how to keep yourself secure while browsing internet pre null meet kolkata

Post on 15-Jul-2015

37 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

#Security Researcher

#Co-Founder of Revolgen Systems

Email: avik.bhattacharjee@revolgen.com

@avikunplugged

MalwareHostile,intrusive or annoying software or

program code(“malicious” + "software“)

Includes computer viruses, worms Trojan horses

,bots, spyware, adware etc.

Software is considered malware based on the

intent of the creator rather than any particular

features

Adware

Advertising-supported software is any software

package which automatically plays, displays, or

downloads advertising material to a computer after the

software is installed on it or while the application is

being used.

Adware is software integrated into or bundled with a

program, typically as a way to recover programming

development costs through advertising income

Spyware

A broad category of software designed to intercept or

take partial control of a computer's operation without

the informed consent of that machine's owner or

legitimate user

In simpler terms, spyware is a type of program that

watches what users do with their computer and then

sends that information over the internet

Phishing A criminal activity using Social Engineering

techniques.

An attempt to acquire sensitive data, such as

passwords and credit card details, by masquerading

as a trustworthy person or business in an electronic

communication.

Typically carried out using Email or an IM

Protect your Passwords

Top 20 passwords of all time

CREATING A STRONG PASSORD THAT IS EASY TO REMEMBER

WHAT TYPES OF PASSWORD TO AVOID

Dictionary word in any language

Word spelled backwards, common misspellings and

abbreviations.

Sequence or repeated characters Such as using a row

of adjacent letters or numbers on your keyboard.

Personal information such as your name,birthday

,Drivers License.

Cyber criminals use Advance tools for password cracking

Tracks you Leave on the internet

Protect your Lovable

Turn off Sharing

Avoid Automatically Connecting toWIFI

Hotspots

Turn on Firewall

VPN

1.Use HTTPS

2. Use Two-Factor Authentication

3. Confirm the Network Name

4. Protect Your Passwords

5. Run Anti-Virus Software

Tor – Onion Proxy

How Tor Works

Thanks!

top related