SlideShare uma empresa Scribd logo
1 de 11
By : hackingtweaks.com
Cyber Security can be defined as the steps taken to prevent
misuse or unauthorized access of computers/user accounts.
                             OR

It can be defined protecting yourself in this “Web” world.
The two broad classification of cyber security are :


•Web Security : It refers to to security associated with
Internet.

•Home Security : Home security is associated with keeping
your personal system secure from various threats.
Components of Web Security :


 •E –Mail Security : E-Mail is used by almost every person who uses
 internet. But rarely people worry about their security .Most of the
 people make an email account and rarely change it's password ever
 , making the account very vulnerable!

 •Facebook Security : These days everyone is on facebook and many
 accounts get hacked .We think that security of facebook is very low
 due to which the accounts get hacked .But facebook has been
 pentested so many times that its security is very high and its the lack
 of awareness of the users that their accounts get hacked . Many people
 don’t change passwords regularly or often open up some link which
 are nothing but scripts leading to hack their account.
•Online Banking Security : Most of the banks offer a very good security
but still on the side of the users there is carelessness which leads to leak
of confidential information.
Components of Home Security :


•Antivirus : Ensuring that we have a good anti-virus which protects
your computer from any external harm by viruses , trojans etc. is a
must. One should update the antivirus regularly too.

•Firewall : A firewall is a tool whose main objective is to control the
incoming and outgoing data packets in a network. It determines
whether the packets are valid or invalid on the basis of some pre
determined rules.

•Good Password : Users should keep a good password which cannot be
easily guessed by others. A good password contains a combination of
words , numbers, shift keys etc..
Facebook being the most accessed site all over the world makes it
the prime target of attackers . So here are some tips to increase the
security of your facebook account :

One Should always keep the following options enabled in
Facebook :
 •Secure browsing - Enable 'https' tag to the url instead of
 http, HTTPS is more safer and secure.

 •Login notifications - It tells you about from where your account
 has been accessed,if you find a fishy location,change password
 immediately

 •Recognized devices - By choosing this option you can specify the
 devices by which you use facebook,if your account is accessed by
 an unrecognized device,fb prevents login from that device.
•I would recommend girls to make "groups'' in your friend list . Put those
people in 'acquaintances' who you don't know or trust less as these are the
people who leak your photos .

•Putting such people in “acquaintances” ensures security of the data you
post on fb , as people of this group are unable to see most of the
pics, statuses you update.

•DON'T add strangers..a bit less comments on photos are surely better than any
harassment :P
Here are some interesting Tweaks which you can always try out
during free time :

•Play “Snake Game” on youtube - All you have to do is press –
"left mouse button+left arrow+up arrow“, and the snake game
begins!

•Post display pic as emoticon in fb chat : You can add facebook
profiles,like pages etc. in facebook chat.All you have to do is
type the unique username like this : [[username]] . For example
Facebook username is facebook.com/john . So, If I have to post
my image in the chat I will type [[john]] and press enter.
Screen Capture of a live feed of an Airport which was easily accessible by
anyone due to a loophole in security.
Feel free to ask questions and doubts 



                     -Don’t ignore to secure

Mais conteúdo relacionado

Mais procurados

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
Daniel Owens
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 

Mais procurados (20)

Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Learn awesome hacking tricks
Learn awesome hacking tricksLearn awesome hacking tricks
Learn awesome hacking tricks
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Genysis security 101
Genysis security 101Genysis security 101
Genysis security 101
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 

Semelhante a Cyber security

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 

Semelhante a Cyber security (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Cyber security

  • 2. Cyber Security can be defined as the steps taken to prevent misuse or unauthorized access of computers/user accounts. OR It can be defined protecting yourself in this “Web” world.
  • 3. The two broad classification of cyber security are : •Web Security : It refers to to security associated with Internet. •Home Security : Home security is associated with keeping your personal system secure from various threats.
  • 4. Components of Web Security : •E –Mail Security : E-Mail is used by almost every person who uses internet. But rarely people worry about their security .Most of the people make an email account and rarely change it's password ever , making the account very vulnerable! •Facebook Security : These days everyone is on facebook and many accounts get hacked .We think that security of facebook is very low due to which the accounts get hacked .But facebook has been pentested so many times that its security is very high and its the lack of awareness of the users that their accounts get hacked . Many people don’t change passwords regularly or often open up some link which are nothing but scripts leading to hack their account.
  • 5. •Online Banking Security : Most of the banks offer a very good security but still on the side of the users there is carelessness which leads to leak of confidential information.
  • 6. Components of Home Security : •Antivirus : Ensuring that we have a good anti-virus which protects your computer from any external harm by viruses , trojans etc. is a must. One should update the antivirus regularly too. •Firewall : A firewall is a tool whose main objective is to control the incoming and outgoing data packets in a network. It determines whether the packets are valid or invalid on the basis of some pre determined rules. •Good Password : Users should keep a good password which cannot be easily guessed by others. A good password contains a combination of words , numbers, shift keys etc..
  • 7. Facebook being the most accessed site all over the world makes it the prime target of attackers . So here are some tips to increase the security of your facebook account : One Should always keep the following options enabled in Facebook : •Secure browsing - Enable 'https' tag to the url instead of http, HTTPS is more safer and secure. •Login notifications - It tells you about from where your account has been accessed,if you find a fishy location,change password immediately •Recognized devices - By choosing this option you can specify the devices by which you use facebook,if your account is accessed by an unrecognized device,fb prevents login from that device.
  • 8. •I would recommend girls to make "groups'' in your friend list . Put those people in 'acquaintances' who you don't know or trust less as these are the people who leak your photos . •Putting such people in “acquaintances” ensures security of the data you post on fb , as people of this group are unable to see most of the pics, statuses you update. •DON'T add strangers..a bit less comments on photos are surely better than any harassment :P
  • 9. Here are some interesting Tweaks which you can always try out during free time : •Play “Snake Game” on youtube - All you have to do is press – "left mouse button+left arrow+up arrow“, and the snake game begins! •Post display pic as emoticon in fb chat : You can add facebook profiles,like pages etc. in facebook chat.All you have to do is type the unique username like this : [[username]] . For example Facebook username is facebook.com/john . So, If I have to post my image in the chat I will type [[john]] and press enter.
  • 10. Screen Capture of a live feed of an Airport which was easily accessible by anyone due to a loophole in security.
  • 11. Feel free to ask questions and doubts  -Don’t ignore to secure