SlideShare uma empresa Scribd logo
1 de 55
Workshop on Cyber Security
Niks Technology Private Limited
By: Dr. Rahul Nayan
Niks Technology Private Limited
Cyber Security Defined
 Cyber Security’s goal: Protect our information and
information systems
 Cyber Security is: “Protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing or transit, and against the denial of
service to authorized users, including those
measures necessary to detect, document, and
counter such threats.”
Role Of Cyber Security
Why Is It Important
Anything that relies on the internet for communication, or is connected to a
computer or other smart device, can be affected by a breach in security. This
includes:
 Communication systems, like email, phones and text messages.
 Transportation systems, including traffic control, car engines, airplane
navigation systems.
 Government databases, including Social Security numbers, licenses, tax
records.
 Financial systems, including bank accounts, loans and pay checks.
 Medical systems, including equipment and medical records.
 Educational systems, including grades, report cards and research information.
Benefits of Cyber Security
 It Can Protect Your Business
 Protect Personal Info
 Allows Employees to Work Safely
 Protects Productivity
 Stop Your Website from Going Down
 Denies Spyware
 Prevents Adware
 A Consolidated Solution
 Support Your IT Expert
 Inspire Confidence in Your Customers
Global Information Security Survey 2017-2018
Security isa process-not software orhardware
 Youshareyour computer with others
 Youtravel and usepublicWiFi
 Personal& financialdata is on your
computer
 Businessfiles are on your computer
 Youuseasmartphone likeacomputer
 YouarerunningWindowsXP/7
What is Cyber-Security?
Protecting your computer,
network, and information
from onlinethreats
What isCyber-Crime?
Any crime conductedvia
the Internet to cause
damage or stealdata
Why do hackershack?
 Steal money
 Collect information tosteal money, or
commit identitytheft
Why attack smallcompanies?
 Least secureingeneral
Unwaryusers
Hardware
Unsecured Wi-Fi(Panera) No
Router
Router with defaultpassword
Software
No anti-virus/anti-spyware No
Firewall
Old virusdefinitions
Out of dateWindowsO.S.
PersonalBehavior
Failure to usestrong passwords
Clicking on unsafe links or emails
Downloading questionable files
Leaving computer logged on Leaving
your computeraccessible
MinorVirus Losesomedata
2- 4hours
Useinstalled
anti-virus
Rs.750-1000
MajorVirus Lossof docs 5-10
hours
Useserviceto
remove
Rs.1000-1700
Catastrophic Lossof ALLdata Useserviceto Rs.1700- 9999
Virus & photos wipe &reload
15+ hours entire system
AlsoAddWhat isYOURtime worth?
 Change your operating system
 No option willbe fun or easy
 Done with Microsoft? Switch to Apple orLinux
 Want to stay? Update to 8.1 or 10 which worksfine
Youwill probablyneed to buy a new computer
 Gotoa reputable reseller and buy a used computer loaded
withWindows 8/8.1/10
Cyber Security PartII
Firewall
SPAMFilter
WebFilter
Anti-Malware
People!
Backup
YOURINFO!
Passwords
1
2
3
4
. 5 6
Conceal
Deny
Detect
Filter
Decide
Router
• Closes and locks“open
doors”
• Keeps intrudersand
unknowns out
• Allows therecognized
& trustedin
• Not perfect, Cyber-
criminals exploit trusted
doors
• May block desiredsites
The First Line of Defense
“Hides” your network and computers from being
directly accessibleon the Internet
Routers CanProvide FirewallProtection
Default Usernames/Passwords for most routers can also be found at:
http://portforward.com/default_username_password
AccessRoutervia your web
browser
Enter your Routers IPAddress
Enter the default username &
password
Find administration settings
Select Change/ResetPassword
Tip:ToFind IPaddress go to your PC’s
Control Panel >Network and Internet >Network andSharingCenter and click on your network
Rule#1
Requireapasswordto accessyour computer
Why?
Prevents unauthorized access
Providesafirst line of defense
Prevents easy accessfrom a
network
TIP: Set up automatic lockout that requires a
password.Agood timeout value is5to 10 minutes.
Rule #2
Don’t forget your cell phone
Usestrong passwords–
>8 characters, letters,numbers and symbols
Use“coded” phrases (e.g.H@m5t3@k!)
Don’t store passwords in afile (unencrypted)
Don’t keep them near the computer
Useapassword vault such as“Lastpass”
Makesfilesanddisksunreadablewithout theencryption key
Youcanencrypt:
 Hard Drive orUSBDrive –Windows BitLocker
Windows 7upgrade $139,Windows 8.1/10
included. Start button>all programs>Windowsanytime
upgrade
 Individual Files–Axcrypt– Freeopen source
 BusinessEmail –using avirtual personal network(VPN)
Windows Start button >typeVPNinto the program searchwindow
Protects against theft or lossof acomputer
Confidential Information your business is
required to protect with encryption includes:
Medical Data defined by
HIPAA
(Health Insurance Portability and Accountability Act)
Must also include staff training
Financial Data defined byPIC
(Payment Card Industry)
Do NOT permanently store card data on your system
Recommend using 3rd party providers
SPAMFilters
Keepsout email from
unknown senders
Catches majority ofSPAM
Catches non-SPAM
Allows knownemail
SPAMFilters aren’t
perfect!
WEBFilters
Prohibits bad websites
Pre-examines website
content and warns you
Catches good websites
Allows knownwebsites
Web filters aren’t
perfect!
• Anti-Virus & Anti-
SpywarePrograms
• Scansemail,
attachments files,&
downloads
• Detects threatsand
Removesthem
• Not perfect, doesnot
detect everything,
cannot remove all
threats
Youand your employees arethe
last line ofdefense
After all the layers of protection,
you are the decisionmaker
DENY!!!
Cyber Security PartIII
If you provideWi-Fi forCustomers
Yourexisting router may have a “guest” feature
Besureto useWPA2encryption on your Private Network
Verify firewall
Install dedicated customer“hot spot” hardware and software
Does not require company to have any Wi-Fi exposure.
Protect private proprietary information from public users.
Improve customer internet experience and security
Include filtering to avoid risky or offensive websites
Providesfeatures suchasterms of serviceor time limits.
Worryfree 24x7TechnicalSupport, Monitoring, & Maintenance
 Provide securitytraining
 Have companypolicies
For email & internet use
Company & confidentialinformation
Make them written and update them
 Limit administrative and passwordaccess
 Restrict software on companycomputers
Control Downloads ofSoftware
Never allow “pirate”websites
music, games, movies(BitTorrent)
BewareofALLfree software, know the source
Danger areas
Adobe Flashfiles –updateoften
Shortened urlsyou can’t check–know the source
Email attachments or links –hover over “clickhere”
S ource of file?
T ype & size of file?
O thers recommend?
P repared to scan?
This is a fake anti-virus program. Once loaded it claims your computer
is infected and directs you to to buy the program via credit card.
Type Source Purpose Protection
Virus Email Ads
Links
Warnings
Updates
Malicious attack Disable
yourcomputer Destroy
yourdata
Anti-virus software
Firewall software
Firewall hardware Data
back-up
Phishing Email
Website
Steal Identity ormoney Surfingbehavior
Adware Ads Virus delivery, steal
information
Goodpractices
Spyware Stealpersonal
information
Anti-spyware &firewall
software
Tip: Have bothAnti-Virus AND Anti-Spyware installedon your computer..
But DO NOT install two anti-virus programs.
Thesescamswill comeintheform of:
Email
Website
Phone Call
TextMessage
(phishing)
(pharming)
(vishing)
(smishing)
ACombination ofThese
Requestspersonalinformation?
Containsgrammatical errors?
misspellings'?
How do they addressyou?
Isit too good to be true?
Have you checked thelink?
Tip: “MouseOver” Doesthe websiteURLlook legitimate?
Tip: Legitimate companies will NEVERaskyou for personalor confidential
information via email, awebsite, telephone,or text message.
R eceived Before?
I nside Links?
S ensible Message?
K nowsender?
This email link
delivers a Trojan
Virus right to your
computer
Beware of searchengineresults
Do not download unknownor
free software
“Unclick”/DECLINEany
OPTIONAL Downloadsor
Toolbars
UseSucuriSiteCheck
http://sitecheck.sucuri.net/
Tip: When installing programs pay attention to
installation options.They make you think you’re
declining, butyou’re approving!
 Only loginor sendpersonal information to websitesyou
know areencrypted
 Awebsite isencrypted when you seethe“lock” symbol or
https://
 Bewareof websitesusingencryption only onthe login page
Don't stay signed in toaccounts
When you are done, logout
Don’t do sensitive businesson publicWiFi
Don’t usethe same password,varyit
Keepyour browser(s)up-to-date
Orswitchto Firefox,Chrome,orApple
Tip: Don’t useyour browser to store passwords, not secure.
DoNOTfriend,link,ormessagepeopleyoudon’tknow
Donotallowuntrustedapplicationsto accessyouraccount Do
not clickonpostedvideos
NEVERPOST
• Youor your family’s full birthdates or
places of birth
• Your mother’s maidenname
• Thenamesof young family members
• Your relationshipstatus
Cyber Security PartIV
Boots very slowly or hangsup
Respondsslowly,crashes
Programs won’t run or crash
Popups, website redirection
Broken antivirus orsecurity
Tip: You can “right click” on the task bar and select the “Task Manager”
to see the memory and CPU usage that is currently taking place on your
computer.Shouldnot be constantly 100%.
Tip:
A foolproof way to keepa
virus from stealing your
personal info -disconnect
the network cable or turn
off the Wi-Fi. THENtake
action.
Anti-virus can’t removeit
Computer is notunusable
Your files aremissing
Youmust manually edit Windows
Yournot absolutelysure your actions
won’t make mattersworse!
Home PCSecurity PartV
External Hard DriveBackup
Windows Backup
Time Machine(Mac)
CloudBackup
Carbonite
CrashPlan
File SyncService
(not reallyabackup)
Dropbox
GoogleDrive
REGULAR BACKUP
JUST DO IT.
Step byStepTutorial at:
http://www.slideshare.net/B2BPlanner/file-back-up-using-windows-7-back
• Backupsaves/restores your datafiles
• Backupalsocreatesaseparatesystemimage forrestoringprograms&Windows
Overwrites EVERYTHING whenrestored
Canonly be usedif asystem repair disk wascreated
Router 2550 Various –Netgear,Linksys, Belcan,et.Al.
CloudbackupOR
External HardDrive
600/year
3500once
Carbonite -www.carbonite.com
WindowsBackupSoftware
Anti-Virus 940/year AVGAntivirus –www.avg.com
Firewall 0 WindowsFirewall
Anti-Spyware 0 Malwarebytes – www.malwarebytes.org
Anti-spam 0 Builtin toAppleMail &Outlook, needsetup
Passwordvault 0 Great, but dangerous-Lastpass
Totalcost 5000-8000 Do it yourselfcost
(Complete packages, installation, andtraining
available from ComputerTroubleshooters)
1. Usea Router to hidesyourcomputer/network
2. Make sureyour Windows Firewallisenabled
3. Usestrong passwordson your Router andComputer
4. Useanti-virus/anti-spyware todetect/remove malware
5. Backupyour files and data –regularly
6. Practice safesurfing: if you aren’t sure,don’tclick!
7. Don’t Share Confidential information on Social Media
8. Keep your Smartphones Password protected.
9. Use Anti Virus and Anti Malware.
Future in Cyber Security
 2.5 Million Cyber Security Job Openings globally in 2019.
Niks Technology Private Limited
Questions?
Let us all come together to prevent Cyber Crime, as
TOGETHER WE CAN.
Thankyou for the kind support.
NiksTechnology
wishes youall a
QUALITYOF WORKLIFEAHEAD.

Mais conteúdo relacionado

Mais procurados

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber securitySamanvay Jain
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

Mais procurados (20)

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Internet security
Internet securityInternet security
Internet security
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Semelhante a Workshop Cyber Security Essentials

Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business NetworkAnindita Ghatak
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-softwareDivyanisetia
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 

Semelhante a Workshop Cyber Security Essentials (20)

Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Information security
Information securityInformation security
Information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data security
 Data security  Data security
Data security
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 

Mais de Rahul Nayan

Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
Website Design and Development
Website Design and DevelopmentWebsite Design and Development
Website Design and DevelopmentRahul Nayan
 
Software Development By Rahul Nayan
Software Development By Rahul NayanSoftware Development By Rahul Nayan
Software Development By Rahul NayanRahul Nayan
 
Mobile Application Development By Rahul Nayan
Mobile Application Development By Rahul NayanMobile Application Development By Rahul Nayan
Mobile Application Development By Rahul NayanRahul Nayan
 
Motivational Lecture about Career and Character Building
Motivational Lecture about Career and Character BuildingMotivational Lecture about Career and Character Building
Motivational Lecture about Career and Character BuildingRahul Nayan
 
4d and 4d visualization
4d and 4d visualization 4d and 4d visualization
4d and 4d visualization Rahul Nayan
 

Mais de Rahul Nayan (6)

Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Website Design and Development
Website Design and DevelopmentWebsite Design and Development
Website Design and Development
 
Software Development By Rahul Nayan
Software Development By Rahul NayanSoftware Development By Rahul Nayan
Software Development By Rahul Nayan
 
Mobile Application Development By Rahul Nayan
Mobile Application Development By Rahul NayanMobile Application Development By Rahul Nayan
Mobile Application Development By Rahul Nayan
 
Motivational Lecture about Career and Character Building
Motivational Lecture about Career and Character BuildingMotivational Lecture about Career and Character Building
Motivational Lecture about Career and Character Building
 
4d and 4d visualization
4d and 4d visualization 4d and 4d visualization
4d and 4d visualization
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Workshop Cyber Security Essentials

  • 1. Workshop on Cyber Security Niks Technology Private Limited By: Dr. Rahul Nayan
  • 2. Niks Technology Private Limited Cyber Security Defined  Cyber Security’s goal: Protect our information and information systems  Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”
  • 3. Role Of Cyber Security Why Is It Important Anything that relies on the internet for communication, or is connected to a computer or other smart device, can be affected by a breach in security. This includes:  Communication systems, like email, phones and text messages.  Transportation systems, including traffic control, car engines, airplane navigation systems.  Government databases, including Social Security numbers, licenses, tax records.  Financial systems, including bank accounts, loans and pay checks.  Medical systems, including equipment and medical records.  Educational systems, including grades, report cards and research information.
  • 4. Benefits of Cyber Security  It Can Protect Your Business  Protect Personal Info  Allows Employees to Work Safely  Protects Productivity  Stop Your Website from Going Down  Denies Spyware  Prevents Adware  A Consolidated Solution  Support Your IT Expert  Inspire Confidence in Your Customers
  • 5. Global Information Security Survey 2017-2018
  • 6. Security isa process-not software orhardware
  • 7.  Youshareyour computer with others  Youtravel and usepublicWiFi  Personal& financialdata is on your computer  Businessfiles are on your computer  Youuseasmartphone likeacomputer  YouarerunningWindowsXP/7
  • 8. What is Cyber-Security? Protecting your computer, network, and information from onlinethreats What isCyber-Crime? Any crime conductedvia the Internet to cause damage or stealdata
  • 9. Why do hackershack?  Steal money  Collect information tosteal money, or commit identitytheft Why attack smallcompanies?  Least secureingeneral Unwaryusers
  • 10. Hardware Unsecured Wi-Fi(Panera) No Router Router with defaultpassword Software No anti-virus/anti-spyware No Firewall Old virusdefinitions Out of dateWindowsO.S. PersonalBehavior Failure to usestrong passwords Clicking on unsafe links or emails Downloading questionable files Leaving computer logged on Leaving your computeraccessible
  • 11. MinorVirus Losesomedata 2- 4hours Useinstalled anti-virus Rs.750-1000 MajorVirus Lossof docs 5-10 hours Useserviceto remove Rs.1000-1700 Catastrophic Lossof ALLdata Useserviceto Rs.1700- 9999 Virus & photos wipe &reload 15+ hours entire system AlsoAddWhat isYOURtime worth?
  • 12.  Change your operating system  No option willbe fun or easy  Done with Microsoft? Switch to Apple orLinux  Want to stay? Update to 8.1 or 10 which worksfine Youwill probablyneed to buy a new computer  Gotoa reputable reseller and buy a used computer loaded withWindows 8/8.1/10
  • 15.
  • 16.
  • 17. • Closes and locks“open doors” • Keeps intrudersand unknowns out • Allows therecognized & trustedin • Not perfect, Cyber- criminals exploit trusted doors • May block desiredsites
  • 18. The First Line of Defense “Hides” your network and computers from being directly accessibleon the Internet Routers CanProvide FirewallProtection
  • 19. Default Usernames/Passwords for most routers can also be found at: http://portforward.com/default_username_password
  • 20. AccessRoutervia your web browser Enter your Routers IPAddress Enter the default username & password Find administration settings Select Change/ResetPassword Tip:ToFind IPaddress go to your PC’s Control Panel >Network and Internet >Network andSharingCenter and click on your network
  • 21. Rule#1 Requireapasswordto accessyour computer Why? Prevents unauthorized access Providesafirst line of defense Prevents easy accessfrom a network TIP: Set up automatic lockout that requires a password.Agood timeout value is5to 10 minutes.
  • 22. Rule #2 Don’t forget your cell phone Usestrong passwords– >8 characters, letters,numbers and symbols Use“coded” phrases (e.g.H@m5t3@k!) Don’t store passwords in afile (unencrypted) Don’t keep them near the computer Useapassword vault such as“Lastpass”
  • 23. Makesfilesanddisksunreadablewithout theencryption key Youcanencrypt:  Hard Drive orUSBDrive –Windows BitLocker Windows 7upgrade $139,Windows 8.1/10 included. Start button>all programs>Windowsanytime upgrade  Individual Files–Axcrypt– Freeopen source  BusinessEmail –using avirtual personal network(VPN) Windows Start button >typeVPNinto the program searchwindow Protects against theft or lossof acomputer
  • 24. Confidential Information your business is required to protect with encryption includes: Medical Data defined by HIPAA (Health Insurance Portability and Accountability Act) Must also include staff training Financial Data defined byPIC (Payment Card Industry) Do NOT permanently store card data on your system Recommend using 3rd party providers
  • 25. SPAMFilters Keepsout email from unknown senders Catches majority ofSPAM Catches non-SPAM Allows knownemail SPAMFilters aren’t perfect! WEBFilters Prohibits bad websites Pre-examines website content and warns you Catches good websites Allows knownwebsites Web filters aren’t perfect!
  • 26. • Anti-Virus & Anti- SpywarePrograms • Scansemail, attachments files,& downloads • Detects threatsand Removesthem • Not perfect, doesnot detect everything, cannot remove all threats
  • 27. Youand your employees arethe last line ofdefense After all the layers of protection, you are the decisionmaker DENY!!! Cyber Security PartIII
  • 28. If you provideWi-Fi forCustomers Yourexisting router may have a “guest” feature Besureto useWPA2encryption on your Private Network Verify firewall Install dedicated customer“hot spot” hardware and software Does not require company to have any Wi-Fi exposure. Protect private proprietary information from public users. Improve customer internet experience and security Include filtering to avoid risky or offensive websites Providesfeatures suchasterms of serviceor time limits. Worryfree 24x7TechnicalSupport, Monitoring, & Maintenance
  • 29.
  • 30.  Provide securitytraining  Have companypolicies For email & internet use Company & confidentialinformation Make them written and update them  Limit administrative and passwordaccess  Restrict software on companycomputers
  • 31. Control Downloads ofSoftware Never allow “pirate”websites music, games, movies(BitTorrent) BewareofALLfree software, know the source Danger areas Adobe Flashfiles –updateoften Shortened urlsyou can’t check–know the source Email attachments or links –hover over “clickhere”
  • 32. S ource of file? T ype & size of file? O thers recommend? P repared to scan? This is a fake anti-virus program. Once loaded it claims your computer is infected and directs you to to buy the program via credit card.
  • 33. Type Source Purpose Protection Virus Email Ads Links Warnings Updates Malicious attack Disable yourcomputer Destroy yourdata Anti-virus software Firewall software Firewall hardware Data back-up Phishing Email Website Steal Identity ormoney Surfingbehavior Adware Ads Virus delivery, steal information Goodpractices Spyware Stealpersonal information Anti-spyware &firewall software Tip: Have bothAnti-Virus AND Anti-Spyware installedon your computer.. But DO NOT install two anti-virus programs.
  • 34. Thesescamswill comeintheform of: Email Website Phone Call TextMessage (phishing) (pharming) (vishing) (smishing) ACombination ofThese
  • 35. Requestspersonalinformation? Containsgrammatical errors? misspellings'? How do they addressyou? Isit too good to be true? Have you checked thelink? Tip: “MouseOver” Doesthe websiteURLlook legitimate? Tip: Legitimate companies will NEVERaskyou for personalor confidential information via email, awebsite, telephone,or text message.
  • 36. R eceived Before? I nside Links? S ensible Message? K nowsender? This email link delivers a Trojan Virus right to your computer
  • 37. Beware of searchengineresults Do not download unknownor free software “Unclick”/DECLINEany OPTIONAL Downloadsor Toolbars UseSucuriSiteCheck http://sitecheck.sucuri.net/ Tip: When installing programs pay attention to installation options.They make you think you’re declining, butyou’re approving!
  • 38.  Only loginor sendpersonal information to websitesyou know areencrypted  Awebsite isencrypted when you seethe“lock” symbol or https://  Bewareof websitesusingencryption only onthe login page
  • 39. Don't stay signed in toaccounts When you are done, logout Don’t do sensitive businesson publicWiFi Don’t usethe same password,varyit Keepyour browser(s)up-to-date Orswitchto Firefox,Chrome,orApple
  • 40. Tip: Don’t useyour browser to store passwords, not secure.
  • 41. DoNOTfriend,link,ormessagepeopleyoudon’tknow Donotallowuntrustedapplicationsto accessyouraccount Do not clickonpostedvideos NEVERPOST • Youor your family’s full birthdates or places of birth • Your mother’s maidenname • Thenamesof young family members • Your relationshipstatus
  • 43. Boots very slowly or hangsup Respondsslowly,crashes Programs won’t run or crash Popups, website redirection Broken antivirus orsecurity Tip: You can “right click” on the task bar and select the “Task Manager” to see the memory and CPU usage that is currently taking place on your computer.Shouldnot be constantly 100%.
  • 44.
  • 45. Tip: A foolproof way to keepa virus from stealing your personal info -disconnect the network cable or turn off the Wi-Fi. THENtake action.
  • 46. Anti-virus can’t removeit Computer is notunusable Your files aremissing Youmust manually edit Windows Yournot absolutelysure your actions won’t make mattersworse!
  • 48. External Hard DriveBackup Windows Backup Time Machine(Mac) CloudBackup Carbonite CrashPlan File SyncService (not reallyabackup) Dropbox GoogleDrive REGULAR BACKUP JUST DO IT.
  • 50.
  • 51. • Backupsaves/restores your datafiles • Backupalsocreatesaseparatesystemimage forrestoringprograms&Windows Overwrites EVERYTHING whenrestored Canonly be usedif asystem repair disk wascreated
  • 52. Router 2550 Various –Netgear,Linksys, Belcan,et.Al. CloudbackupOR External HardDrive 600/year 3500once Carbonite -www.carbonite.com WindowsBackupSoftware Anti-Virus 940/year AVGAntivirus –www.avg.com Firewall 0 WindowsFirewall Anti-Spyware 0 Malwarebytes – www.malwarebytes.org Anti-spam 0 Builtin toAppleMail &Outlook, needsetup Passwordvault 0 Great, but dangerous-Lastpass Totalcost 5000-8000 Do it yourselfcost (Complete packages, installation, andtraining available from ComputerTroubleshooters)
  • 53. 1. Usea Router to hidesyourcomputer/network 2. Make sureyour Windows Firewallisenabled 3. Usestrong passwordson your Router andComputer 4. Useanti-virus/anti-spyware todetect/remove malware 5. Backupyour files and data –regularly 6. Practice safesurfing: if you aren’t sure,don’tclick! 7. Don’t Share Confidential information on Social Media 8. Keep your Smartphones Password protected. 9. Use Anti Virus and Anti Malware.
  • 54. Future in Cyber Security  2.5 Million Cyber Security Job Openings globally in 2019. Niks Technology Private Limited
  • 55. Questions? Let us all come together to prevent Cyber Crime, as TOGETHER WE CAN. Thankyou for the kind support. NiksTechnology wishes youall a QUALITYOF WORKLIFEAHEAD.