3. What is Information
Security?
Effects of being careless
on Information Security
To prevent
unauthorized access to
our sensitive/Privacy
information
Importance of
Information Security
Privacy Issues
Money Loss
Leads to
Suicide
INFORMATION
SECURITY
is a set of
practices intended
to keep data
secure from
unauthorized
access or
alterations
To Stop Hackers from
Stealing our Information
4. PUBLIC WI-FI AWARENESS
JUICE JACKING AWARENESS
SOCIAL MEDIA AWARENESS
01
02
03
We Makes Hacker’s Job
easy without our
Concern
6. HACKING
What is Hacker
The person who has knowledge
in programming, perform
information theft
White Hat
Protects system in the ongoing
battle against cyber threats.
Find vulnerabilities and provide
solutions to solve them before
hacker finds
Grey Hat
Break into systems but they
don’t steal information, gives
the solution instead
What is Hacking
The process of attempting to
gain unauthorized access to
computer resource
Types of Hacker
White Hat
Black Hat
Grey Hat
Black Hat
Break into systems and steal
data for their own gain.
7. 01
02
03
Risks of PUBLIC WIFI
Man-in-the-Middle Attacks
When a computer device makes
a connection to the internet on
public Wi-Fi, vulnerabilities can
allow an attacker to get in
between and read them.
Malware Distribution
Hacker can inject malware onto
your device through the public
Wi-Fi.
Problems
If we make an online transaction
on public Wi-Fi, attacker can get
the card details and he will get
the money from our account.
Also if we log in to our accounts,
he can easy get the credentials
through these attacks.
Solution – VPN (Virtual Private
Network)
A simple software that was created to
protect your online privacy by creating a
private network.
How does it works?
VPN encrypt all the data you send over
the internet.
8. C
B
A
Is a type of cyber attack involving a
charging port that doubles as a data
connection, typically over USB.
Attacker uses a USB connection to load
malware directly onto the charging station,
When you use the infected charging port,
attacker can steal your data.
Avoid public charge stations or portable wall
chargers
Power Down the phone before charging
Disable auto pairing mode on your device.
JUICE JACKING
9. Identity theft
Criminals and Hackers trawl social media for
information
Shop receipts to duplicate barcodes
Holiday posts to facilitate burglary
Personal Information to crack passwords or steal Identities
Threats on Social Media
Facebook, Twitter, Instagram etc.
Think before post any of these on your social
accounts
Full name
Date of Birth
Hometown
Relationship status
Pet Names
** Everything you like, share, and comment on says
something about you **
10. Issues of Unauthorized Software
Installation
Apps on Apple® AppStore
and Google Play™ ,
Microsoft Store
Authorized
Software
Apps made by someone
other than the
manufacturer of a
mobile device or its
operating system.
Cracked Software.
Unauthorized
Software
What are the problems ????
• Some unauthorized software contains malwares that infects
user’s device
What is Malware ????
• Malware, short for malicious software, is a blanket
term for viruses, worms, trojans and other harmful
computer programs hackers use to wreak destruction
and gain access to sensitive information
Most Common issues of unauthorized software/apps installation
• RAT – Remote Access Trojan
• Keylogger
11. RAT – Remote Access Trojan
Remote access Trojan (RAT) is a malware program
that includes a back door for administrative
control over the target computer.
RATs are usually downloaded invisibly with a user-
requested program. Such as cracked files or
unauthorized apps.
Hacker can do these things with the use of RAT
• Accessing confidential information, such as credit
card and social security numbers.
• Activating a system's webcam and recording
video.
• Taking screenshots.
• Distributing viruses and other malware.
• Formatting drives.
• Deleting, downloading or altering files and file
systems.
12. Keylogger
Keyloggers are a type of monitoring software
designed to record keystrokes made by a user.
intercepts signals from your keyboard and records
every keystroke you make.
Solution for these issues
Don’t download and install unauthorized apps
Keep your device updated
Use Anti-Virus & Internet Security Application.
13. Weak Passwords
Weak Passwords are easily guessable.
Example :- Yourname@123 , Password@321 , Own mobile
number
Stop using passwords that are related to your personal info.
Example :- Passwords on parents name, GF/BF Name
Some password cracking methods you have to
know
Brute-Force Attack
In a brute force attack, a hacker uses a computer program to
login to a user’s account with all possible password combinations.
Dictionary Attack
dictionary attacks rely on a few key factors of users’
psychology. For example, users tend to pick short passwords and
base their passwords off common words.
14. Social Media – Instagram
Username & Password
Sample Phishing
Attack
• Phishing is a type of social
engineering attack often
used to steal user data,
including login credentials
and credit card numbers
• Phishing works like Fishing
What is Phishing
Phishing
15. Dark Web / Deep
Web
What is Dark Web / Deep Web
The dark web is a dark side of the internet that isn't
indexed by search engines
What will u find there ?
You can buy credit card numbers, all manner of drugs,
guns, counterfeit money, stolen subscription credentials,
hacked Netflix accounts and software that helps you break
into other people’s computers