SlideShare uma empresa Scribd logo
1 de 33
What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must  have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around  57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
The Bottom Up Approach Secure  your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven What is a browser? Internet Explorer  “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience The next generation in desktop Web browsing  Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Please change that default SSID !!  Common/Default SSID can put your router at risk!  Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters)  I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall How to choose? Try the free demos and compare antivirus  Free antivirus scan/application are not always good  Google around for independent reviews  Read :  http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Must have features  On Demand scanner  Proactive detection  Anti Spyware/ tracking cookie detection  Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
Questions ? Presentation By : Tripad Mishra (me@Tripad.im)

Mais conteúdo relacionado

Mais procurados

Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Internet security
Internet securityInternet security
Internet security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Semelhante a Web Security

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of TechnologyAkash Mittal
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book ReviewTirtha Mal
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer securitySwati Bhonde
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?Jim Isaak
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Pratimesh Pathak
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 

Semelhante a Web Security (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Network security
Network securityNetwork security
Network security
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of Technology
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Network Security
Network SecurityNetwork Security
Network Security
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer security
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Web Security

  • 1. What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 2. What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
  • 3. A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
  • 4. IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
  • 5. IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
  • 6. IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
  • 7. IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
  • 8. Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
  • 9. Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around 57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 10. So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
  • 11. The Bottom Up Approach Secure your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
  • 12. Browser –your stairway to heaven What is a browser? Internet Explorer “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
  • 13. Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
  • 14. Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
  • 15. Opera– Experience The next generation in desktop Web browsing Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
  • 16. Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
  • 17. Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
  • 18. The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
  • 19. The Router(WiFi) Please change that default SSID !! Common/Default SSID can put your router at risk! Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
  • 20. The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters) I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
  • 21. Presentation By : Tripad Mishra (me@Tripad.im)
  • 22. The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
  • 23. Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
  • 24. Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
  • 25. Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
  • 26. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 27. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 28. Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
  • 29. Antivirus and Firewall How to choose? Try the free demos and compare antivirus Free antivirus scan/application are not always good Google around for independent reviews Read : http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
  • 30. Antivirus and Firewall Must have features On Demand scanner Proactive detection Anti Spyware/ tracking cookie detection Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
  • 31. Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
  • 32. Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
  • 33. Questions ? Presentation By : Tripad Mishra (me@Tripad.im)