3 day Workshop on Cyber Security & Ethical Hacking



Similar documents
OIG Fraud Alert Phishing

& INTERNET FRAUD

Why is a strong password important?

Protecting your business from fraud

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Malware & Botnets. Botnets

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Don t Fall Victim to Cybercrime:

Loophole+ with Ethical Hacking and Penetration Testing

How to Identify Phishing s

PREVENTING HIGH-TECH IDENTITY THEFT

Advice about online security

Online Security Information. Tips for staying safe online

Tips for Banking Online Safely

Infocomm Sec rity is incomplete without U Be aware,

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

BE SAFE ONLINE: Lesson Plan

Deter, Detect, Defend

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

High Speed Internet - User Guide. Welcome to. your world.

FORBIDDEN - Ethical Hacking Workshop Duration

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Cyber Security. Securing Your Mobile and Online Banking Transactions

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

STOP THINK CLICK Seven Practices for Safer Computing

The Information Security Problem

National Cyber Security Month 2015: Daily Security Awareness Tips

Internet threats: steps to security for your small business

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Business Internet Banking / Cash Management Fraud Prevention Best Practices

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Business ebanking Fraud Prevention Best Practices

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

7 PRACTICES FOR SAFER COMPUTING

Information Security

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

OKPAY guides. Security Guide

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Protection from Fraud and Identity Theft

How to stay safe online

Open an attachment and bring down your network?

Identity Theft Protection

Common Cyber Threats. Common cyber threats include:

2009 Antispyware Coalition Public Workshop

Introduction to Computer Security

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Why The Security You Bought Yesterday, Won t Save You Today

Identity Theft and Strategies for Crime Prevention

Remote Deposit Quick Start Guide

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Know the Risks. Protect Yourself. Protect Your Business.

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Information Security. Louis Morgan, CISSP Information Security Officer

DVD Companion Learning Guide

10 Quick Tips to Mobile Security

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Protect yourself online

Cybersecurity Best Practices

Internet tools and techniques at this level will be defined as advanced because:

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Retail/Consumer Client. Internet Banking Awareness and Education Program

Payment Fraud and Risk Management

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

ONLINE ACCESS ONLINE ACCESS FAQS FAQS

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

Learn to protect yourself from Identity Theft. First National Bank can help.

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Internet basics 2.3 Protecting your computer

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Transcription:

3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer

What is Cyber Security? What is Ethical hacking? What is Computer Science?

Information Systems Input Processing systems Output Information Systems Computer hardware Computer Software Network Information Systems Human Resources Database Many More Components of IS

Security-Information Systems Controls for Securing a facility 1. Walls, fence and gates 2. Guards 3. Dogs 4. Id cards and badges 5. Monitoring 6. Alarms systems What is Cyber security??? Controls for Securing a IS 1. Username 2. Passwords 3. Keys 4. Encryption/decryption 5. Digital signatures 6. Public /private data binding 7. Hacking(Ethical) 8. Pentest Cyber word is used to describe virtual world of computers. Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks.

What is Cyber Crime? Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. These crimes can be divided into three broad areas: Attacks against computer hardware and software for example, botnets, malware and network intrusion. Financial crimes and corruption such as online fraud, penetration of online financial services and phishing Abuse, in the form of grooming or sexploitation', especially crimes against children.

Indian Act Indian parliament passed its INFORMATION TECHNOLOGY ACT, 2000 on 17th oct to have its exhaustive law to deal with the technology in the field of e-commerce, e-governance, e- banking as well as penalties and punishments in the field of cyber crimes. GO ON Search Top Cyber Attacks on Google

Hacking In the early 1990s, the word hacker was used to describe a great programmer, someone who was able to build complex logics. Over time the word gained negative hype, and the media started referring to a hacker as someone who discovers new ways of hacking into a system. Therefore, the term has been broken down into three types: 1. White hat hacker 2. Black hat hacker 3. Gray hat hacker

Phishing Attack An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information to be used for identity theft. One such example is- You get an Email from unknown sender including names of FB in email id that your password is breached and change your password asap through this link provided. When you click on the link you are transferred to a page that resembles FB in every case. You as a novice user fill the username and password and gets some notification that enter again. This whole process concludes that your username and password is captured and will be changed very soon without your info.

Hands on Phishing attack!

8 Ways To Avoid Phishing or Security Theft To help you protect yourself from phishing, we offer the following tips: 1. Guard against spam. 2. Communicate personal information only via secure web sites---in fact: When conducting online transactions, look for a sign that the site is secure such as a lock icon on the browser s status bar or a https: URL whereby the s stands for secure rather than a http:. 3. Do not click on links, download files or open attachments in emails from unknown senders. 4. Never email personal or financial information, even if you are close with the recipient. 5. Beware of links in emails that ask for personal information. 6. Beware of pop-ups and Never enter personal information in a pop-up screen. 7. Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. 8. Check your online accounts and bank statements regularly to ensure that no unauthorized transactions have been made.

For any Query: Email at:- mashkoor.hammad@gmail.com Or Search Hammad Mashkoor Lari On