SlideShare uma empresa Scribd logo
1 de 15
INFORMATION
SECURITY AWARENESS
London Metropolitan University -
Odniel
PEOPLE MAKES HACKER’S JOB EASY
Audio
Format
Text
Format
Graphical
Format
INFORMATION
Information is data that has been processed in such a
way as to be meaningful
Graphical Format
Images, Videos
Text Format
Text Messages, Username,
Password
Audio Format
Voice Messages on WhatsApp,
Facebook messenger etc.
What is Information
Security?
Effects of being careless
on Information Security
To prevent
unauthorized access to
our sensitive/Privacy
information
Importance of
Information Security
Privacy Issues
Money Loss
Leads to
Suicide
INFORMATION
SECURITY
is a set of
practices intended
to keep data
secure from
unauthorized
access or
alterations
To Stop Hackers from
Stealing our Information
PUBLIC WI-FI AWARENESS
JUICE JACKING AWARENESS
SOCIAL MEDIA AWARENESS
01
02
03
We Makes Hacker’s Job
easy without our
Concern
UNWANTED APPS/SOFTWARE
INSTALLATION
WEAK PASSWORDS
PHISHING – URL
DARK WEB / DEEP WEB
01
02
03
04
We Makes Hacker’s
Job easy with our
Concern
HACKING
What is Hacker
The person who has knowledge
in programming, perform
information theft
White Hat
Protects system in the ongoing
battle against cyber threats.
Find vulnerabilities and provide
solutions to solve them before
hacker finds
Grey Hat
Break into systems but they
don’t steal information, gives
the solution instead
What is Hacking
The process of attempting to
gain unauthorized access to
computer resource
Types of Hacker
White Hat
Black Hat
Grey Hat
Black Hat
Break into systems and steal
data for their own gain.
01
02
03
Risks of PUBLIC WIFI
Man-in-the-Middle Attacks
When a computer device makes
a connection to the internet on
public Wi-Fi, vulnerabilities can
allow an attacker to get in
between and read them.
Malware Distribution
Hacker can inject malware onto
your device through the public
Wi-Fi.
Problems
If we make an online transaction
on public Wi-Fi, attacker can get
the card details and he will get
the money from our account.
Also if we log in to our accounts,
he can easy get the credentials
through these attacks.
Solution – VPN (Virtual Private
Network)
A simple software that was created to
protect your online privacy by creating a
private network.
How does it works?
VPN encrypt all the data you send over
the internet.
C
B
A
Is a type of cyber attack involving a
charging port that doubles as a data
connection, typically over USB.
Attacker uses a USB connection to load
malware directly onto the charging station,
When you use the infected charging port,
attacker can steal your data.
Avoid public charge stations or portable wall
chargers
Power Down the phone before charging
Disable auto pairing mode on your device.
JUICE JACKING
Identity theft
Criminals and Hackers trawl social media for
information
Shop receipts to duplicate barcodes
Holiday posts to facilitate burglary
Personal Information to crack passwords or steal Identities
Threats on Social Media
Facebook, Twitter, Instagram etc.
Think before post any of these on your social
accounts
Full name
Date of Birth
Hometown
Relationship status
Pet Names
** Everything you like, share, and comment on says
something about you **
Issues of Unauthorized Software
Installation
Apps on Apple® AppStore
and Google Play™ ,
Microsoft Store
Authorized
Software
 Apps made by someone
other than the
manufacturer of a
mobile device or its
operating system.
 Cracked Software.
Unauthorized
Software
What are the problems ????
• Some unauthorized software contains malwares that infects
user’s device
What is Malware ????
• Malware, short for malicious software, is a blanket
term for viruses, worms, trojans and other harmful
computer programs hackers use to wreak destruction
and gain access to sensitive information
Most Common issues of unauthorized software/apps installation
• RAT – Remote Access Trojan
• Keylogger
RAT – Remote Access Trojan
 Remote access Trojan (RAT) is a malware program
that includes a back door for administrative
control over the target computer.
 RATs are usually downloaded invisibly with a user-
requested program. Such as cracked files or
unauthorized apps.
Hacker can do these things with the use of RAT
• Accessing confidential information, such as credit
card and social security numbers.
• Activating a system's webcam and recording
video.
• Taking screenshots.
• Distributing viruses and other malware.
• Formatting drives.
• Deleting, downloading or altering files and file
systems.
Keylogger
 Keyloggers are a type of monitoring software
designed to record keystrokes made by a user.
 intercepts signals from your keyboard and records
every keystroke you make.
Solution for these issues
 Don’t download and install unauthorized apps
 Keep your device updated
 Use Anti-Virus & Internet Security Application.
Weak Passwords
 Weak Passwords are easily guessable.
 Example :- Yourname@123 , Password@321 , Own mobile
number
 Stop using passwords that are related to your personal info.
 Example :- Passwords on parents name, GF/BF Name
Some password cracking methods you have to
know
 Brute-Force Attack
In a brute force attack, a hacker uses a computer program to
login to a user’s account with all possible password combinations.
 Dictionary Attack
dictionary attacks rely on a few key factors of users’
psychology. For example, users tend to pick short passwords and
base their passwords off common words.
Social Media – Instagram
Username & Password
Sample Phishing
Attack
• Phishing is a type of social
engineering attack often
used to steal user data,
including login credentials
and credit card numbers
• Phishing works like Fishing
What is Phishing
Phishing
Dark Web / Deep
Web
What is Dark Web / Deep Web
The dark web is a dark side of the internet that isn't
indexed by search engines
What will u find there ?
You can buy credit card numbers, all manner of drugs,
guns, counterfeit money, stolen subscription credentials,
hacked Netflix accounts and software that helps you break
into other people’s computers

Mais conteúdo relacionado

Semelhante a pp.pptx

IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 

Semelhante a pp.pptx (20)

Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 

Último

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Último (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

pp.pptx

  • 1. INFORMATION SECURITY AWARENESS London Metropolitan University - Odniel PEOPLE MAKES HACKER’S JOB EASY
  • 2. Audio Format Text Format Graphical Format INFORMATION Information is data that has been processed in such a way as to be meaningful Graphical Format Images, Videos Text Format Text Messages, Username, Password Audio Format Voice Messages on WhatsApp, Facebook messenger etc.
  • 3. What is Information Security? Effects of being careless on Information Security To prevent unauthorized access to our sensitive/Privacy information Importance of Information Security Privacy Issues Money Loss Leads to Suicide INFORMATION SECURITY is a set of practices intended to keep data secure from unauthorized access or alterations To Stop Hackers from Stealing our Information
  • 4. PUBLIC WI-FI AWARENESS JUICE JACKING AWARENESS SOCIAL MEDIA AWARENESS 01 02 03 We Makes Hacker’s Job easy without our Concern
  • 5. UNWANTED APPS/SOFTWARE INSTALLATION WEAK PASSWORDS PHISHING – URL DARK WEB / DEEP WEB 01 02 03 04 We Makes Hacker’s Job easy with our Concern
  • 6. HACKING What is Hacker The person who has knowledge in programming, perform information theft White Hat Protects system in the ongoing battle against cyber threats. Find vulnerabilities and provide solutions to solve them before hacker finds Grey Hat Break into systems but they don’t steal information, gives the solution instead What is Hacking The process of attempting to gain unauthorized access to computer resource Types of Hacker White Hat Black Hat Grey Hat Black Hat Break into systems and steal data for their own gain.
  • 7. 01 02 03 Risks of PUBLIC WIFI Man-in-the-Middle Attacks When a computer device makes a connection to the internet on public Wi-Fi, vulnerabilities can allow an attacker to get in between and read them. Malware Distribution Hacker can inject malware onto your device through the public Wi-Fi. Problems If we make an online transaction on public Wi-Fi, attacker can get the card details and he will get the money from our account. Also if we log in to our accounts, he can easy get the credentials through these attacks. Solution – VPN (Virtual Private Network) A simple software that was created to protect your online privacy by creating a private network. How does it works? VPN encrypt all the data you send over the internet.
  • 8. C B A Is a type of cyber attack involving a charging port that doubles as a data connection, typically over USB. Attacker uses a USB connection to load malware directly onto the charging station, When you use the infected charging port, attacker can steal your data. Avoid public charge stations or portable wall chargers Power Down the phone before charging Disable auto pairing mode on your device. JUICE JACKING
  • 9. Identity theft Criminals and Hackers trawl social media for information Shop receipts to duplicate barcodes Holiday posts to facilitate burglary Personal Information to crack passwords or steal Identities Threats on Social Media Facebook, Twitter, Instagram etc. Think before post any of these on your social accounts Full name Date of Birth Hometown Relationship status Pet Names ** Everything you like, share, and comment on says something about you **
  • 10. Issues of Unauthorized Software Installation Apps on Apple® AppStore and Google Play™ , Microsoft Store Authorized Software  Apps made by someone other than the manufacturer of a mobile device or its operating system.  Cracked Software. Unauthorized Software What are the problems ???? • Some unauthorized software contains malwares that infects user’s device What is Malware ???? • Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information Most Common issues of unauthorized software/apps installation • RAT – Remote Access Trojan • Keylogger
  • 11. RAT – Remote Access Trojan  Remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.  RATs are usually downloaded invisibly with a user- requested program. Such as cracked files or unauthorized apps. Hacker can do these things with the use of RAT • Accessing confidential information, such as credit card and social security numbers. • Activating a system's webcam and recording video. • Taking screenshots. • Distributing viruses and other malware. • Formatting drives. • Deleting, downloading or altering files and file systems.
  • 12. Keylogger  Keyloggers are a type of monitoring software designed to record keystrokes made by a user.  intercepts signals from your keyboard and records every keystroke you make. Solution for these issues  Don’t download and install unauthorized apps  Keep your device updated  Use Anti-Virus & Internet Security Application.
  • 13. Weak Passwords  Weak Passwords are easily guessable.  Example :- Yourname@123 , Password@321 , Own mobile number  Stop using passwords that are related to your personal info.  Example :- Passwords on parents name, GF/BF Name Some password cracking methods you have to know  Brute-Force Attack In a brute force attack, a hacker uses a computer program to login to a user’s account with all possible password combinations.  Dictionary Attack dictionary attacks rely on a few key factors of users’ psychology. For example, users tend to pick short passwords and base their passwords off common words.
  • 14. Social Media – Instagram Username & Password Sample Phishing Attack • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers • Phishing works like Fishing What is Phishing Phishing
  • 15. Dark Web / Deep Web What is Dark Web / Deep Web The dark web is a dark side of the internet that isn't indexed by search engines What will u find there ? You can buy credit card numbers, all manner of drugs, guns, counterfeit money, stolen subscription credentials, hacked Netflix accounts and software that helps you break into other people’s computers