Presentation is loading. Please wait.

Presentation is loading. Please wait.

WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Similar presentations


Presentation on theme: "WhatsApp – Tweaking Security -The new face of Information Technology Services 1."— Presentation transcript:

1 WhatsApp – Tweaking Security -The new face of Information Technology Services 1

2 2

3 ATM Frauds Security -The new face of Information Technology Services 3

4 ATM Frauds Security -The new face of Information Technology Services 4

5 ATM Card Safety Always use the same ATM as far as possible Most ATM keyboards and card slots are set within the body and are not projecting above the base. Check to be sure When entering your PIN number, cover it using your hand Always follow your card at restaurants and fuel refilling stations Security -The new face of Information Technology Services 5

6 Wireless Network Threats 6 accidental association malicious association ad hoc networks nontraditional networks identity theft (MAC spoofing) man-in-the middle attacks denial of service (DoS) network injection

7 Not only terrorism, what else 7 Connected to open network? –Attacker can read your mails –Attacker can see your password (even gmail) –Attacker can see your credit card numbers –Attacker can access confidential information on your computer –Attacker can chat with your girlfriend posing as you.

8 Wireless Security Techniques 8 use encryption use anti-virus and anti-spyware software and a firewall turn off identifier broadcasting change the identifier on your router from the default change your router’s pre-set password for administration allow only specific computers to access your wireless network

9 Further Advised 9 Change the router login password frequently Change the wireless WPA password frequently Avoid temptation to connect to open wireless just looking for free internet. We can configure DHCP more tightly. Example I have 3 machines at home, I’ll create a IP pool of 3 IPs only I’ll do DHCP reservation using the MAC of these 3 IP Effectively I’m not allowing any outsider machine to connect We can configure MAC binding. Allow only MY machines to connect Many access points support MAC binding Any other machine will not be able to connect to my Wi-Fi

10 Other Cyber Crimes 10 CYBER CRIMEACTION AGAINST THE CRIME CYBER STALKING Cyber stalking is a criminal offense with penalties against the assailant, including jail. CRIMES INVOLVING MONEY imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. CYBER PORNOGRAPHY imprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees. CHILD PORNOGRAPHY imprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees. CYBER BULLYING, ONLINE GAMBLING, EMAIL SPOOFING Cyber Bullying is one type of "Unauthorized use" or "Unauthorized access to the facilities". This is "hacking" under Section 66 of ITA 2008 and also liable for compensation under Section 43 of ITA 2008. IDENTITY THEFT, INTELLECTUAL PROPERTY CRIMES, DENIAL OF SERVICE ATTACK. imprisonment for a term which may extend to three years and shall also be liable to fine which may extend to rupees Ten lakh.

11 What You Can Do 11 Avoid leaving your laptop unsupervised Set up a user account and password to prevent unauthorized access to your computer files. Know what you can share. Learn about reporting options Learn and set your privacy settings Block Cyberbullies Save the Evidence Create strong passwords Set up new Accounts Talk to your elders. Choose your friends wisely Find out consequences for inappropriate posts. Use appropriate usernames Be careful while posting comments, pictures and videos. Scan your computer for virus/ missing OS files from time to time

12 Dos Secure your passwords: » Use a different password for each account » Use a mix of Upper Case, Lower Case and special characters Signing in and out Use secure networks ( HTTPS ) Keep your device clean Do tell your parents immediately if you have encountered any problem while using the internet or if you have engaged in an uncomfortable situation. Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see. Treat others online the way you’d like to be treated. Security -The new face of Information Technology Services 12

13 Don’t Posting your personal profile on the web. This may be used by online predators against you Don’t give your real identity to anyone you meet online. This includes your real name, address, school information, e-mail address, password, and bank account information. Don’t reply to or start a conversation with people you don’t know. Don’t accept gift offerings from them. Don’t fill out any survey, membership, or application forms asking for your personal information Don’t disable any security settings your parents have set such as antivirus, firewall, filtering, Don’t download any files that are given to you by people you’ve met online. Don’t download any files from your e-mail unless they are solicited. Security -The new face of Information Technology Services 13

14 QUESTIONS 14 For more information about cyber-safety at UC Davis, visit http://security.ucdavis.edu. For answers to questions about this tutorial, contact sgandhi@gmeil.com For help implementing a cyber-safety measure on your work/school computer, contact IT Express at 0657289938787

15

16 Thank You Security -The new face of Information Technology Services 16


Download ppt "WhatsApp – Tweaking Security -The new face of Information Technology Services 1."

Similar presentations


Ads by Google