEFENSING
23
24. CYBERDEFENSING
ofget the fesume, son. Let's just
take a look at what you have posted on
you-r fac.ebook instead.
Reference: http://careerandhumanresources.blogcommunity.com