cyber security government ppt by vishwadeep badgujar
Post on 25-Jun-2015
331 Views
Preview:
DESCRIPTION
TRANSCRIPT
Cyber SecurityFor Government Offices
Present Scenario More than 14,000 Indian sites hacked till Oct. this year: Anonymous India hacks Kapil Sibal's official website In year 2010 banks in Maharashtra 826 crore stole by cyber criminals
Pen drives major threat to cyber security: Indian Army Emerging cities being targeted by cyber criminals Domino's India website hacked; 37,000 account credentials leaked
onlineSource: Thinkdigit.com www.thinkdigit.com/latest/hacking.html
Challenges
HACKING & HACKERS
Hackers • Brilliant programmer• Continuously working on one task• Detail knowledge of net or users behaviors
HackingHacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose.
What happen if do not take proper precaution
Risk for Email Account
Un authorized person will use your email data
Change password
Hack Facebook password
Control your Android phone
Misuse your confidential data
Precaution for email account
Password Strategy
Normal : 123india
Good : 123@india
Better : 123&InDIa.NanDurbar
Best : NanDurBar#$%789_..01
Precaution for email account
• Security Questions
Q. Favorite teacher?A. K.Pathak (insecure)
B. 123*pathak (secure)
Precaution for email account
• Use 2 way verification system
Precaution for email account
Google code
229855
Risk Of Social Media (Facebook)
Misuse your public contacts
Spread your personal pics
Harassment
Cyber bullying(mostly child's)
Precaution for Facebook
Precaution for Facebook
Don’t share anyone your personal information
Like : Your mobile no. Security ans( fev-
teacher,food,hobby,book,first mobile no etc.)
Always check your name on Google or Facebook
Precaution for Facebook
Use proper privacy settings for your personal pics
Precaution for Facebook
Use Proper Security Settings
Phishing One of the type of hacking
Mostly Online Banking crime done by this method
Original
Phishing
Always Use Password For Your Devices
• Computer for Administrator Account• Mobile • SIM Card (PIN)• TAB• Turn Off Remote Access • Change your PIN for bank account (ATMs)
Challenges of Wireless Networks
• Easy to Hack or Crack• Always use Password protection• Use strongest password• For office : Create MAC filters • Insecure WI-FI Router(open access)
Should share your information to others
Walking Vulnera
bility
Wi-Fi, Bluetoot
h, Infrared
Insecure
privacy
Antivirus &
Firewall
Smart Mobiles
Smart Mobiles
Hotspot
SIM CARD CLONING
Don’t response miscall +92; #90 or #09 etc.(international no.)
Example +92 4526897854
Privacy blocker
Maxthon BrowserInternet Explorer
Child Safety
Internet Explorer Tools
Internet options Contents
Enable Parental control
Child Safety
Sexual MaterialNudity
Violence GamesDrugs Virus
SITUATION OF COMPUTERS IN
GOVT. OFFICES
ILLITERACY ABOUT CYBER CRIME, HACKING, & CYBER SECURITY COMPUTERS CONTAINS MANY VULNERABLE POINTS INSECURE INTERNET CONNECTIONS OR USE
USERS USING WEEK PASSWORD OR NO PASSWORDIMPROPER USE OF SECURITY SOFTWARES Ex. FIREWALLS ETCFREE ENVIROMENT OF PHYSICAL & NETWORK ATTACKS AND MUCH MORE…….
How to Secure Government Offices
MAXIMIZE USE OF SECURITY SOFTWARE'SMAXIMIZE USE OF SECURITY SOFTWARE'S
PROPER CONFIGURATION OF FIREWALLS
PROPER CONFIGURATION OF OPERATING SYSTEMS
INSTALLING ESSENTIAL SOFTWARE'S WITH PROPER CONFIGURATION
INSTALLING ESSENTIAL SECURITY CERTIFICATES
MANAGING SECURE INTERNET CONNECTIONS
& NETWORKS
MONITORING ACTIVITIES ON INTERNET AND NETWORKS
About UsWE ARE WORKING IN
• Cyber security programs• Create Hackproof office networks• Maintaining Computer Networks & Hardware
TRAINING • Run Ethical Hacking Courses• Networking Training Center
SOCIAL RESPONSIBILITY • Run Cyber Security blog on facebook
Revolution computers
Our Facebook community page: - Ethical Hacking & Networking, security n joy
Cyber Crime Trainer, Nandurbar Police
Finish
Thank You
top related