DIGITAL CITIZENSHIP prepared by Piyush Gupta Class 8M
Virtual Private Network (VPN)
Virtual Private Network (VPN) VPNs are private data networks over public network – usually the Internet. VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners. VPNs use advanced encryption and ‘tunneling’ technology to establish secure, end-to-end private network connections over Internet.
A typical VPN
VPN Solutions Remote access VPNs e stablish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP) - VPN client – software, hardware as well as router, or firewall based solutions available. - Reduced cost of long distance access calls and internal equipment inventory
VPN Solutions Site-to-Site VPNs are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network. - Intranet VPNs provide full access to company’s network - Extranet VPNS provide business partners with limited access to a company’s network
VPN Technology Trusted VPNs – companies lease circuits from communication providers and use them in the same manner they use physical cables in a private LAN - Communication provider is ‘t rusted ’ for data integrity and security. - Used before Internet became universal
VPN Technology Secure VPNs use Internet as a corporate communication medium. Data is encrypted before sending, moved over to Internet, and then decrypted at the receiving end. - Encryption creates a security ‘tunnel’ that can’t be attacked - More desirable than Trusted VPNs
VPN Protocols IPSec – Internet standard protocol for tunneling. Encryption, and authentication. Layer2Tunneling Protocol (L2TP) – Provides a means for tunneling IP traffic in layer 2, encloses non-Internet protocols i.e. IPX, SNA, and AppleTalk inside IP envelope. Point-to-Point tunneling - proprietary Microsoft
Benefits of using VPN Lower costs – remote access costs have reduced by 80 percent while LAN-to-LAN connectivity costs is reduced by 20-40 percent. For companies just setting up their network VPN provides low-cost alternative to backbone equipment, in-house terminal equipment and access modems. Connectivity Improvements – VPN based links are easy and inexpensive ways to meet changing business demands.
PHISHING
INTRODUCTION Phishing is a form of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or other personal data.
EMAIL PHISHING Meaning: Email phishing involves fraudulent emails that appear to come from trusted sources, aiming to steal sensitive information like passwords or credit card details. How It Works: Deceptive Emails: Imitate legitimate organizations . Malicious Links/Attachments: Contain harmful links or files. Urgent Requests: Create a false sense of urgency.
SPEAR PHISHING Meaning: Spear phishing targets specific individuals with personalized attacks to steal sensitive information . How It Works : Targeted Approach: Attackers research their victims, using personal information to craft convincing messages Customized Content: Emails or messages are tailored to the victim's role, interests, or connections. Malicious Intent: The goal is to gain access to sensitive data or systems
WHALING Meaning: Whaling phishing is a type of spear phishing targeting high-profile individuals like executives or key decision-makers within an organization . How It Works High-Value Targets: Focuses on senior leaders or important figures. Sophisticated Attacks : Uses highly personalized and convincing message Critical Requests: Often involves requests for sensitive company data or financial transactions
VISHING (VOICE PHISHING) Meaning: Vishing is a type of phishing attack conducted over the phone, where attackers impersonate legitimate entities to steal personal or financial information. How It Works Phone Calls: Attackers call victims, pretending to be from trusted organizations like banks or government agencies . Deceptive Requests: They may ask for sensitive information, such as account numbers or Social Security numbers . Urgency or Authority: Often use a sense of urgency or authority to pressure the victim.
SMISHING Introduction : Smishing is a type of phishing attack conducted via text messages (SMS) to deceive recipients into revealing personal or financial information. How It Works: Text Messages: Attackers send fraudulent SMS messages pretending to be from legitimate organizations . Malicious Links or Requests: The message often contains a link to a fake website or asks for sensitive information. Urgency or Threats: Messages may create a sense of urgency or threaten consequences to prompt immediate action.
How To Prevent It Always verify the person who is on the other side and verify links as well as e-mails Do not share any private information to anyone online even if its your well wisher Contact to police as soon as possible when you are trapped into phishing