information security: "myths & realities"

122
Your Logo INFORMATION SECURITY “The Myths & Realities” Muhammed Usama Bin Shihab www.usama.in

Upload: usamaxtrendz

Post on 21-Jun-2015

481 views

Category:

Technology


1 download

DESCRIPTION

Including detailed information and statistical data of different information security aspects. Security treats affects daily computing. etc.

TRANSCRIPT

Page 1: Information Security: "Myths & Realities"

INFORMATION SECURITY“The Myths & Realities”

Muhammed Usama Bin Shihab

www.usama.in

Page 2: Information Security: "Myths & Realities"

Internet Ethics

Ethical rules for computer users

Do not use computers to harm other users.Do not use computers to steal others information.Do not access files without the permission of the owner.Do not copy copyrighted software without the author’s permission.Always respect copyright laws and policies.Respect the privacy of others, just as you expect the same from others.Do not use other user's computer resources without their permission.Use Internet ethically.

Page 3: Information Security: "Myths & Realities"

Copyrights

Copyright refers to a form of intellectual property that gives the author of an original work exclusive right for a certain time period

in relative to that work, including its publication, distribution etc. Copyright is

described under the umbrella term intellectual property along with rights and

trade name.

Page 4: Information Security: "Myths & Realities"

And what’s in copyrights?

Literature like poems, stories, articles etc.

Photographs, Graphical Illustrations etc.

Idea, Design etc.

Music, Movies etc.

Page 5: Information Security: "Myths & Realities"

And what’s in copyrights?

Literature like poems, stories, articles etc.

Photographs, Graphical Illustrations etc.

Idea, Design etc.

Music, Movies etc.

Page 6: Information Security: "Myths & Realities"

Downloads

Page 7: Information Security: "Myths & Realities"

How to download safely???

Be SecuredYou must powered byA good antivirus or siteAdvisor programs.

Use Common SenseIf you want a music,Then no need for download an .exe file

Verify & ConfirmCheck user reviews &Comments and confirm the content is genuine

Page 8: Information Security: "Myths & Realities"
Page 9: Information Security: "Myths & Realities"
Page 10: Information Security: "Myths & Realities"
Page 11: Information Security: "Myths & Realities"
Page 12: Information Security: "Myths & Realities"
Page 13: Information Security: "Myths & Realities"

The “GAMER” facts

Page 14: Information Security: "Myths & Realities"
Page 15: Information Security: "Myths & Realities"
Page 16: Information Security: "Myths & Realities"
Page 17: Information Security: "Myths & Realities"
Page 18: Information Security: "Myths & Realities"
Page 19: Information Security: "Myths & Realities"
Page 20: Information Security: "Myths & Realities"
Page 21: Information Security: "Myths & Realities"
Page 22: Information Security: "Myths & Realities"
Page 23: Information Security: "Myths & Realities"
Page 24: Information Security: "Myths & Realities"
Page 25: Information Security: "Myths & Realities"
Page 26: Information Security: "Myths & Realities"
Page 27: Information Security: "Myths & Realities"
Page 28: Information Security: "Myths & Realities"
Page 29: Information Security: "Myths & Realities"
Page 30: Information Security: "Myths & Realities"
Page 31: Information Security: "Myths & Realities"

Social Networking

Page 32: Information Security: "Myths & Realities"
Page 33: Information Security: "Myths & Realities"
Page 34: Information Security: "Myths & Realities"
Page 35: Information Security: "Myths & Realities"
Page 36: Information Security: "Myths & Realities"
Page 37: Information Security: "Myths & Realities"
Page 38: Information Security: "Myths & Realities"
Page 39: Information Security: "Myths & Realities"

Social Networking

Page 40: Information Security: "Myths & Realities"

Safe Social Networking Tips

You Guessed It: Use Strong Passwords.

Review Your Apps, Add-Ons and Other

Settings.

Be More Cautious with Mobile.

Sites Update Privacy Settings -- So

Should You.

Beware "Password Check" Sites.

Limit Hardware and Account Access.

Page 41: Information Security: "Myths & Realities"

Social Networking“The Good, Bad and Ugly”

Page 42: Information Security: "Myths & Realities"
Page 43: Information Security: "Myths & Realities"
Page 44: Information Security: "Myths & Realities"
Page 45: Information Security: "Myths & Realities"
Page 46: Information Security: "Myths & Realities"
Page 47: Information Security: "Myths & Realities"
Page 48: Information Security: "Myths & Realities"
Page 49: Information Security: "Myths & Realities"
Page 50: Information Security: "Myths & Realities"
Page 51: Information Security: "Myths & Realities"
Page 52: Information Security: "Myths & Realities"
Page 53: Information Security: "Myths & Realities"
Page 54: Information Security: "Myths & Realities"
Page 55: Information Security: "Myths & Realities"
Page 56: Information Security: "Myths & Realities"
Page 57: Information Security: "Myths & Realities"
Page 58: Information Security: "Myths & Realities"
Page 59: Information Security: "Myths & Realities"
Page 60: Information Security: "Myths & Realities"
Page 61: Information Security: "Myths & Realities"
Page 62: Information Security: "Myths & Realities"
Page 63: Information Security: "Myths & Realities"

Online Banking & E-Commerce

Page 64: Information Security: "Myths & Realities"
Page 65: Information Security: "Myths & Realities"
Page 66: Information Security: "Myths & Realities"
Page 67: Information Security: "Myths & Realities"
Page 68: Information Security: "Myths & Realities"
Page 69: Information Security: "Myths & Realities"
Page 70: Information Security: "Myths & Realities"
Page 71: Information Security: "Myths & Realities"
Page 72: Information Security: "Myths & Realities"
Page 73: Information Security: "Myths & Realities"
Page 74: Information Security: "Myths & Realities"
Page 75: Information Security: "Myths & Realities"
Page 76: Information Security: "Myths & Realities"
Page 77: Information Security: "Myths & Realities"
Page 78: Information Security: "Myths & Realities"
Page 79: Information Security: "Myths & Realities"

1. Amazon.com2. Ebay.com3. Flipkart.com

Page 80: Information Security: "Myths & Realities"
Page 81: Information Security: "Myths & Realities"
Page 82: Information Security: "Myths & Realities"
Page 83: Information Security: "Myths & Realities"
Page 84: Information Security: "Myths & Realities"

Vulnerable Software“Believe it or not”

Page 85: Information Security: "Myths & Realities"
Page 86: Information Security: "Myths & Realities"
Page 87: Information Security: "Myths & Realities"
Page 88: Information Security: "Myths & Realities"

BOTNET

Page 89: Information Security: "Myths & Realities"
Page 90: Information Security: "Myths & Realities"

Be smart with your SMART PHONE

Page 91: Information Security: "Myths & Realities"
Page 92: Information Security: "Myths & Realities"
Page 93: Information Security: "Myths & Realities"
Page 94: Information Security: "Myths & Realities"
Page 95: Information Security: "Myths & Realities"
Page 96: Information Security: "Myths & Realities"
Page 97: Information Security: "Myths & Realities"
Page 98: Information Security: "Myths & Realities"
Page 99: Information Security: "Myths & Realities"
Page 100: Information Security: "Myths & Realities"
Page 101: Information Security: "Myths & Realities"
Page 102: Information Security: "Myths & Realities"
Page 103: Information Security: "Myths & Realities"
Page 104: Information Security: "Myths & Realities"
Page 105: Information Security: "Myths & Realities"
Page 106: Information Security: "Myths & Realities"
Page 107: Information Security: "Myths & Realities"
Page 108: Information Security: "Myths & Realities"
Page 109: Information Security: "Myths & Realities"
Page 110: Information Security: "Myths & Realities"
Page 111: Information Security: "Myths & Realities"
Page 112: Information Security: "Myths & Realities"
Page 113: Information Security: "Myths & Realities"
Page 114: Information Security: "Myths & Realities"
Page 115: Information Security: "Myths & Realities"
Page 116: Information Security: "Myths & Realities"
Page 117: Information Security: "Myths & Realities"
Page 118: Information Security: "Myths & Realities"
Page 119: Information Security: "Myths & Realities"

THINK Twice Before DOBe Safe, Be Secured

An Advice

Page 120: Information Security: "Myths & Realities"

Source courtesy

Google Wikipedia Mashable.com TechCrunch InfoSecAwareness, Government of India Kaspersky Labs TrendMicro – TrendLabs FBI Website CDAC

Page 121: Information Security: "Myths & Realities"

THANKS

Page 122: Information Security: "Myths & Realities"

Who am I?

www.usama.in

@usamaxtrendz

fb.com/usamaxz