Anzeige
Anzeige

Más contenido relacionado

Anzeige
Anzeige

Ict lec#9

  1. Ms.Ambreen Introduction to ICT Course Code: IT-311
  2. Date: 18-06-2020 LECTURE#09
  3. Ms.Ambreen Internet Security Staying safe online
  4. OutLine  Introduction.  Internet Security: What it is, and why we need it.  Hackers: Who is he, Classes, Hacking Phases.  Attacks exemples.  What should I do to be safe online ?  Conclusion 2
  5. Introduction:  While the internet offers enormous advantages and opportunities, it also presents various security risks.  It’s where we access our banking records, credit card statements, tax returns and other highly sensitive personal information.  Banks take extensive steps to protect the information transmitted andprocessed when banking online.  But with all the good things the Internet offers us, it also opens the door toserious, potentially devastating threats. 3
  6.  Generally, Internet security include browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol.  We must secure our computers with technology in the same way that we secure the doors to our offices  Security  We must act in ways that protect us against the risks and threats that come with Internet use  Safety Internet Security: What it is 4
  7. - Installed in your computer. - watches and records everything you do online. - leaving your passwords. - and other personal and sensitive information vulnerable Internet Security: Why you need it. -Identifies your computer -Where it is located Request Response carries with it unwanted hidden software 5
  8. Hackers: Who is a Hacker ? A hacker is an individual who uses computer. The term hacker may refer to anyone with. technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes 6
  9. Hackers Hacker Classes : Black Hats BLACK HATS BLACK HATS The term “black hat” originated from Western movies, where the bad guys wore black hats and the good guys wore white hats.[1] They try to inflict damage by compromising security systems, altering functions of websites and networks, or shutting down systems. They often do so to steal or gain access to passwords, financial information, and other personal data. A black-hat hacker is an individual who attempts to gain unauthorized entry into a system or network to exploit them for malicious reasons. The black-hat hacker does not have any permission or authority to compromise their targets. 7
  10. Hackers Hacker Classes : Grey Hats Grey Hats Grey Hats A grey hat hacker is someone who may violate ethical standards or principles, but without the malicious intent If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. grey hat hackers will look for vulnerabilities in a system without the owner's permission or knowledge. 8
  11. Hackers Hacker Classes : White Hats White Hats White Hats A white hat hacker is a computer security specialist white hat hackers have permission to employ them against the organization that has hired them. who breaks into protected systems and networks to test and asses their security. 9
  12. Attacks exemples. Phishing Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. 10
  13. Attacks exemples. Phishing 11
  14. What should I do to be safe online ?. 12
  15. What should I do to be safe online ?.  To protect your self  Keep you passwords private and create ones too strong that are hard to “crack”  If you have received an Email encounters, you may have been the target of a common scam called ‘phishing’. 13
  16. What should I do to be safe online ?.  To protect your self  Be wary of publishing any information that identifies you, such as your phone number, photos of your home, your address, date of birth or full name.  If you make purchases or do your banking online, make sure you protect your financial information  Use ‘https://’ 14
  17. What should I do to be safe online ?.  To protect your Computer Use Anti-virus Software: Anti-virus software can detect and destroy computer viruses before they cause damage Use Anti-spyware Software: Use anti-spyware software so unknown people cannot lurk on your computer and potentially steal your information 15
  18. Conclusion  Whenever using internet or an online financial system, ensure that your system is still under your control and not a spoofed puppet.  Protecting your self from internet threats.  Being aware of the dangers of the internet and taking the rightsteps to avoid them means you can enjoy the internet safely. 16
  19. Thank you !!! 17
Anzeige