online security and how to make money online

32
Online Security & Money Making By : Nader Alkeinay

Upload: nader-alkeinay

Post on 04-Aug-2015

69 views

Category:

Education


1 download

TRANSCRIPT

Online Security&

Money Making

By : Nader Alkeinay

My Background • Degree in Software engineering from Coventry

university • Master in information system from Coventry

university .• Currently doing my PhD in computer science

specialized in social networks and there privacy at USIM

• CEO and founder for : – IslamTag social network – Zcholar academic network – TenRM Marketplace – GOBIG venture – 2ech Magazin – Postsaler FB marketing

Objective • Explain the different types of computer

crime and the difficulties of discovery and prosecution.

• Describe the aspects of securing corporate data, including software and data security, disaster recovery plans, and security legislation.

• Describe in general terms how viruses work, the damage they can cause, and procedures used to prevent this damage.

• Explain the threats to personal privacy posed by computers and the Internet. Describe actions you can take to maximize your privacy

The Internet “A World of Opportunities”• A way to communicate with friends, family, +

colleagues

• Access to information and entertainment

• A means to learn, meet people, and explore

CYBERWAR BECOMES A REALITY

Security VS Privacy Keep data secure• Destruction• Accidental damage• Theft• Espionage

Keep data private• Salaries• Medical information• Social security

numbers• Bank balances

What they Hack ?• Corporate networks

– Over half largest corporations were invaded

– Competitors?• Government networks

– Dept of Defense attacked more than 200,000 times per year

– Computer attack abilities of other nations?

• Web sites

Internet Risks and ThreatsTo PC Security

Viruses Worms Trojan Horses Spyware

Viruses/WormsSoftware programs designed to invade your computer, and

copy, damage or delete your data

Trojan HorsesViruses that pretend to be programs that help you while destroying

your data and damaging your computer

SpywareSoftware that secretly watches and records your online activities or send you endless

pop-up ads

Leading Threats to PC Security

Michelle Hargarten
add in better images.

Social engineeringCon artist – persuade others to give away their passwords over the phone

Electronic pickpocketsUse computers to transfer or change assets to their advantage

PredatorsThese people use the

Internet to trick children into meeting with them

in person.

File-share AbuseUnauthorized sharing of music, video, and other

files may be illegal, and download

malicious software.

Cyberbullies Both children and adults may use the Internet to

harass or intimidate other people.

Invasion of PrivacyIf kids fill out online forms, they

may share information you don’t want strangers to have about them or your family.

Disturbing Content

If kids explore unsupervised, they could stumble upon

images or information you may not want them exposed to.

Primary Online Risks for Children

www.microsoft.com/protect

SpamUnwanted e-mail,

instant messages, and other online communication

PhishingE-mail sent by online criminals to trick you

into going to fake Web sites and revealing

personal information

Identity TheftA crime where con

artists get your personal information

and access your cash and/or credit

HoaxesE-mail sent by online

criminals to trick you into giving them money

Primary Threats to Personal Online Safety

www.microsoft.com/protect

So…

What You Have• Key• Badge• Token• Plastic card – magnetized strip• Active badge – signals wearer’s

location using infrared signals

So…

What You Know• Password• Identification number• Combination

So…

What You Are • Biometrics – science of

measuring individual body characteristics

• Fingerprints• Voice pattern• Retina of the eye• Entire face

How did they get my data ?

So…

What You Do• Verify signature – software

verifies scanned and online signatures

Now its Easy

Help Protect Information

Practice Internet behavior that lowers your risk

Manage your business information carefully

Use technology to reduce nuisances, and raise the alarm when appropriate

Delete Spam without Opening It

• Never reply to spam• Technology can help

you identify spam so you can delete it

• Many Internet providers delete it for you

Michelle Hargarten
add in new image.

Use Strong Passwords• Keep passwords

private and create ones that are hard to “crack”

• Never share your passwords with friends or be tricked into giving them away

Michelle Hargarten
add in new image.

Install Antivirus Software• Anti-virus software

can detect and destroy computer viruses before they can cause damage

• Just like flu shots, for anti-virus software to be effective, you must keep it up to date

Don’t let it expire

Back up your files regularly

Think before you click

Read website privacy statements

Close pop-ups using red “X”

Michelle Hargarten
recreate graphic on right to match template.

HOW TO MAKE MONEY ONLINE