security is not complete without you
DESCRIPTION
Presentation during Ignite Maroc Ingénieurs à CasablancaTRANSCRIPT
![Page 1: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/1.jpg)
Sec_rity is not complete
without U!
Yasser ABOUKIRElève ingénieur de l’ENSIAS -
Rabat
![Page 2: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/2.jpg)
TIC au Maroc
Parc Internet 3G
105,03 % sur une année
Sept 2009
566 575 abonnés
Sept 2010
1 161 657 abonnés
Sec_rity is not complete without U!
Utilisateurs d’internet / Ordinateurs Personnels
![Page 3: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/3.jpg)
“ The human factor is truly
security's weakest link
”
« The Art of Deception », Kevin Mitnick
Sec_rity is not complete without U!
![Page 4: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/4.jpg)
Sec_rity is not complete without U!
![Page 5: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/5.jpg)
Sec_rity is not complete without U!
![Page 6: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/6.jpg)
Mots de passe de qualité!
Sec_rity is not complete without U!
![Page 7: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/7.jpg)
Sec_rity is not complete without U!
Je clique, tu cliques!« Always think and DON’T just link»
![Page 8: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/8.jpg)
Attention aux Spam!
Sec_rity is not complete without U!
Courrier indésirables
![Page 9: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/9.jpg)
Sauvegardes régulières!
Sec_rity is not complete without U!
![Page 10: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/10.jpg)
Contrôlez la diffusion d’informations personnelles
Sec_rity is not complete without U!
• Ne jamais saisir d’informations, coordonnées personnelles et sensibles sur des sites qui n’offrent pas toutes les garanties requises.
• Dans le doute, mieux vaut s’abstenir…
![Page 11: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/11.jpg)
Optez pour https://...
Sec_rity is not complete without U!
![Page 12: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/12.jpg)
Logiciels malveillants? (1)Vers et virus
Sec_rity is not complete without U!
Chevaux de Troie
![Page 13: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/13.jpg)
Logiciels malveillants? (2)
![Page 14: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/14.jpg)
Mettre à jours .. à niveau!
Sec_rity is not complete without U!
![Page 15: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/15.jpg)
Social engineering!Manipulation et agression non technique!
Sec_rity is not complete without U!
utilise la serviabilité, la bonne foi ou l'insécurité des personnes pour accéder à des données confidentielles ou conduire la victime à exécuter certaines actions spécifiques.
La plus fructueuse parmi tous les types d'attaques.
![Page 16: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/16.jpg)
Cybercafés et réseaux partagés!
Sec_rity is not complete without U!
![Page 17: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/17.jpg)
The Social Network (1)Usurpation, vol d’identité!
Sec_rity is not complete without U!
![Page 18: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/18.jpg)
The Social Network (2)Applications virales!
Sec_rity is not complete without U!
![Page 19: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/19.jpg)
Let’s sum up!
Sec_rity is not complete without U!
• Sécuriser mots de passe• Update & Backup• Optez pour les Best practices • Attentions aux malveillants• Réseaux sociaux v.s. Privacy• Estimez les risques!
« Sec_rity is not complete without U! »
![Page 20: Security is not complete without you](https://reader034.vdocument.in/reader034/viewer/2022051818/549ca5d3b47959bd318b47b1/html5/thumbnails/20.jpg)
Time’s Up!• About me:
Name: Yasser ABOUKIRSchool: ENSIAS – RabatEcole Nationale Supérieure d’Informatique et d’Analyse des Systèmes
Siteweb: http://www.yaboukir.com
Email: [email protected]: yaboukir
Sec_rity is not complete without U!