securing mobile & online identity in the cyber world
DESCRIPTION
Edgis Sharing Session – Securing Mobile & Online Identity in the Cyber World at Dunearn Secondary School (Upper Secondary) August, 2013TRANSCRIPT
![Page 1: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/1.jpg)
Emil Tan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
Securing Mobile & Online Identity
in the Cyber World
![Page 2: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/2.jpg)
![Page 3: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/3.jpg)
Your Mobile Phone
![Page 4: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/4.jpg)
Mobile Security
Use Password and Encryption to Protect your Data
Password protect and turn on encryption for your mobile device
to prevent unauthorised access to the data stored on your phone.
![Page 5: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/5.jpg)
Malicious Apps
![Page 6: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/6.jpg)
Malicious Apps
Permission List from McAfee’s Consumer Mobile Trends Report (June 2013 edition)
(http://www.mcafee.com/us/resources/reports/rp-mobile-security-consumer-trends.pdf)
![Page 7: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/7.jpg)
Mobile Security
Install Antivirus
This is an app used to detect, stop and remove malware such as
viruses, worm, Trojan horses, spyware, adware, etc. From your
mobile phone.
To ensure that your antivirus software is effective,
set it to update and scan all installed apps automatically.
Do not Install Unknown Apps
Keep your Device & Apps Updated
![Page 8: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/8.jpg)
Mobile Security
Disable WiFi and Bluetooth when not in use
Attackers could access information on your mobile device
through its enabled WiFi or Bluetooth connection.
![Page 9: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/9.jpg)
Account Hijacking
![Page 10: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/10.jpg)
Mobile Security
Never connect to unknown WiFi network
Hackers may setup unsecured WiFi hotspots in public area, once
connected to it, they are able to intercept and steal sensitive data
that you transmit over the Internet.
![Page 11: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/11.jpg)
Mobile Security
Never Jailbreak / Root your mobile devices
Jailbreaking / Rooting might void your device’s warranty and
expose your mobile devices to vulnerabilities that could be
exploited by hackers.
![Page 12: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/12.jpg)
Secure your Mobile Now!
Use Password and Encryption to Protect your
Data
Install Antivirus
Do not Install Unknown Apps
Keep your Device & Apps Updated
Disable WiFi and Bluetooth when not in use
Never connect to unknown WiFi network
Never Jailbreak / Root your mobile devices
![Page 13: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/13.jpg)
Online Identity
An online identity is used to uniquely identify yourself
to others online.
Your personal data such as NRIC, email address and social
media account could be a form of your identity online.
![Page 14: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/14.jpg)
Things you’ve shared
Gender
Relationship Status
Current Living & Hometown Location
Work & Education
Favourite Movies & Music
Family Members
Photos
What are you doing now
Current Location
![Page 15: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/15.jpg)
Why do people share?
![Page 16: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/16.jpg)
Privacy Settings
![Page 17: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/17.jpg)
Privacy Settings
![Page 18: Securing Mobile & Online Identity in the Cyber World](https://reader033.vdocument.in/reader033/viewer/2022052901/5565857ad8b42a723f8b5024/html5/thumbnails/18.jpg)
Securing your Online Identity
Limit Personal Information that you put online.
Use Strong Password.
Use Different Passwords for Different Accounts.
Change your Password Regularly.
Keep your Online Identity Secure.