SlideShare ist ein Scribd-Unternehmen logo
1 von 10
How to Protect Personal Information
Introduction
Motivation (ZeuS Trojan)
General Awareness
Cyber Awareness
References and further
readings

1
Introduction


Almost All personal affairs are now conducted
online.
Online shopping.
Job hunting.
Governments related official functions.
Social networking.
Distance Learning.
Flight, Hotel and cars reservation.
2
Motivation


Zeus (Trojan horse)
Steal confidential banking information
Customized through the toolkit.
Spread mainly by phishing.
In 2009, Zeus had compromised over 74,000
accounts on Bank of
America, NASA, Oracle,
Amazon.

3
General awareness (PII)


Personally Identifying Information
Social Security number
Credit card number
Debit card number
Bank account number
Driver’s license number
Passport number
First and last names and DOB
4
General awareness (Passwords)


How to choose a good password
At leas 8 Chars, Mix and contains symbols.
Don’t use any actual word.
Don’t use consecutive letters, adjacent keys.
Use pattern and change regularly e.g.
xxYYMYMYxx like xx201103xx
First letter: “Pay no attention to the man

behind the curtain,” becomes PnAttMBtC
5
Cyber Awareness (3 Easy Steps)
1) Operating systems
Turn on the automatic update.

1) Anti-virus software
Automatic scan regular basis.
Manual scan on email Att. And file download.

1) Firewalls
Help block many attacks from the outside.

6
Cyber Awareness (Phishing)







Well designed emails and web pages trying to
get your personal information.
Don't follow links from untrusted sources.
Never reply message that asks for sensitive
information.
Trusted institution will never
ask you for personal information.
7
Cyber Awareness (Social Network safety)


Never post personnel or sensitive information.



Review how much information you share in profile.



Apps and games provide strangers access to your
profile.



Deleted contents does NOT mean it is gone.



Take some time to read Privacy Policy and settings.

8
Cyber Awareness (Wireless Network)


Before you join a wireless network



What is an untrusted network?



What you should do to ensure security
Never save passwords in your browser
Check the URL of any site you visit.

9
References


Zeus Trojan

http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)


Virginia Tech IT Security Office

http://www.security.vt.edu/


More About Passwords

http://www.cs.umd.edu/faq/Passwords.shtml


This Presentation Online URL

http://www.slideshare.net/hosamshahin/protect-personal-information-27707669

10

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (19)

Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Hacker !
Hacker !Hacker !
Hacker !
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Seminar
SeminarSeminar
Seminar
 
Salami attack
Salami attackSalami attack
Salami attack
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Ame Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshopAme Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshop
 
Hackers 22
Hackers 22Hackers 22
Hackers 22
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 

Ähnlich wie Best Practices to Protect Personal Information

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
Travis Good
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 

Ähnlich wie Best Practices to Protect Personal Information (20)

Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Its presentation
Its presentationIts presentation
Its presentation
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's Business
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 

Kürzlich hochgeladen

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Kürzlich hochgeladen (20)

HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptxHVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
HVAC System | Audit of HVAC System | Audit and regulatory Comploance.pptx
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 

Best Practices to Protect Personal Information

  • 1. How to Protect Personal Information Introduction Motivation (ZeuS Trojan) General Awareness Cyber Awareness References and further readings 1
  • 2. Introduction  Almost All personal affairs are now conducted online. Online shopping. Job hunting. Governments related official functions. Social networking. Distance Learning. Flight, Hotel and cars reservation. 2
  • 3. Motivation  Zeus (Trojan horse) Steal confidential banking information Customized through the toolkit. Spread mainly by phishing. In 2009, Zeus had compromised over 74,000 accounts on Bank of America, NASA, Oracle, Amazon. 3
  • 4. General awareness (PII)  Personally Identifying Information Social Security number Credit card number Debit card number Bank account number Driver’s license number Passport number First and last names and DOB 4
  • 5. General awareness (Passwords)  How to choose a good password At leas 8 Chars, Mix and contains symbols. Don’t use any actual word. Don’t use consecutive letters, adjacent keys. Use pattern and change regularly e.g. xxYYMYMYxx like xx201103xx First letter: “Pay no attention to the man behind the curtain,” becomes PnAttMBtC 5
  • 6. Cyber Awareness (3 Easy Steps) 1) Operating systems Turn on the automatic update. 1) Anti-virus software Automatic scan regular basis. Manual scan on email Att. And file download. 1) Firewalls Help block many attacks from the outside. 6
  • 7. Cyber Awareness (Phishing)     Well designed emails and web pages trying to get your personal information. Don't follow links from untrusted sources. Never reply message that asks for sensitive information. Trusted institution will never ask you for personal information. 7
  • 8. Cyber Awareness (Social Network safety)  Never post personnel or sensitive information.  Review how much information you share in profile.  Apps and games provide strangers access to your profile.  Deleted contents does NOT mean it is gone.  Take some time to read Privacy Policy and settings. 8
  • 9. Cyber Awareness (Wireless Network)  Before you join a wireless network  What is an untrusted network?  What you should do to ensure security Never save passwords in your browser Check the URL of any site you visit. 9
  • 10. References  Zeus Trojan http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)  Virginia Tech IT Security Office http://www.security.vt.edu/  More About Passwords http://www.cs.umd.edu/faq/Passwords.shtml  This Presentation Online URL http://www.slideshare.net/hosamshahin/protect-personal-information-27707669 10

Hinweis der Redaktion

  1. {}