SlideShare a Scribd company logo
1 of 18
Download to read offline
EmilTan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
Securing Mobile & Online Identity
in the Cyber World
Your Mobile Phone
Mobile Security
Use Password and Encryption to Protect your Data
Password protect and turn on encryption for your mobile device
to prevent unauthorised access to the data stored on your phone.
Malicious Apps
Malicious Apps
Permission List from McAfee’s Consumer MobileTrends Report (June 2013 edition)
(http://www.mcafee.com/us/resources/reports/rp-mobile-security-consumer-trends.pdf)
Mobile Security
Install Antivirus
This is an app used to detect, stop and remove malware such as
viruses, worm,Trojan horses, spyware, adware, etc. From your
mobile phone.
To ensure that your antivirus software is effective,
set it to update and scan all installed apps automatically.
Do not Install Unknown Apps
Keep your Device & Apps Updated
Mobile Security
DisableWiFi and Bluetooth when not in use
Attackers could access information on your mobile device
through its enabledWiFi or Bluetooth connection.
Account Hijacking
Mobile Security
Never connect to unknownWiFi network
Hackers may setup unsecuredWiFi hotspots in public area, once
connected to it, they are able to intercept and steal sensitive data
that you transmit over the Internet.
Mobile Security
Never Jailbreak / Root your mobile devices
Jailbreaking / Rooting might void your device’s warranty and
expose your mobile devices to vulnerabilities that could be
exploited by hackers.
Secure your Mobile Now!
Use Password and Encryption to Protect your
Data
Install Antivirus
Do not Install Unknown Apps
Keep your Device & Apps Updated
DisableWiFi and Bluetooth when not in use
Never connect to unknownWiFi network
Never Jailbreak / Root your mobile devices
Online Identity
An online identity is used to uniquely identify yourself
to others online.
Your personal data such as NRIC, email address and social
media account could be a form of your identity online.
Things you’ve shared
 Gender
 Relationship Status
 Current Living & Hometown Location
 Work & Education
 Favourite Movies & Music
 Family Members
 Photos
 What are you doing now
 Current Location
Why do people share?
Privacy Settings
Privacy Settings
Securing your Online Identity
Limit Personal Information that you put online.
Use Strong Password.
Use Different Passwords for Different Accounts.
Change your Password Regularly.
Keep your Online Identity Secure.

More Related Content

What's hot

cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
PRIYANKA944
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
brn8brwn
 

What's hot (20)

Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
cell phone viruses and security
cell phone viruses and securitycell phone viruses and security
cell phone viruses and security
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets10 Ways to Work Smarter With Packets
10 Ways to Work Smarter With Packets
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
Cybersecuity Tips for Small Businesses
Cybersecuity Tips for Small BusinessesCybersecuity Tips for Small Businesses
Cybersecuity Tips for Small Businesses
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
Guide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UKGuide on How to keep your data safe when traveling to the UK
Guide on How to keep your data safe when traveling to the UK
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
MWC19 Presentation-Safepath
MWC19 Presentation-SafepathMWC19 Presentation-Safepath
MWC19 Presentation-Safepath
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 

Viewers also liked

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (20)

Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
Introduction to Memory Analysis
Introduction to Memory AnalysisIntroduction to Memory Analysis
Introduction to Memory Analysis
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
A Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityA Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on Cybersecurity
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
A Guide to Human Geography
A Guide to Human GeographyA Guide to Human Geography
A Guide to Human Geography
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Hacking
HackingHacking
Hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Securing Mobile & Online Identity in the Cyber World

mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 

Similar to Securing Mobile & Online Identity in the Cyber World (20)

Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
Mobile security
Mobile securityMobile security
Mobile security
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?How to Ensure Complete Data Protection at Work?
How to Ensure Complete Data Protection at Work?
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Top Cyber Threats and How to Stop Them!
Top Cyber Threats and How to Stop Them!Top Cyber Threats and How to Stop Them!
Top Cyber Threats and How to Stop Them!
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Cybersecurity Presentation
Cybersecurity PresentationCybersecurity Presentation
Cybersecurity Presentation
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Securing Mobile & Online Identity in the Cyber World

  • 2.
  • 4. Mobile Security Use Password and Encryption to Protect your Data Password protect and turn on encryption for your mobile device to prevent unauthorised access to the data stored on your phone.
  • 6. Malicious Apps Permission List from McAfee’s Consumer MobileTrends Report (June 2013 edition) (http://www.mcafee.com/us/resources/reports/rp-mobile-security-consumer-trends.pdf)
  • 7. Mobile Security Install Antivirus This is an app used to detect, stop and remove malware such as viruses, worm,Trojan horses, spyware, adware, etc. From your mobile phone. To ensure that your antivirus software is effective, set it to update and scan all installed apps automatically. Do not Install Unknown Apps Keep your Device & Apps Updated
  • 8. Mobile Security DisableWiFi and Bluetooth when not in use Attackers could access information on your mobile device through its enabledWiFi or Bluetooth connection.
  • 10. Mobile Security Never connect to unknownWiFi network Hackers may setup unsecuredWiFi hotspots in public area, once connected to it, they are able to intercept and steal sensitive data that you transmit over the Internet.
  • 11. Mobile Security Never Jailbreak / Root your mobile devices Jailbreaking / Rooting might void your device’s warranty and expose your mobile devices to vulnerabilities that could be exploited by hackers.
  • 12. Secure your Mobile Now! Use Password and Encryption to Protect your Data Install Antivirus Do not Install Unknown Apps Keep your Device & Apps Updated DisableWiFi and Bluetooth when not in use Never connect to unknownWiFi network Never Jailbreak / Root your mobile devices
  • 13. Online Identity An online identity is used to uniquely identify yourself to others online. Your personal data such as NRIC, email address and social media account could be a form of your identity online.
  • 14. Things you’ve shared  Gender  Relationship Status  Current Living & Hometown Location  Work & Education  Favourite Movies & Music  Family Members  Photos  What are you doing now  Current Location
  • 15. Why do people share?
  • 18. Securing your Online Identity Limit Personal Information that you put online. Use Strong Password. Use Different Passwords for Different Accounts. Change your Password Regularly. Keep your Online Identity Secure.