SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. 
Shahdag, 29 November 2014 Assoc.Prof. Abzetdin ADAMOV Chair of Computer Engineering Department IEEE Computer Society Azerbaijan Chapter aadamov@qu.edu.az www.ce.qu.edu.az/~aadamov
Content 
•Malicious Code Types 
•The Impact of Cybercrime 
•Cybercrime as a Service (CaaS) 
•Top Ten Threads for 2014 
•New Urgency to Improve Networks Security 
•Protect Yourself and your Private Information 
•How Your Privacy can be Compromised? 
•Maintaining Your Privacy 
•Kids' Online Safety 
•ATM Oriented Scams and Protection
Just Imagine!!! 
•10 years ago Skype, Facebook, YouTube, Twitter, Dropbox, and Instagram didn't exist. 
•20 years ago there were only 130 websites total, Google wasn't even around yet, and you had to pay for an email account through an ISP. 
•30 years ago there was no Internet. What has Internet Brought to Us?
Malicious Code Types 
•Viruses - This type of malicious code requires you to actually do something before it infects your computer. 
•Worms - Worms propagate without you r doing anything. They typically start by exploiting a software vulnerability 
•Trojan Horses - A Trojan horse program is software that claims to do one thing while, in fact, doing something different behind the scenes. 
•Spyware - Spyware sends information about what you're doing on the Internet to a third-party
Malicious Code Types 
Spyware 
Trojan Horses
Cyber Warfare
Cost of Cybercrime in five countries 
range of $1.4 - $46 million
Types of cyber attacks
Everything as a Service 
•Infrastructure as a Service (IaaS) 
•Platform as a Service (PaaS) 
•Software as a Service (SaaS) 
•Network as a Service (NaaS) 
•Cybercrime as a Service (CaaS)
Why they doing this? 
•DDoS attacks cost just $10 per hour; 
•For Spamming $10 to spam a million e-mail addresses; 
•Malware against antivirus software $30 per month; 
•A Trojan can costs from $8 to thousands; 
•SMS fraud services about $150 to spam 10,000 people; 
•Hacking email account (Gmail, Yandex, …) from $45 
Paid services offered by hackers:
Cyber Security Aspects 
•Information Security; 
•Network Security; 
•System Security; 
•Application Security; 
•Operating System Security; 
•Database Security; 
•Language Security.
Top Ten Threads for 2014 
1.Injection 
2.Broken Authentication and Session Management 
3.Cross-Site Scripting (XSS) 
4.Insecure Direct Object References 
5.Security Misconfiguration 
6.Sensitive Data Exposure 
7.Missing Function Level Access Control 
8.Cross-Site Request Forgery (CSRF) 
9.Using Components with Known Vulnerabilities 
10.Unvalidated Redirects and Forwards 
According to OWASP (Open Web Application Security Project)
Total Security
New Urgency to Improve Networks Security 
•In place effective security on all networks 
•Authorized users with excellent cyber hygiene techniques 
•CIO’s, Network Administrators, Operations Center Directors, other IT Professionals with latest knowledge, skills 
•Goal: future generation users with innate cyber security skills: 
–Safe in a connected environment as second nature 
–Ready access to latest information and updates 
–Cyber security format that becomes the default use case 
•Public-Private partnership in information sharing, response actions with privacy respected 
•Leaders and Managers across all enterprises with cyber vulnerability awareness knowledge
USA Experience 
•National Cyber Security Awareness Month (NCSAM) - October 
•Data Privacy Day (DPD) - Data Privacy Day is held on January 28th every year. 
•National Cyber Security Education Council (NCEC) 
•Cyber Security For National Security (CS4NS) www.cs4ns.com 
•Job fairs for Security-Cleared professionals www.techexpousa.com
USA Experience
Protect Yourself and your Private Information
How Your Privacy can be Compromised? 
•Not using a secure email or webmail account. 
•Using a work email account for personal email 
•Website interactions can be monitored 
•Via phishing 
•Via vishing (short for 'voice phishing') 
•Using unsecured WiFi networks 
•Using unencrypted links for sensitive communications (VPN) 
•Not using secure websites when banking or paying online 
•Not using strong passwords
Use Secure Websites for Sensitive Information 
None Secure 
Secure
How Your Privacy can be Compromised? (Cont…) 
•Staying logged in to a website or email account 
•Via spyware and viruses 
•Via physical keystroke loggers 
•Not storing personal or financial documents securely 
•Not shredding unwanted personal or financial documents 
•Being taken into people’s confidence too easily
Ways of Getting Your Phone Number and eMail 
•You overshare your number 
•You accept Terms of Use without reading or understanding them 
•Big data has killed privacy 
•Technology can dial billions of random numbers 
•The credit bureaus give away your information 
•Charities take all the fun out of being philanthropic (get deeper access to your wallet just for $5)
Maintaining Your Privacy 
1.Use effective and updated antivirus/antispyware software 
2.In a public or work, check your computer physically 
3.Use secure websites when shopping or banking online 
4.Log out of secure websites when you have finished transaction 
5.Use strong passwords and change them regularly 
6.Avoid using a work email address for personal use 
7.Make sure your home/office WiFi network is secured 
8.Store personal and financial documents securely 
9.Be careful to whom you disclose personal information 
10.Where possible, avoid using your real name online 
11.Be offline, if not using Internet
Maintaining Your Privacy (Cont…) 
12.Be cautious about who is trying to befriend you online 
13.Use an anonymous webmail account for website registrations 
14.Keep your social network activity private 
15.Lie when setting up password security questions 
16.Only give out as much personal information as you need to 
17.Never install potentially unwanted programs (PUPs) or unknown programs 
18.Do not answer chain email even came from friends 
19.Make regular backups of critical data 
20.Set clear guidelines for children about information sharing 
21.Monitor your children’s online activity
Special Recommendations 
1.Don’t fill out your social media profile (don't complete) 
2.Turn on private browsing (Chrome - New Incognito Window, IE - InPrivate Prowsing) 
3.Lock down your hardware (require a password after sleep or boots up) 
4.Use passcode on mobile devices (also lock or wipe status)
What if Your Online Privacy is Compromised? 
•Contact your financial institution immediately 
•Close any accounts that may have been compromised 
•Inform your closest friends and coworkers 
•Watch for any unexplainable charges to your account 
•Report your situation to local police
Kids' Online Safety 
•Talk to your kids about bullying 
•Talk Early and Often 
•As soon as your child is using a computer, a cell phone 
•Types of Virtual Worlds - virtuality under control 
•Talk about private information 
•Too much gaming is not good 
•Teach to use computer purposely
ATM Oriented Scams 
•Attached card reader 
•Card blocking and "helpful" person 
•WiFi scanners and fake ATM machines 
•ATM is out of order - manual Cash deposits 
•Stealing an entire ATM - easiest way
Protect Yourself at ATM 
•Cover your password with your hand 
•Use familiar ATMs and limit your visits 
•Check bank balances frequently 
•Observe the ATM 
•Prefer to use chip-and-PIN cards
SECURITY IDEA 
The Internet is a shared resource and securing it is Our Shared Responsibility.
Thank you… www.ce.qu.edu.az/~aadamov

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in EducationTyrone Grandison
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 

Was ist angesagt? (20)

Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber crime
cyber crimecyber crime
cyber crime
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 

Ähnlich wie Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene.

Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 

Ähnlich wie Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. (20)

Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Mehr von Abzetdin Adamov

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Understanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningUnderstanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningAbzetdin Adamov
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...Abzetdin Adamov
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Introduction to object oriented programming
Introduction to object oriented programmingIntroduction to object oriented programming
Introduction to object oriented programmingAbzetdin Adamov
 
Qafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemQafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemAbzetdin Adamov
 
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuÜniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuAbzetdin Adamov
 
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...Abzetdin Adamov
 
e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...Abzetdin Adamov
 
The Truth about Cloud Computing as new Paradigm in IT
The Truth about Cloud Computing  as new Paradigm in ITThe Truth about Cloud Computing  as new Paradigm in IT
The Truth about Cloud Computing as new Paradigm in ITAbzetdin Adamov
 
The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...Abzetdin Adamov
 
University Management Information System
University Management Information SystemUniversity Management Information System
University Management Information SystemAbzetdin Adamov
 

Mehr von Abzetdin Adamov (17)

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Understanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningUnderstanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine Learning
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Introduction to object oriented programming
Introduction to object oriented programmingIntroduction to object oriented programming
Introduction to object oriented programming
 
Introduction to AJAX
Introduction to AJAXIntroduction to AJAX
Introduction to AJAX
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
Qafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemQafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-system
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuÜniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
 
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
 
e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...
 
The Truth about Cloud Computing as new Paradigm in IT
The Truth about Cloud Computing  as new Paradigm in ITThe Truth about Cloud Computing  as new Paradigm in IT
The Truth about Cloud Computing as new Paradigm in IT
 
The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...
 
University Management Information System
University Management Information SystemUniversity Management Information System
University Management Information System
 

Kürzlich hochgeladen

BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedDelhi Call girls
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxraffaeleoman
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Pooja Nehwal
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfSenaatti-kiinteistöt
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCamilleBoulbin1
 

Kürzlich hochgeladen (20)

BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 

Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene.

  • 1. Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. Shahdag, 29 November 2014 Assoc.Prof. Abzetdin ADAMOV Chair of Computer Engineering Department IEEE Computer Society Azerbaijan Chapter aadamov@qu.edu.az www.ce.qu.edu.az/~aadamov
  • 2. Content •Malicious Code Types •The Impact of Cybercrime •Cybercrime as a Service (CaaS) •Top Ten Threads for 2014 •New Urgency to Improve Networks Security •Protect Yourself and your Private Information •How Your Privacy can be Compromised? •Maintaining Your Privacy •Kids' Online Safety •ATM Oriented Scams and Protection
  • 3. Just Imagine!!! •10 years ago Skype, Facebook, YouTube, Twitter, Dropbox, and Instagram didn't exist. •20 years ago there were only 130 websites total, Google wasn't even around yet, and you had to pay for an email account through an ISP. •30 years ago there was no Internet. What has Internet Brought to Us?
  • 4. Malicious Code Types •Viruses - This type of malicious code requires you to actually do something before it infects your computer. •Worms - Worms propagate without you r doing anything. They typically start by exploiting a software vulnerability •Trojan Horses - A Trojan horse program is software that claims to do one thing while, in fact, doing something different behind the scenes. •Spyware - Spyware sends information about what you're doing on the Internet to a third-party
  • 5. Malicious Code Types Spyware Trojan Horses
  • 7. Cost of Cybercrime in five countries range of $1.4 - $46 million
  • 8. Types of cyber attacks
  • 9. Everything as a Service •Infrastructure as a Service (IaaS) •Platform as a Service (PaaS) •Software as a Service (SaaS) •Network as a Service (NaaS) •Cybercrime as a Service (CaaS)
  • 10. Why they doing this? •DDoS attacks cost just $10 per hour; •For Spamming $10 to spam a million e-mail addresses; •Malware against antivirus software $30 per month; •A Trojan can costs from $8 to thousands; •SMS fraud services about $150 to spam 10,000 people; •Hacking email account (Gmail, Yandex, …) from $45 Paid services offered by hackers:
  • 11. Cyber Security Aspects •Information Security; •Network Security; •System Security; •Application Security; •Operating System Security; •Database Security; •Language Security.
  • 12. Top Ten Threads for 2014 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards According to OWASP (Open Web Application Security Project)
  • 14. New Urgency to Improve Networks Security •In place effective security on all networks •Authorized users with excellent cyber hygiene techniques •CIO’s, Network Administrators, Operations Center Directors, other IT Professionals with latest knowledge, skills •Goal: future generation users with innate cyber security skills: –Safe in a connected environment as second nature –Ready access to latest information and updates –Cyber security format that becomes the default use case •Public-Private partnership in information sharing, response actions with privacy respected •Leaders and Managers across all enterprises with cyber vulnerability awareness knowledge
  • 15. USA Experience •National Cyber Security Awareness Month (NCSAM) - October •Data Privacy Day (DPD) - Data Privacy Day is held on January 28th every year. •National Cyber Security Education Council (NCEC) •Cyber Security For National Security (CS4NS) www.cs4ns.com •Job fairs for Security-Cleared professionals www.techexpousa.com
  • 17. Protect Yourself and your Private Information
  • 18. How Your Privacy can be Compromised? •Not using a secure email or webmail account. •Using a work email account for personal email •Website interactions can be monitored •Via phishing •Via vishing (short for 'voice phishing') •Using unsecured WiFi networks •Using unencrypted links for sensitive communications (VPN) •Not using secure websites when banking or paying online •Not using strong passwords
  • 19. Use Secure Websites for Sensitive Information None Secure Secure
  • 20. How Your Privacy can be Compromised? (Cont…) •Staying logged in to a website or email account •Via spyware and viruses •Via physical keystroke loggers •Not storing personal or financial documents securely •Not shredding unwanted personal or financial documents •Being taken into people’s confidence too easily
  • 21. Ways of Getting Your Phone Number and eMail •You overshare your number •You accept Terms of Use without reading or understanding them •Big data has killed privacy •Technology can dial billions of random numbers •The credit bureaus give away your information •Charities take all the fun out of being philanthropic (get deeper access to your wallet just for $5)
  • 22. Maintaining Your Privacy 1.Use effective and updated antivirus/antispyware software 2.In a public or work, check your computer physically 3.Use secure websites when shopping or banking online 4.Log out of secure websites when you have finished transaction 5.Use strong passwords and change them regularly 6.Avoid using a work email address for personal use 7.Make sure your home/office WiFi network is secured 8.Store personal and financial documents securely 9.Be careful to whom you disclose personal information 10.Where possible, avoid using your real name online 11.Be offline, if not using Internet
  • 23. Maintaining Your Privacy (Cont…) 12.Be cautious about who is trying to befriend you online 13.Use an anonymous webmail account for website registrations 14.Keep your social network activity private 15.Lie when setting up password security questions 16.Only give out as much personal information as you need to 17.Never install potentially unwanted programs (PUPs) or unknown programs 18.Do not answer chain email even came from friends 19.Make regular backups of critical data 20.Set clear guidelines for children about information sharing 21.Monitor your children’s online activity
  • 24. Special Recommendations 1.Don’t fill out your social media profile (don't complete) 2.Turn on private browsing (Chrome - New Incognito Window, IE - InPrivate Prowsing) 3.Lock down your hardware (require a password after sleep or boots up) 4.Use passcode on mobile devices (also lock or wipe status)
  • 25. What if Your Online Privacy is Compromised? •Contact your financial institution immediately •Close any accounts that may have been compromised •Inform your closest friends and coworkers •Watch for any unexplainable charges to your account •Report your situation to local police
  • 26. Kids' Online Safety •Talk to your kids about bullying •Talk Early and Often •As soon as your child is using a computer, a cell phone •Types of Virtual Worlds - virtuality under control •Talk about private information •Too much gaming is not good •Teach to use computer purposely
  • 27. ATM Oriented Scams •Attached card reader •Card blocking and "helpful" person •WiFi scanners and fake ATM machines •ATM is out of order - manual Cash deposits •Stealing an entire ATM - easiest way
  • 28. Protect Yourself at ATM •Cover your password with your hand •Use familiar ATMs and limit your visits •Check bank balances frequently •Observe the ATM •Prefer to use chip-and-PIN cards
  • 29. SECURITY IDEA The Internet is a shared resource and securing it is Our Shared Responsibility.