dos and don'ts of internet security

35
Dos & Don'ts Of Internet Security

Upload: quick-heal-technologies-pvt-ltd

Post on 14-Jul-2015

300 views

Category:

Software


1 download

TRANSCRIPT

Dos & Don'ts Of Internet Security

Topics of Discussion:

• Most Popular Online Activities

• Who is Watching You Online

• Types Of Online Threats & How To Stay Safe From Them

• Basic Security Tips For Internet Hygiene

• How Quick Heal Helps You Stay Safe

Social NetworkingSearch EnginesE-Mails

Online Media

ConsumptionOnline Banking Online Shopping

Most Popular Online Activities

• Scammers

• Hackers & Wannabe's

• Phishers

• Insiders

• Advertising Professionals

• Recruiters

Who is Watching You Online?

Types Of Online Threats

• Hacking

• Phishing

• Spyware

• Viruses, Worms & Trojans

• Adware

• Spams

• Freak Attacks - The Latest One

Online Threat: Hacking

What is Hacking?

• Hacking is the act of gaining unauthorized access to a system or the data within a system.

• Information is extracted involuntarily through sophisticated electronic methods in a hacking attack.

• Hackers often use the information for financial gains or spread of malicious viruses.

Photo credit: devdsp / Foter / CC BY

https://www.flickr.com/photos/devdsp/6999839463/

How To Avoid Getting Hacked

• Always use a Sophisticated Security Software.

• Use a Personal Firewall which makes your computer invisible to hackers.

• Make sure your security software, OS & other software are up-to-date.

• Run frequent virus scans on your computer.

Photo credit: Danny Oosterveer / Foter / CC BY-ND

https://www.flickr.com/photos/dannyoosterveer/7913182734/

Online Threat : Phishing

What Is Phishing?

What is Phishing?

• Phishing is a criminal activity that uses social engineering techniques to steal user information.

• Phishers refers to scammers who fraudulently acquire sensitive information such as passwords, personal information, credit card/financial details, etc., by masquerading as a trustworthy person or business.

• Phishing is usually carried out via emails, and also via SMSs and Voice over IP (VoIP) calls.

Types Of Phishing

• Spear phishing

• Clone phishing

• Whaling

• Voice Phishing

• SMShing

A Typical Phishing Attempt

How To Stay Safe From Phishing

• Do not click any links in emails that pose to be from your bank seeking for critical information.

• Access your bank’s website by manually typing its URL in the address bar.

• While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.

• Never respond to SMSs or calls from unknown numbers, especially when they ask for your personal or financial information.

Online Threat: Spyware

What is a Spyware?

• Spyware is a software that gathers information about a person or organization without their knowledge or asserts control over a computer without the consumer's knowledge.

• Spyware often collects valuable data such as passwords, software keys, etc.

How Does A Spyware Spread?

• A spyware usually gets installed without the user’s knowledge, or by using deceptive tactics.

• When the user accesses a web page controlled by the spyware author, the page forces the installation of the spyware.

• A spyware also gets installed when a user installs a piece of free software.

Source : Wikipedia

Keylogger - A Typical Spyware

• A keylogger is a spyware that has the capability to record use keystroke.

• Every password, every text you type using your keyboard gets exposed to the third party.

Photo credit: Robbert van der Steeg / Foter / CC BY-SA

https://www.flickr.com/photos/robbie73/4853086176/

How To Stay Safe From Spyware

• Make sure you have an antivirus with spyware protection installed on your computer.

• Regularly update your antivirus.

• Make use of Virtual Web Based Keyboards provided on your banking portals while making any financial transactions.

• Keywords Provided By OS are not very effective against keyloggers.

Online Threat : Viruses, Worms & Trojans

What are Virus, Worms & Trojans?• Virus : Virus is a program that replicates. It spreads from file to file on your system infecting them.

• Worm : A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.

• Trojan : Trojan horses pose as useful software, such as a legitimate program, but are designed to perform malicious activities.

How To Stay Safe From Virus, Worms & Trojans

• Regularly update your Antivirus Software.

• Always Keep the Virus Protection ON.

• Run weekly virus scans on your computer.

• Always scan external devices before use.

• Never download a file from an unverified source or sender. This includes e-mail attachments coming from unknown senders.

Photo credit: Yuri Yu. Samoilov / Foter / CC BY

Original image URL: https://www.flickr.com/photos/110751683@N02/15462325023/

Online Threat: Adware

What Is An Adware?

• Adware is short for 'Advertising related software'

• Adware is a software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online

How To Stay Safe From Adware?

• Do not download unnecessary software from the

Internet.

• If a download screen appears when you are not

trying to download anything, do not proceed.

• Avoid clicking on the advertisement pop-ups

which give something for free.

• Enable the pop-up blocker in your web browser.

Photo credit: perspec_photo88 / Foter / CC BY-SA

https://www.flickr.com/photos/111692634@N04/11407095883/

Online Threat:Spam

What is Spam?

• Spam refers to unsolicited messages sent over the Internet to a large numbers of users.

• Often used for promotional use or to spread malicious software.

• Clogs up the email server bandwidth & makes the network slow for everyone.

Photo credit: comedy_nose / Foter / CC

BYhttps://www.flickr.com/photos/comedynose/4236355151/

Common Internet Scams Through Spam E-Mails

• Stranded Traveler Scam

•Work from Home Scam

• Nigerian Scam

• Email Lottery Scam

•Astrology/Psychic Scam

How To Avoid Spam?

• Make use of the e-mail security feature in your security product.

• Report unwanted or unsolicited emails as spam.

• Delete spam emails.

• Never publish your email address on public platforms.

• Never respond back to or unsubscribe to spam emails

• Register only with email subscribers who provide spam filters such as Gmail, Yahoo, etc.

buggolo / Foter / CC BY

https://www.flickr.com/photos/buggolo/311134262/

Online Threat:Freak Attack

What Is a Freak Attack?

• Freak attack enables malicious parties to intercept web browsers and crack them over a few hours.

• Right now the FREAK vulnerability primarily affects Android and Apple Safari web browsers.

• The attackers can steal confidential passwords and other sensitive data.

Security Against Freak Attack - Way Ahead

Basic Security Tips For Internet Hygiene

• Create long, unique, and hard-to-guess passwords. Never keep the same password for different online accounts.

• Keep your computer’s antivirus protection & Firewall ON.

• Avoid public networks for accessing websites that require you to sign in to access any information.

• Always update your Antivirus Software, OS, Internet browsers and software on your computer.

• Install software & apps only from trusted and official sources.

• Never download attachments from unknown senders

• Do not click on any links in emails to access your bank’s website.

• Access your bank’s website by manually typing its URL in the address bar.

How Can Quick Heal Help

Thank [email protected]

Follow us on:

Facebook -www.facebook.com/quickhealav

Twitter -www.twitter.com/quickheal

YouTube - www.youtube.com/quickheal

SlideShare - http://www.slideshare.net/QuickHealPPTs

Website -www.quickheal.com

Official Blog -www.blogs.quickheal.com

References

•http://en.wikipedia.org/

•http://blog.varonis.com/whats-difference-hacking-phishing/

•http://blogs.quickheal.com/wp/freak-image/

•http://blogs.quickheal.com/wp/50-dos-and-donts-of-internet-security-for-the-year-2015/