ATM Card Safety• Always use the same ATM as far as possible
• Most ATM keyboards and card slots are set within the body and are not projecting above the base. Check to be sure
• When entering your PIN number, cover it using your hand
• Always follow your card at restaurants and fuel refilling stations
Security -The new face of Information Technology Services 5
Wireless Network Threats
6
accidental association
malicious association
ad hoc networks
nontraditional networks
identity theft (MAC
spoofing)
man-in-the middle attacks
denial of service (DoS)
network injection
Not only terrorism, what else
7
Connected to open network?– Attacker can read your mails– Attacker can see your password (even gmail)– Attacker can see your credit card numbers– Attacker can access confidential information on
your computer– Attacker can chat with your girlfriend posing as
you.
Wireless Security Techniques
8
use encryptionuse encryption
use anti-virus and anti-spyware
software and a firewall
use anti-virus and anti-spyware
software and a firewall
turn off identifier broadcasting
turn off identifier broadcasting
change the identifier on your router from the
default
change the identifier on your router from the
default
change your router’s pre-set
password for administration
change your router’s pre-set
password for administration
allow only specific computers to access your
wireless network
allow only specific computers to access your
wireless network
Further Advised
9
• Change the router login password frequently• Change the wireless WPA password frequently• Avoid temptation to connect to open wireless just looking for free
internet.• We can configure DHCP more tightly.
Example I have 3 machines at home, I’ll create a IP pool of 3 IPs onlyI’ll do DHCP reservation using the MAC of these 3 IP Effectively I’m not allowing any outsider machine to connect
• We can configure MAC binding.Allow only MY machines to connectMany access points support MAC bindingAny other machine will not be able to connect to my Wi-Fi
Other Cyber Crimes
10
CYBER CRIME ACTION AGAINST THE CRIME
CYBER STALKINGCyber stalking is a criminal offense with penalties against the assailant, including jail.
CRIMES INVOLVING MONEY imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
CYBER PORNOGRAPHYimprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees.
CHILD PORNOGRAPHYimprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.
CYBER BULLYING, ONLINE GAMBLING, EMAIL SPOOFING
Cyber Bullying is one type of "Unauthorized use" or "Unauthorized access to the facilities". This is "hacking" under Section 66 of ITA 2008 and also liable for compensation under Section 43 of ITA 2008.
IDENTITY THEFT, INTELLECTUAL PROPERTY CRIMES, DENIAL OF SERVICE ATTACK.
imprisonment for a term which may extend to three years and shall also be liable to fine which may extend to rupees Ten lakh.
What You Can Do
11
• Avoid leaving your laptop unsupervised• Set up a user account and password to prevent unauthorized
access to your computer files.• Know what you can share.• Learn about reporting options• Learn and set your privacy settings• Block Cyberbullies• Save the Evidence• Create strong passwords• Set up new Accounts• Talk to your elders.• Choose your friends wisely• Find out consequences for inappropriate posts.• Use appropriate usernames• Be careful while posting comments, pictures and videos.• Scan your computer for virus/ missing OS files from time to time
Dos• Secure your passwords:» Use a different password for each account» Use a mix of Upper Case, Lower Case and special characters
• Signing in and out
• Use secure networks ( HTTPS )
• Keep your device clean
• Do tell your parents immediately if you have encountered any problem while using the internet or if you have engaged in an uncomfortable situation.
• Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see.
• Treat others online the way you’d like to be treated.
Security -The new face of Information Technology Services 12
Don’t• Posting your personal profile on the web. This may be used by online
predators against you
• Don’t give your real identity to anyone you meet online. This includes your real name, address, school information, e-mail address, password, and bank account information.
• Don’t reply to or start a conversation with people you don’t know. Don’t accept gift offerings from them.
• Don’t fill out any survey, membership, or application forms asking for your personal information
• Don’t disable any security settings your parents have set such as antivirus, firewall, filtering,
• Don’t download any files that are given to you by people you’ve met online. Don’t download any files from your e-mail unless they are solicited.
Security -The new face of Information Technology Services 13
QUESTIONS
14
For more information about cyber-safety at UC Davis, visit http://security.ucdavis.edu.
For answers to questions about this tutorial, contact [email protected]
For help implementing a cyber-safety measure on your work/school computer, contact IT Express at 0657289938787