SlideShare una empresa de Scribd logo
1 de 28
Presented by: Ahmad Salah


       eng.ahmad.salah84@gmail.com
     https://twitter.com/AhmadSalahE
eg.linkedin.com/pub/ahmad-salah/32/b11/4a3
    http://ahmadsalahe.blogspot.com/
•   Why Should We Protect Our Data?
•   Who Is The Hacker?
•   Why Is the Hacker Interested In Hacking Us?
•   Misconceptions
•   How Not To Be An Easy Target?
Data




         Banking Information

      Usernames and Passwords

Intellectual Property and Trade Secrets

      Personal Files and Photos
Data

Person Uses
 Computer
Money        Entry Point




Identity Theft   Cover Tracks
Antivirus doesn’t protect against zero day attacks

   Antivirus doesn’t protect against malware

Antivirus doesn’t protect against network attacks
Doesn't protect when you click on a malicious link

 Doesn’t protect when you open an infected file
Phishing Attacks are very easy and effective

               I Sent This Mail


                         Fake Email Address

                                    Infected
                                   Attachment


                      Malicious URL
No one will ask you to reset your password via email




    You will not win a prize or trip from an email
Verify that the email come from a trusted source

Avoid following shortened links or links have IP address

Move the mouse cursor over the hyperlink before clicking

Don’t open attachments unless you verify from the source

Copy the link to your address bar instead of clicking on it
Brute-force Attack               1) Use long passwords
                                     2) Use Complex Passwords
                                     3) Change your password
                                    frequently

                        Estimated time to crack Estimated time to crack
  Password length       password From 4 Years     password nowadays

8 Characters password        22875 years                3 days
Dictionary Attack   1) Use unpredictable
                       password
                    2) Don’t Use predictable
                       combinations e.g. (name-
                       birth year)
                    3) Avoid sequence keyboard
                       characters e.g. 1234
Use passphrase instead e.g. “I G0 2 School Daily”

    Don’t let the browser remember your password

        Make your email password very complex

Don’t share the same password across multiple websites
Ensure that the traffic is
encrypted (https:// before
         the URL)

Check that there is padlock
located on the address bar
Check that the personal firewall is enabled

                   Avoid online banking

Avoid connecting to your company via VPN


10101010101101010110101110110101101010110100111011101010101101101111
01011010010100100110100110011010111010000001110110101001100110110110

10101010101101010110101110110101101010110100111011101010101101101111
01011010010100100110100110011010111010000001110110101001100110110110
Change the encryption to WPA2 or at least WPA

             Use a very complex password

                          Hide the SSID


 10101010101101010110101110110101101010110100111011101010101101101111
 01011010010100100110100110011010111010000001110110101001100110110110

 10101010101101010110101110110101101010110100111011101010101101101111
 01011010010100100110100110011010111010000001110110101001100110110110
Don’t give untrusted people physical access on your PC.

     Avoid using USB memory as much as you can

             Cover webcam unless used.
1) Switch over to HTTPS.
 2) Don’t click on suspicious links



 1) Don’t follow shortened URLs




1) Don’t post too much information
     2) Switch over to HTTPS.
Use a dedicated computer.

Use an updated (browser, operating system, antivirus)

     Ensure that the personal firewall is enabled

    Don’t open another tabs while online banking

      Don’t share banking information via email
Don’t store any banking information on your PC.

Enter the URL of the online baking website manually

           Logout once you are finished
Install antimalware

Update (operating system, web browsers, PDF readers,
    office, flash player) and any other application

               Disable USP auto run
trendmicrofamilysecurity.com
How not to be an easy target

Más contenido relacionado

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

How not to be an easy target

  • 1. Presented by: Ahmad Salah eng.ahmad.salah84@gmail.com https://twitter.com/AhmadSalahE eg.linkedin.com/pub/ahmad-salah/32/b11/4a3 http://ahmadsalahe.blogspot.com/
  • 2. Why Should We Protect Our Data? • Who Is The Hacker? • Why Is the Hacker Interested In Hacking Us? • Misconceptions • How Not To Be An Easy Target?
  • 3.
  • 4. Data Banking Information Usernames and Passwords Intellectual Property and Trade Secrets Personal Files and Photos
  • 5.
  • 7.
  • 8. Money Entry Point Identity Theft Cover Tracks
  • 9.
  • 10. Antivirus doesn’t protect against zero day attacks Antivirus doesn’t protect against malware Antivirus doesn’t protect against network attacks
  • 11. Doesn't protect when you click on a malicious link Doesn’t protect when you open an infected file
  • 12.
  • 13. Phishing Attacks are very easy and effective I Sent This Mail Fake Email Address Infected Attachment Malicious URL
  • 14. No one will ask you to reset your password via email You will not win a prize or trip from an email
  • 15. Verify that the email come from a trusted source Avoid following shortened links or links have IP address Move the mouse cursor over the hyperlink before clicking Don’t open attachments unless you verify from the source Copy the link to your address bar instead of clicking on it
  • 16. Brute-force Attack 1) Use long passwords 2) Use Complex Passwords 3) Change your password frequently Estimated time to crack Estimated time to crack Password length password From 4 Years password nowadays 8 Characters password 22875 years 3 days
  • 17. Dictionary Attack 1) Use unpredictable password 2) Don’t Use predictable combinations e.g. (name- birth year) 3) Avoid sequence keyboard characters e.g. 1234
  • 18. Use passphrase instead e.g. “I G0 2 School Daily” Don’t let the browser remember your password Make your email password very complex Don’t share the same password across multiple websites
  • 19. Ensure that the traffic is encrypted (https:// before the URL) Check that there is padlock located on the address bar
  • 20. Check that the personal firewall is enabled Avoid online banking Avoid connecting to your company via VPN 10101010101101010110101110110101101010110100111011101010101101101111 01011010010100100110100110011010111010000001110110101001100110110110 10101010101101010110101110110101101010110100111011101010101101101111 01011010010100100110100110011010111010000001110110101001100110110110
  • 21. Change the encryption to WPA2 or at least WPA Use a very complex password Hide the SSID 10101010101101010110101110110101101010110100111011101010101101101111 01011010010100100110100110011010111010000001110110101001100110110110 10101010101101010110101110110101101010110100111011101010101101101111 01011010010100100110100110011010111010000001110110101001100110110110
  • 22. Don’t give untrusted people physical access on your PC. Avoid using USB memory as much as you can Cover webcam unless used.
  • 23. 1) Switch over to HTTPS. 2) Don’t click on suspicious links 1) Don’t follow shortened URLs 1) Don’t post too much information 2) Switch over to HTTPS.
  • 24. Use a dedicated computer. Use an updated (browser, operating system, antivirus) Ensure that the personal firewall is enabled Don’t open another tabs while online banking Don’t share banking information via email
  • 25. Don’t store any banking information on your PC. Enter the URL of the online baking website manually Logout once you are finished
  • 26. Install antimalware Update (operating system, web browsers, PDF readers, office, flash player) and any other application Disable USP auto run

Notas del editor

  1. I have chosen this topic to clarify that there is nothing called 100% secured but we can spend some effort for not being easy targets for hackers, example not leaving the car doors opened and saying who will steal my car?
  2. Banking Information: in the last period there were a lot of malware targeting banking information, Zeus, Spyeye and recently Gauss which is a new malware that infect computer and capture banking login information and it , what if you find in the bank statement that you are stoledUsername and Passwords: personal social network accounts, VPN access to company assets, Banking Login information, personal email (hackers love getting username and passwords)Intellectual Property: which may be the most valuable thing for the organization, what if you are a KFC employee and your computer is hacked because you downloaded infected attachments on your PC and as a result of that KFC trade secret has been exposed to public Personal Files and photos: what if you find that your personal photos are published on the internet
  3. Hacker can be a person or cyber crime organization
  4. Zero Day Attacks: it means that that developers don’t know anything about that attack so they don’t created a patch for that particular attack and hackers nowadays are very well educated and trained to discover new vulnerabilitiesNetwork Attack : for example MITM which means that the attacker is intercepting every single packet originating from you and every single packet coming to you and can modify the data too
  5. Malicious Link: because in this case your PC will call back the hacker and the traffic will be originating from your PC and it will appear as a legitimate traffic for the firewallInfected File: Same as the Malicious link
  6. Phishing is attempting to acquire information such as usernames, passwords, and credit card details by pretending as a trustworthy entity or personEasy: if I want hack a company I have two options either bypassing all the security measures or just sending malicious mail to one of the employees and access the company networkPassword: security administrators, mail administrators, bank stuff Prize : ignore mails that said that you win a prize and to get it you have to click this link or reply with your banking information in order to receive your prizeTrusted source : for example GOOGLE not G00gleShortened links: mails don’t put restriction on the number of characters so they have no need to put shortened links , IP address means that the destination hasn’t registered a domain name so it is very suspicionsMouse: to see whether the URL is suspicious or notAttachments: if you are not expecting an attachments then there is no need to open it, even it is an excel sheet it might be a malware and if you received a mail from your contacts it is a good practice to call him and verify that he sent you this attachment because his mail account may be hackedCopy: sometimes there is something hidden in the URL
  7. I thought it is a good practice to tell you about the common password attacks in order to know why you should make your passwords complexBrute Force Attack: is trying all the possible combination until reaching to the correct password, this attack will get the password for sure but sometime this attack is impractical due to the large time it require but the time issue is significantly reduced, processing power now can try33 billion password per second while it was less than 10 000 password per sec in the last four years due to the rapid technology in processing power For example if the password is 8 characters lowercase and uppercase = 26 power 8 + 26 power 8 instead of being lowercase only which will be 26 power 8Complex : upper case lower case digits special charactersDictionary Attack: is trying every single word in a dictionary for the sake of finding possible match Passphrase: long and easy to rememberBrowser remember your password: because it is stored in clear text and easy to get when your computer is hackedEmail Password: is very important because most of other passwords can be reset by sending you an emailDon’t Share Same passwords across multiple websites: Don’t put all the eggs in one basket e.g. LinkedIn incident when six million accounts are leakedPadlock: means that you are visiting the website that you are expecting and the traffic is encrypted so there is no one looking at your traffic while the transaction (online banking, writing password) is processed
  8. Wireless: your traffic is moving in the air so it is very easy for a hacker to see what you are doing , capturing passwords , modify the traffic, take access to your computer because he is in the same networkPersonal firewall: to protect your Pc. from being hacked VPN: to protect your company from being hacked through you Encryption: is most protective thing you can do . It is very hard to crack WPA2 wireless network while WEP network can be cracked in less than 5 minutesPassword: to make it is difficult for the attacker to take access to your home networkHide the SSID: this will just help
  9. Untrusted people: even if you are using very complex password it is easy to be cracked if I have a physical access on your pcUSB : it is an excellent media to spread a malware Webcam: because if you are hacked the attacker my have access your webcam and record without your knowledge
  10. https: to ensure that your traffic is encrypted no one can understand it even if he can see itSuspicious Links: Facebook hackers often use your friends to send you messages or wall posts with harmful links. Usually these can be detected if they seem uncharacteristic for your friends, but beware of generic messages such as "I just found the coolest video!" or "Do you remember when we did this?" If ever in doubt, ask them before you open something that could be potentially harmfulShortened URLS: twitter is limited to 140 characters so people use shortened URLS and this can infect you pc easily because you can’t see what is the actual URL you can limit that to trusted twitter handles and avoid tweets that are to good to be true and you can unshorten the links by http://www.unshorten.comMuch information: your phone number, detailed work experience because this information can be used in social engineering against you for example an attacker can call you and tell you that your manager has delegated to him the responsibility of auditing on something related to your work and then convince you more information via email and that you have to respond fast because the manager is expecting from him the result of the audit soon
  11. Dedicated computer : it is a good practice to use a dedicated computerUpdated: to mitigate from the common attacksTabs: to protect against that if you clicked a malicious link the attacker can initiate a request from your browser to transfer money to his account this attack called CSRF Share: the bank will never ask you about your banking information (PIN acoount number user password) via emailStore: because in case if your pc is hacked hackers search for any banking informationManually: to protect against directing you to a malicious website which may steal your banking informationLogout: logging out protect your cookies from being sealed and used to take access to your account
  12. Anti malware: to protect your from malware which can badly affect your privacyUpdate: for not being attacked by common threats and to protect yourself from threats that is introduced when a new update is releasedUSB auto run: it is a feature that show you a menu to execute programs or view files it also introduce a lot of malwares to your computer