Cyber_ppt_part5

advertisement
WhatsApp – Tweaking
Security -The new face of Information
Technology Services
1
Security -The new face of Information
Technology Services
2
ATM Frauds
Security -The new face of Information
Technology Services
3
ATM Frauds
Security -The new face of Information
Technology Services
4
ATM Card Safety
• Always use the same ATM as far as possible
• Most ATM keyboards and card slots are set within the
body and are not projecting above the base. Check to
be sure
• When entering your PIN number, cover it using your
hand
• Always follow your card at restaurants and fuel refilling
stations
Security -The new face of Information
Technology Services
5
Wireless Network Threats
accidental
association
malicious
association
ad hoc
networks
nontraditional
networks
identity theft
(MAC
spoofing)
man-in-the
middle attacks
denial of
service (DoS)
network
injection
6
Not only terrorism, what else
Connected to open network?
– Attacker can read your mails
– Attacker can see your password (even gmail)
– Attacker can see your credit card numbers
– Attacker can access confidential information on
your computer
– Attacker can chat with your girlfriend posing as
you.
7
Wireless Security Techniques
use encryption
allow only specific
computers to
access your
wireless network
use anti-virus and
anti-spyware
software and a
firewall
change your
router’s pre-set
password for
administration
turn off identifier
broadcasting
change the
identifier on your
router from the
default
8
Further Advised
• Change the router login password frequently
• Change the wireless WPA password frequently
• Avoid temptation to connect to open wireless just looking for free
internet.
• We can configure DHCP more tightly.
Example
I have 3 machines at home, I’ll create a IP pool of 3 IPs only
I’ll do DHCP reservation using the MAC of these 3 IP
Effectively I’m not allowing any outsider machine to connect
• We can configure MAC binding.
Allow only MY machines to connect
Many access points support MAC binding
Any other machine will not be able to connect to my Wi-Fi
9
Other Cyber Crimes
CYBER CRIME
ACTION AGAINST THE CRIME
CYBER STALKING
Cyber stalking is a criminal offense with
penalties against the assailant, including jail.
CRIMES INVOLVING MONEY
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.
CYBER PORNOGRAPHY
imprisonment of either description for a term which may
extend to two three years and with fine which may extend to
five lakh rupees.
CHILD PORNOGRAPHY
imprisonment of either description for a term which may
extend to five years and also with fine which may extend
to ten lakh rupees.
Cyber Bullying is one type of "Unauthorized use" or
CYBER BULLYING, ONLINE GAMBLING, EMAIL "Unauthorized access to the facilities". This is "hacking"
SPOOFING
under Section 66 of ITA 2008 and also liable for
compensation under Section 43 of ITA 2008.
imprisonment for a term which may extend to three years and
IDENTITY THEFT, INTELLECTUAL PROPERTY
shall also be liable to fine which may extend to rupees Ten
CRIMES, DENIAL OF SERVICE ATTACK.
lakh.
10
What You Can Do
• Avoid leaving your laptop unsupervised
• Set up a user account and password to prevent unauthorized
access to your computer files.
• Know what you can share.
• Learn about reporting options
• Learn and set your privacy settings
• Block Cyberbullies
• Save the Evidence
• Create strong passwords
• Set up new Accounts
• Talk to your elders.
• Choose your friends wisely
• Find out consequences for inappropriate posts.
• Use appropriate usernames
• Be careful while posting comments, pictures and videos.
• Scan your computer for virus/ missing OS files from time to time
11
Dos
• Secure your passwords:
» Use a different password for each account
» Use a mix of Upper Case, Lower Case and special characters
• Signing in and out
• Use secure networks ( HTTPS )
• Keep your device clean
• Do tell your parents immediately if you have encountered any
problem while using the internet or if you have engaged in an
uncomfortable situation.
• Protect your digital footprint: don’t put anything online that you
wouldn’t want all your friends, family, teachers and future employers
to see.
• Treat others online the way you’d like to be treated.
Security -The new face of Information
Technology Services
12
•
Don’t
Posting your personal profile on the web. This may be used by online
predators against you
• Don’t give your real identity to anyone you meet online. This includes your
real name, address, school information, e-mail address, password, and bank
account information.
• Don’t reply to or start a conversation with people you don’t know. Don’t
accept gift offerings from them.
• Don’t fill out any survey, membership, or application forms asking for your
personal information
• Don’t disable any security settings your parents have set such as antivirus,
firewall, filtering,
• Don’t download any files that are given to you by people you’ve met online.
Don’t download any files from your e-mail unless they are solicited.
Security -The new face of Information
Technology Services
13
QUESTIONS
For more information about cyber-safety at UC
Davis, visit http://security.ucdavis.edu.
For answers to questions about this tutorial,
contact sgandhi@gmeil.com
For help implementing a cyber-safety measure
on your work/school computer, contact IT
Express at 0657289938787
14
Thank You
Security -The new face of Information
Technology Services
16
Download