Sei sulla pagina 1di 34

Internet Security

How Safe Are You?


Type of Information Shared Not shared

1. First Name
2. Last Name
3. Middle Name
4. Current and previous school(s)
5. Your cellphone number
Type of Information Shared Not shared

6. The name of your mother and father


7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
Internet Safety
Web safety, or online safety or Internet Safety, is the knowledge of
maximizing the user's personal safety and security risks to private
information and property associated with using the internet, and the
self-protection from computer crime in general.
Cybersafety
is the safe and responsible use of information and communication
technology. It is about keeping information safe and secure, but
also about being responsible with that information, being respectful
of other people online, and using good 'netiquette' (internet
etiquette).
Dangers of sharing of uploading sensitive
information on the internet or social networks
How to Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity


theft issues will tell you the same thing: The first step to fighting
identity theft is to minimize the risk.
Identity theft, also known as identity fraud, is a crime in which an
imposter obtains key pieces of personally identifiable information,
such as Social Security or driver's license numbers, in order to
impersonate someone else.
Internet threats
Internet threats
Hacking
Malware
Virus
Worm
Trojan
Spyware
Spam
Phishing
Hacking
Computer hacking refers to the practice of modifying or altering
computer software and hardware to accomplish a goal that is
considered to be outside of the creator's original objective.

Those individuals who engage in computer hacking activities are


typically referred to as hackers.
5 Phases of Hacking (How Hackers work)
Reconnaissance:
This is the primary phase where the Hacker tries to collect as much
information as possible about the target. It includes Identifying the
Target, finding out the target's IP Address Range, Network, DNS
records, etc.
Scanning:
- It involves taking the information discovered during reconnaissance
and using it to examine the network. Tools that a hacker may employ
during the scanning phase can include dialers, port scanners,
network mappers, sweepers, and vulnerability scanners. Hackers are
seeking any information that can help them perpetrate attack such
as computer names, IP addresses, and user accounts.
Gaining Access
:- After scanning, the hacker designs the blueprint of the network of
the target with the help of data collected during Phase 1 and Phase
2. This is the phase where the real hacking takes place. Vulnerabilities
discovered during the reconnaissance and scanning phase are now
exploited to gain access.
Maintaining Access
Once a hacker has gained access, they want to keep that
access for future exploitation and attacks. Sometimes, hackers
harden the system from other hackers or security personnel by
securing their exclusive access with backdoors, rootkits, and Trojans.
Once the hacker owns the system, they can use it as a base to
launch additional attacks. In this case, the owned system is
sometimes referred to as a zombie system.
Covering Tracks:
- Once hackers have been able to gain and maintain access, they
cover their tracks to avoid detection by security personnel, to
continue to use the owned system, to remove evidence of hacking,
or to avoid legal action. Hackers try to remove all traces of the
attack, such as log files or intrusion detection system (IDS) alarms.
Examples of activities during this phase of the attack include
steganography, the use of tunneling protocols, and altering log files.
Malwares
Stands for malicious software
Spyware
Software that enables a user to
obtain covert information about
another's computer activities by
transmitting data covertly from their
hard drive.
Virus
A computer virus is
a malware that, when executed,
replicates by reproducing itself or
infecting other programs by
modifying them. Infecting computer
programs can include as well, data
files, or the boot sector of the hard
drive. When this replication
succeeds, the affected areas are
then said to be "infected".
Worms
A worm is a program very similar to a virus; it has the ability to self-
replicate and can lead to negative effects on your system. But they
can be detected and eliminated by an antivirus software.
Trojan
A Trojan horse or Trojan is a type
of malware that is often disguised
as legitimate
software. Trojans can be
employed by cyber-thieves and
hackers trying to gain access to
users' systems.
Spam
Electronic spamming is the use of
electronic messaging systems to
send unsolicited messages (spam),
especially advertising, as well as
sending messages repeatedly on
the same site. While the most widely
recognized form of spam is email
spam,
Phishing
Phishing is the attempt to obtain
sensitive information such as
usernames, passwords, and credit
card details (and, indirectly,
money), often for malicious
reasons, by disguising as a
trustworthy entity in an electronic
communication.
Tips to stay safe online
1. Be mindful of what you share and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website.
4. Know the security features of the social networking site you use.
5. Do not share password with anyone.
6. Avoid logging in to public networks/Wi-Fi.
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about future vacation.
9. Add friends you know in real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your computer.
12. If you have a Wi-Fi at home, make it a private network by adding
password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails
Think before you click
Protecting Reputations Online
In the past, doing something embarrassing was not much a big deal.
Nowadays, embarrassing moments are captured using any device
you could imagine
This could impact not only your reputation but also the people
around you.
Think before you click
1. Before you post something on the web, ask these questions to
yourself:
Would you want your parents or grandparents to see it?
Would you want your future boss to see it?
2. Your friends depend on you to protect their reputation online.
3. Set your post to private.
4. Avoid using names.
5. If you feel that a post can affect you or others reputation, ask
the one who posted it to pull it down or report it as
inappropriate.
Copyright Infringement
Intellectual Property
Copyright Law
Copyright Page No part of this book may be copied,
reproduced
Copyright Infringement
1. Understand. Copyright protect literary works, photographs
paintings, drawings, films, music (and lyrics), choreography, and
sculptures.
2. Be responsible. Even if a material does not say that it is
copyrighted, it is not a valid defense against copyright.
3. Be creative. Ask yourself whether what you are making is
something that came from you or something made from
somebody elses creativity.
4. Know the law. There are some limitations to copyright laws.

Potrebbero piacerti anche