SlideShare a Scribd company logo
1 of 61
Who Am I ?
▪ Apurv Singh Gautam | Sc0rpi0n
▪ Network PenetrationTester,
Security Enthusiast, Hacker, CTF
Player
▪ Speaker at Null the Open
Security Community, Pune
▪ From the Past 4 years in this
field
Why Am I Doing This ?
▪ Have too much of free time ☺
▪ Want others to be aware
▪ Can’t help everyone on Quora
CYBER SECURITY
FUNDAMENTALS
WHAT TO EXPECT??
NEED OF SECURITY
▪ Increasing awareness of technology but not Security
▪ Continuous Development & Competition in IT
▪ Increasing number of Cyber Criminals
▪ Increasing use of Network elements & applications
▪ Decreasing level of skill set
NEED OF SECURITY
▪ Any Security breach in the website of any person increases the risk of
the public image
▪ Any Security breach in the website of any company increases the risk
of company reputation
▪ Any Security breach in the government website may increase the risk
on project management and government operations
▪ Any Security breach in the Military sector may jeopardise the safety
of any country
What is HACKING??
▪ Hacking is an art of exploring various security breaches
▪ What people believe: It’s an anti-social activity
: All the hackers are bad people
▪ The terms Hacker and Hacking are being misinterpreted and misunderstood with
negative sidelines
COMMUNITIES OF HACKERS
▪ Hackers
▪ Crackers
▪ Phreaks
▪ Script Kiddies
TYPES OF HACKERS
▪ White Hat Hacker -They use their knowledge and skill set for good constructive
intents.They find out new security loopholes and their solutions
▪ Black Hat Hacker -They use their knowledge and skill set for illegal activities and
destructive intents
▪ Grey Hat Hacker –They use their knowledge and skill set for legal and illegal
purpose.They are white hats in public but internally they do some black hat work
HACKING STRATEGY
▪ Reconnaissance (Information Gathering)
▪ Scanning
▪ Gaining Access
▪ Maintaining Access
▪ CoveringTracks
Cyber Crime is no more FUN…!!!
▪ Cyber crime controlled by IT ACT 2008 and respective IPC (constantly
evolving)
▪ Complete control of Govt agencies over information stored,
processed and transmitted over internet
▪ Upgradation of Investigating agencies with latest technology
▪ Service providers like ISPs, email service providers, etc are liable to
share information with Govt agencies
▪ Upgradation of Forensic labs
▪ Stringent punishment for cyber crimes
Common Scenarios - Cyber Pornography
▪ Cyber pornography covers pornographic websites, pornographic
magazines produced using computers and the Internet.
▪ Whoever publishes or transmits or causes to be published in the
electronic form, any material which is obscene in nature falls under cyber
pornography
▪ Section 67: Punishment for publishing or transmitting obscene material
in electronic form
▪ Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
Common Scenarios – Identity Theft
▪ Identity theft is a term used to refer to fraud that involves stealing money or
getting other benefits by pretending to be someone else.
▪ Section 66C Punishment for identity theft.
Whoever, fraudulently or dishonestly make use of the electronic signature, password
or any other unique identification feature of any other person, shall be punished with
imprisonment of either description for a term which may extend to three years and
shall also be liable to fine which may extend to rupees one lakh.
▪ Section 66D Punishment for cheating by personation by using computer
resource
Whoever, by means of any communication device or computer resource cheats by
personation, shall be punished with imprisonment of either description for a term
which may extend to three years and shall also be liable to fine which may extend to
one lakh rupees.
INTRODUCTION TO
SOCIAL ENGINEERING
“Cause there’s no PATCH for HUMAN STUPIDITY”
What is SOCIAL ENGINEERING??
In context of Information Security, it is the use of deception
to manipulate individuals into divulging confidential or
personal information that may be used for fraudulent
purposes.
TECHNIQUE
▪ Human Interaction
▪ Respectable & Known Person or Entity
▪ Assembling all gathered information together
TYPES OF SOCIAL ENGINEERING
▪ Quid Pro Quo – Something for something
▪ Phishing
▪ Baiting
▪ Pretexting
▪ DiversionTheft
Phishing Email
WEAKEST LINK??
No matter how strong your:
▪ Firewalls
▪ IDS & IPS
▪ Cryptography
▪ Anti-Virus Software
▪ You are the weakest link in computer security. People are more vulnerable than
computers.
▪ “The weakest link in the security chain is the human element: - Kevin Mitnick
WAYS TO PREVENT SOCIAL ENGINEERING
▪ User Awareness
▪ Policies
▪ Third partyTest
▪ Be Smart
Students prone to Cyber Crime
REASONS:
▪ Prank
▪ Jealousy
▪ Revenge
▪ Ignorance
▪ Ex-relationships
▪ Curiosity
▪ Blackmailing
▪ Pornography
RANSOMWARE
CYBER SECURITY
AWARENESS TIPS
Safe Computing Tips
▪ Keep yourComputer Updated
▪ Keep all the software up to date
▪ Do not use openWi-Fi
▪ Lock the system when not in use
▪ Download Files Legally (Don’t useTorrents :P)
▪ Backup on regular basis
▪ Use goodAnti-Virus
▪ Use good Proxy/VPN
▪ Cover Mic and Camera withTape
▪ Don’t store password in browser
▪ UseTOR
Internet Surfing Tips
▪ Use private browsing in Chrome/Firefox
▪ Check for green lock and HTTPS in URL
▪ Keep your browser Up to Date
▪ Never click on unknown links
▪ Turn on Do NotTrack feature in the browser
▪ Delete your profile from sites which you don’t use
(http://backgroundchecks.org/justdeleteme/)
▪ Use Sandboxie
▪ Use DuckDuckGo browser
▪ Use Panopticlick (https://panopticlick.eff.org/)
▪ UseVirusTotal for checking files
(https://www.virustotal.com/#/home/upload)
Mobile Security Tips
▪ Lock your phone using screen lock
▪ Do not connect to unknownWi-Fi networks
▪ Do not connect your phone using USB to unknown devices
▪ Always update OS as soon as it releases
▪ Use LockApps for Files and Media
▪ Use Guest Mode
▪ Keep sensitive files on authentic Cloud Storages
▪ Do not Jailbreak or Root your smartphone
▪ Download apps from authorized app stores only
▪ Use Privacy options and disallow any permissions that is not
necessary
▪ Do not accept calls from weird numbers (VoIP Calls)
▪ Schedule Routine Scans
▪ Don’t react to Scarewares and Adwares
Scarewares
Beware of these kind of APPS !!
Password Protection Tips
▪ Use different passwords for each account
▪ Always log off from your accounts
▪ Avoid entering password on computer that you don’t control
▪ Beware of keyloggers
▪ Use complex password (Take help of password generators)
▪ Use reliable password vaults (KeepPass, PassPack)
▪ Use two-factor authentication
▪ Don’t write true answers during security questions
Email & Chatting Tips
▪ Use encrypted emails like Proton Mail, Mailvelope
▪ Use end-to-end encrypted chat applications likeTelegram, Signal,
Wickr, CHatSecure
▪ Delete unused accounts
▪ Don’t fill out your full information on social sites
▪ Use temporary mails for services you do not trust (Temp-Mail,
Guerrilla Mail)
▪ Use Mail2Tor for sharing sensitive information
▪ Read all the permission that third party application want to access in
your email account
Social Media Tips
▪ Check privacy settings. Do not show anything which is sensitive
▪ Limit your Bio information
▪ Avoid sharing account details
▪ Choose friends wisely over the internet
▪ Think before you share something online (status, pics, videos)
▪ Use different passwords for each social media account
▪ Restrict friend requests
▪ Access Control (who can see what)
▪ Protect your identity online
▪ Don’t share information to anyone including your friends like Full
Name, Parent’s Name, D0B,Travel Plans etc
Did you Know that ?
▪ According to IT Act 2008 Section 66A Identity theft will result in 3
years jail and 5 lakh
Banking Tips
▪ Use OnlineVirtual Keyboard provided by the Banking website
▪ Never check “Remember Me” on banking websites
▪ Never use banking services on publicWi-Fis or cyber café.
▪ Always use 2 Factor Authentication
▪ Create a really strong password for Banking
▪ Change your password and ATM Pin regularly
▪ Beware of Shoulder Surfing
Preventing Online Scams
▪ Always check URLs of the sites you visit
▪ Always write the URL yourself instead of clicking on the link
▪ For suspicious links check the links on AVG ThreatLabs, Kaspersky
VirusDesk, Scanurl, PhishTank, etc
▪ Never believe in any offers saying “you won something”. No one is giving
free money
▪ Never click on unknown ads or pics
▪ Use pop-up blockers
▪ Try to avoid and make a distance with people having malicious intents
THANK YOU !!
▪ Email – apurvsinghgautam@gmail.com
▪ Social Handle – apurvsinghgautam
(LinkedIn,Twitter, Quora)

More Related Content

What's hot

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeetaAparajeeta Salu
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKate Bladow
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrimepronab Kurmi
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Alin Adrian Florea
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internetomarjohni
 

What's hot (19)

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Keeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients OnlineKeeping 'Em Safe: Ways to Protect Your Clients Online
Keeping 'Em Safe: Ways to Protect Your Clients Online
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind Getting inside the cybercriminal's m ind
Getting inside the cybercriminal's m ind
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internet
 

Similar to Log Out Cyber Awareness

SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessShwetaSingh713663
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsIulia Porneala
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation211 Check
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxEnginAltan4
 

Similar to Log Out Cyber Awareness (20)

SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Cyber Crime &Cyber Awareness
Cyber Crime &Cyber AwarenessCyber Crime &Cyber Awareness
Cyber Crime &Cyber Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 

More from Apurv Singh Gautam

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark WebApurv Singh Gautam
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentApurv Singh Gautam
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management systemApurv Singh Gautam
 

More from Apurv Singh Gautam (14)

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark Web
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
OSINT
OSINTOSINT
OSINT
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Flexible Displays
Flexible DisplaysFlexible Displays
Flexible Displays
 
India against corruption
India against corruptionIndia against corruption
India against corruption
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management system
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Log Out Cyber Awareness

  • 1.
  • 2. Who Am I ? ▪ Apurv Singh Gautam | Sc0rpi0n ▪ Network PenetrationTester, Security Enthusiast, Hacker, CTF Player ▪ Speaker at Null the Open Security Community, Pune ▪ From the Past 4 years in this field Why Am I Doing This ? ▪ Have too much of free time ☺ ▪ Want others to be aware ▪ Can’t help everyone on Quora
  • 4.
  • 6. NEED OF SECURITY ▪ Increasing awareness of technology but not Security ▪ Continuous Development & Competition in IT ▪ Increasing number of Cyber Criminals ▪ Increasing use of Network elements & applications ▪ Decreasing level of skill set
  • 7.
  • 8. NEED OF SECURITY ▪ Any Security breach in the website of any person increases the risk of the public image ▪ Any Security breach in the website of any company increases the risk of company reputation ▪ Any Security breach in the government website may increase the risk on project management and government operations ▪ Any Security breach in the Military sector may jeopardise the safety of any country
  • 9.
  • 10. What is HACKING?? ▪ Hacking is an art of exploring various security breaches ▪ What people believe: It’s an anti-social activity : All the hackers are bad people ▪ The terms Hacker and Hacking are being misinterpreted and misunderstood with negative sidelines
  • 11. COMMUNITIES OF HACKERS ▪ Hackers ▪ Crackers ▪ Phreaks ▪ Script Kiddies
  • 12. TYPES OF HACKERS ▪ White Hat Hacker -They use their knowledge and skill set for good constructive intents.They find out new security loopholes and their solutions ▪ Black Hat Hacker -They use their knowledge and skill set for illegal activities and destructive intents ▪ Grey Hat Hacker –They use their knowledge and skill set for legal and illegal purpose.They are white hats in public but internally they do some black hat work
  • 13. HACKING STRATEGY ▪ Reconnaissance (Information Gathering) ▪ Scanning ▪ Gaining Access ▪ Maintaining Access ▪ CoveringTracks
  • 14. Cyber Crime is no more FUN…!!! ▪ Cyber crime controlled by IT ACT 2008 and respective IPC (constantly evolving) ▪ Complete control of Govt agencies over information stored, processed and transmitted over internet ▪ Upgradation of Investigating agencies with latest technology ▪ Service providers like ISPs, email service providers, etc are liable to share information with Govt agencies ▪ Upgradation of Forensic labs ▪ Stringent punishment for cyber crimes
  • 15. Common Scenarios - Cyber Pornography ▪ Cyber pornography covers pornographic websites, pornographic magazines produced using computers and the Internet. ▪ Whoever publishes or transmits or causes to be published in the electronic form, any material which is obscene in nature falls under cyber pornography ▪ Section 67: Punishment for publishing or transmitting obscene material in electronic form ▪ Punishment – Imprisonment from 2 – 10 years with fine upto 10 lakhs
  • 16. Common Scenarios – Identity Theft ▪ Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else. ▪ Section 66C Punishment for identity theft. Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh. ▪ Section 66D Punishment for cheating by personation by using computer resource Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
  • 17. INTRODUCTION TO SOCIAL ENGINEERING “Cause there’s no PATCH for HUMAN STUPIDITY”
  • 18. What is SOCIAL ENGINEERING?? In context of Information Security, it is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  • 19.
  • 20. TECHNIQUE ▪ Human Interaction ▪ Respectable & Known Person or Entity ▪ Assembling all gathered information together
  • 21. TYPES OF SOCIAL ENGINEERING ▪ Quid Pro Quo – Something for something ▪ Phishing ▪ Baiting ▪ Pretexting ▪ DiversionTheft
  • 23.
  • 24.
  • 25. WEAKEST LINK?? No matter how strong your: ▪ Firewalls ▪ IDS & IPS ▪ Cryptography ▪ Anti-Virus Software ▪ You are the weakest link in computer security. People are more vulnerable than computers. ▪ “The weakest link in the security chain is the human element: - Kevin Mitnick
  • 26. WAYS TO PREVENT SOCIAL ENGINEERING ▪ User Awareness ▪ Policies ▪ Third partyTest ▪ Be Smart
  • 27.
  • 28.
  • 29. Students prone to Cyber Crime REASONS: ▪ Prank ▪ Jealousy ▪ Revenge ▪ Ignorance ▪ Ex-relationships ▪ Curiosity ▪ Blackmailing ▪ Pornography
  • 30.
  • 33. Safe Computing Tips ▪ Keep yourComputer Updated
  • 34. ▪ Keep all the software up to date ▪ Do not use openWi-Fi ▪ Lock the system when not in use ▪ Download Files Legally (Don’t useTorrents :P) ▪ Backup on regular basis ▪ Use goodAnti-Virus ▪ Use good Proxy/VPN
  • 35. ▪ Cover Mic and Camera withTape
  • 36. ▪ Don’t store password in browser
  • 38. Internet Surfing Tips ▪ Use private browsing in Chrome/Firefox ▪ Check for green lock and HTTPS in URL ▪ Keep your browser Up to Date ▪ Never click on unknown links ▪ Turn on Do NotTrack feature in the browser ▪ Delete your profile from sites which you don’t use (http://backgroundchecks.org/justdeleteme/) ▪ Use Sandboxie
  • 39. ▪ Use DuckDuckGo browser ▪ Use Panopticlick (https://panopticlick.eff.org/)
  • 40. ▪ UseVirusTotal for checking files (https://www.virustotal.com/#/home/upload)
  • 41. Mobile Security Tips ▪ Lock your phone using screen lock ▪ Do not connect to unknownWi-Fi networks ▪ Do not connect your phone using USB to unknown devices ▪ Always update OS as soon as it releases ▪ Use LockApps for Files and Media ▪ Use Guest Mode ▪ Keep sensitive files on authentic Cloud Storages
  • 42. ▪ Do not Jailbreak or Root your smartphone ▪ Download apps from authorized app stores only ▪ Use Privacy options and disallow any permissions that is not necessary ▪ Do not accept calls from weird numbers (VoIP Calls) ▪ Schedule Routine Scans ▪ Don’t react to Scarewares and Adwares
  • 44. Beware of these kind of APPS !!
  • 45. Password Protection Tips ▪ Use different passwords for each account ▪ Always log off from your accounts ▪ Avoid entering password on computer that you don’t control ▪ Beware of keyloggers ▪ Use complex password (Take help of password generators) ▪ Use reliable password vaults (KeepPass, PassPack) ▪ Use two-factor authentication ▪ Don’t write true answers during security questions
  • 46.
  • 47. Email & Chatting Tips ▪ Use encrypted emails like Proton Mail, Mailvelope ▪ Use end-to-end encrypted chat applications likeTelegram, Signal, Wickr, CHatSecure ▪ Delete unused accounts ▪ Don’t fill out your full information on social sites ▪ Use temporary mails for services you do not trust (Temp-Mail, Guerrilla Mail) ▪ Use Mail2Tor for sharing sensitive information
  • 48. ▪ Read all the permission that third party application want to access in your email account
  • 49. Social Media Tips ▪ Check privacy settings. Do not show anything which is sensitive ▪ Limit your Bio information ▪ Avoid sharing account details ▪ Choose friends wisely over the internet ▪ Think before you share something online (status, pics, videos) ▪ Use different passwords for each social media account ▪ Restrict friend requests ▪ Access Control (who can see what)
  • 50.
  • 51. ▪ Protect your identity online ▪ Don’t share information to anyone including your friends like Full Name, Parent’s Name, D0B,Travel Plans etc
  • 52.
  • 53. Did you Know that ? ▪ According to IT Act 2008 Section 66A Identity theft will result in 3 years jail and 5 lakh
  • 54. Banking Tips ▪ Use OnlineVirtual Keyboard provided by the Banking website ▪ Never check “Remember Me” on banking websites ▪ Never use banking services on publicWi-Fis or cyber café. ▪ Always use 2 Factor Authentication ▪ Create a really strong password for Banking ▪ Change your password and ATM Pin regularly ▪ Beware of Shoulder Surfing
  • 55.
  • 56.
  • 57. Preventing Online Scams ▪ Always check URLs of the sites you visit ▪ Always write the URL yourself instead of clicking on the link ▪ For suspicious links check the links on AVG ThreatLabs, Kaspersky VirusDesk, Scanurl, PhishTank, etc ▪ Never believe in any offers saying “you won something”. No one is giving free money ▪ Never click on unknown ads or pics ▪ Use pop-up blockers ▪ Try to avoid and make a distance with people having malicious intents
  • 58.
  • 59.
  • 60.
  • 61. THANK YOU !! ▪ Email – apurvsinghgautam@gmail.com ▪ Social Handle – apurvsinghgautam (LinkedIn,Twitter, Quora)