STAY SAFE ONLINE GUIDE TO CYBERSECURITY

uu232003 36 views 23 slides Aug 09, 2024
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

Cyber security awarenese


Slide Content

Stay Safe Online: A Guide to Cybersecurity Awareness Prepared By: Gowrishanakr T O Intern at Center for Cyber Security Studies & Research

Disclaimer This presentation is for educational purposes only . Any demonstrations, including those involving hacking techniques, are intended solely to illustrate why it is crucial to practice safe cybersecurity habits. Do not attempt any hacking or unauthorized activities without explicit permission. Engaging in illegal activities will result in consequences for which you will be solely responsible. Always follow legal and ethical guidelines in all your cybersecurity practices.

Agenda Importance of Cybersecurity Common Threats Best Practices for Staying Safe What to Do if You're Compromised IT Acts Q&A

Why Cybersecurity is Important Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks . Protection of Personal Information Maintaining Privacy Financial Security Preventing Identity Theft

Common Cyber Threats 04 02 01 03 Password Attacks Brute force, dictionary attacks, credential stuffing Phishing Deceptive emails/messages to steal personal info Malware Viruses, ransomware, spyware Social Engineering malicious activities accomplished through human interactions

Password Security Best Practices: Use complex passwords (mix of letters, numbers, symbols) Avoid using the same password for multiple accounts Enable two-factor authentication (2FA) Change passwords regularly

Phishing “Phishing” refers to an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information. By masquerading as a reputable source with an enticing request, an attacker lures in the victim in order to trick them, similarly to how a fisherman uses bait to catch a fish How to Identify: Check the sender's email address Look for grammatical errors Be cautious of urgent or threatening language

↓ ↓

PhishTank PhishTank is an anti-phishing site.

Malware Malware attacks  are any type of malicious software designed to cause harm or damage to a computer, server, client or computer network and/or infrastructure without end-user knowledge Types and Effects: Viruses: Damage or alter files. Ransomware: Locks files until a ransom is paid. Spyware: Monitors and steals information. Prevention: Keep software updated Use antivirus programs Avoid downloading from untrusted sources

Social Engineering Social engineering is the term used for a broad range of  malicious activities accomplished through human interactions . It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Tactics : Pretexting: Pretending to be someone else to gain information. Baiting: Offering something enticing to get information. Tailgating: Following someone into a restricted area. Quid Pro Quo: Offering a service for information. Defense: Verify identities Be skeptical of unsolicited requests

Secure Your Devices Tips: Lock your devices with strong passwords or biometrics Keep your operating system and apps updated Install antivirus software Backup important data regularly

Safe Internet Habits Browsing: Use secure websites (https://) Be cautious with downloads and links Social Media: Adjust privacy settings Be mindful of what you share Email: Don’t open attachments from unknown senders Verify the legitimacy of requests for sensitive information

What to Do if You're Compromised Immediate Steps: Change your passwords Update your security settings Run a virus scan on your devices

Reporting a Cyber Crime In India Cyber Crime Helpline is 1930 National cyber crime Reporting POrtal https ://cybercrime.gov.in/

Some Major cyber law or IT acts in India Information Technology Act, 2000 (IT Act ) Section 43: Penalty for damage to computer, computer system, etc. This includes unauthorized access and data theft. Section 66: Hacking with a computer system. Punishable by imprisonment up to 3 years or a fine up to Rs 5 lakh, or both. Section 66B: Punishment for dishonestly receiving stolen computer resources or communication devices. Imprisonment up to 3 years or a fine up to Rs 1 lakh, or both. Section 66C: Punishment for identity theft. Imprisonment up to 3 years and/or a fine up to Rs 1 lakh .

Section 66D: Punishment for cheating by personation by using computer resources. Imprisonment up to 3 years and/or a fine up to Rs 1 lakh. Section 66E: Punishment for violation of privacy. Imprisonment up to 3 years or a fine up to Rs 2 lakh, or both. Section 67: Punishment for publishing or transmitting obscene material in electronic form. Imprisonment up to 5 years and a fine up to Rs 10 lakh.

Thank You Any questions
Tags