SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. 
Shahdag, 29 November 2014 Assoc.Prof. Abzetdin ADAMOV Chair of Computer Engineering Department IEEE Computer Society Azerbaijan Chapter aadamov@qu.edu.az www.ce.qu.edu.az/~aadamov
Content 
•Malicious Code Types 
•The Impact of Cybercrime 
•Cybercrime as a Service (CaaS) 
•Top Ten Threads for 2014 
•New Urgency to Improve Networks Security 
•Protect Yourself and your Private Information 
•How Your Privacy can be Compromised? 
•Maintaining Your Privacy 
•Kids' Online Safety 
•ATM Oriented Scams and Protection
Just Imagine!!! 
•10 years ago Skype, Facebook, YouTube, Twitter, Dropbox, and Instagram didn't exist. 
•20 years ago there were only 130 websites total, Google wasn't even around yet, and you had to pay for an email account through an ISP. 
•30 years ago there was no Internet. What has Internet Brought to Us?
Malicious Code Types 
•Viruses - This type of malicious code requires you to actually do something before it infects your computer. 
•Worms - Worms propagate without you r doing anything. They typically start by exploiting a software vulnerability 
•Trojan Horses - A Trojan horse program is software that claims to do one thing while, in fact, doing something different behind the scenes. 
•Spyware - Spyware sends information about what you're doing on the Internet to a third-party
Malicious Code Types 
Spyware 
Trojan Horses
Cyber Warfare
Cost of Cybercrime in five countries 
range of $1.4 - $46 million
Types of cyber attacks
Everything as a Service 
•Infrastructure as a Service (IaaS) 
•Platform as a Service (PaaS) 
•Software as a Service (SaaS) 
•Network as a Service (NaaS) 
•Cybercrime as a Service (CaaS)
Why they doing this? 
•DDoS attacks cost just $10 per hour; 
•For Spamming $10 to spam a million e-mail addresses; 
•Malware against antivirus software $30 per month; 
•A Trojan can costs from $8 to thousands; 
•SMS fraud services about $150 to spam 10,000 people; 
•Hacking email account (Gmail, Yandex, …) from $45 
Paid services offered by hackers:
Cyber Security Aspects 
•Information Security; 
•Network Security; 
•System Security; 
•Application Security; 
•Operating System Security; 
•Database Security; 
•Language Security.
Top Ten Threads for 2014 
1.Injection 
2.Broken Authentication and Session Management 
3.Cross-Site Scripting (XSS) 
4.Insecure Direct Object References 
5.Security Misconfiguration 
6.Sensitive Data Exposure 
7.Missing Function Level Access Control 
8.Cross-Site Request Forgery (CSRF) 
9.Using Components with Known Vulnerabilities 
10.Unvalidated Redirects and Forwards 
According to OWASP (Open Web Application Security Project)
Total Security
New Urgency to Improve Networks Security 
•In place effective security on all networks 
•Authorized users with excellent cyber hygiene techniques 
•CIO’s, Network Administrators, Operations Center Directors, other IT Professionals with latest knowledge, skills 
•Goal: future generation users with innate cyber security skills: 
–Safe in a connected environment as second nature 
–Ready access to latest information and updates 
–Cyber security format that becomes the default use case 
•Public-Private partnership in information sharing, response actions with privacy respected 
•Leaders and Managers across all enterprises with cyber vulnerability awareness knowledge
USA Experience 
•National Cyber Security Awareness Month (NCSAM) - October 
•Data Privacy Day (DPD) - Data Privacy Day is held on January 28th every year. 
•National Cyber Security Education Council (NCEC) 
•Cyber Security For National Security (CS4NS) www.cs4ns.com 
•Job fairs for Security-Cleared professionals www.techexpousa.com
USA Experience
Protect Yourself and your Private Information
How Your Privacy can be Compromised? 
•Not using a secure email or webmail account. 
•Using a work email account for personal email 
•Website interactions can be monitored 
•Via phishing 
•Via vishing (short for 'voice phishing') 
•Using unsecured WiFi networks 
•Using unencrypted links for sensitive communications (VPN) 
•Not using secure websites when banking or paying online 
•Not using strong passwords
Use Secure Websites for Sensitive Information 
None Secure 
Secure
How Your Privacy can be Compromised? (Cont…) 
•Staying logged in to a website or email account 
•Via spyware and viruses 
•Via physical keystroke loggers 
•Not storing personal or financial documents securely 
•Not shredding unwanted personal or financial documents 
•Being taken into people’s confidence too easily
Ways of Getting Your Phone Number and eMail 
•You overshare your number 
•You accept Terms of Use without reading or understanding them 
•Big data has killed privacy 
•Technology can dial billions of random numbers 
•The credit bureaus give away your information 
•Charities take all the fun out of being philanthropic (get deeper access to your wallet just for $5)
Maintaining Your Privacy 
1.Use effective and updated antivirus/antispyware software 
2.In a public or work, check your computer physically 
3.Use secure websites when shopping or banking online 
4.Log out of secure websites when you have finished transaction 
5.Use strong passwords and change them regularly 
6.Avoid using a work email address for personal use 
7.Make sure your home/office WiFi network is secured 
8.Store personal and financial documents securely 
9.Be careful to whom you disclose personal information 
10.Where possible, avoid using your real name online 
11.Be offline, if not using Internet
Maintaining Your Privacy (Cont…) 
12.Be cautious about who is trying to befriend you online 
13.Use an anonymous webmail account for website registrations 
14.Keep your social network activity private 
15.Lie when setting up password security questions 
16.Only give out as much personal information as you need to 
17.Never install potentially unwanted programs (PUPs) or unknown programs 
18.Do not answer chain email even came from friends 
19.Make regular backups of critical data 
20.Set clear guidelines for children about information sharing 
21.Monitor your children’s online activity
Special Recommendations 
1.Don’t fill out your social media profile (don't complete) 
2.Turn on private browsing (Chrome - New Incognito Window, IE - InPrivate Prowsing) 
3.Lock down your hardware (require a password after sleep or boots up) 
4.Use passcode on mobile devices (also lock or wipe status)
What if Your Online Privacy is Compromised? 
•Contact your financial institution immediately 
•Close any accounts that may have been compromised 
•Inform your closest friends and coworkers 
•Watch for any unexplainable charges to your account 
•Report your situation to local police
Kids' Online Safety 
•Talk to your kids about bullying 
•Talk Early and Often 
•As soon as your child is using a computer, a cell phone 
•Types of Virtual Worlds - virtuality under control 
•Talk about private information 
•Too much gaming is not good 
•Teach to use computer purposely
ATM Oriented Scams 
•Attached card reader 
•Card blocking and "helpful" person 
•WiFi scanners and fake ATM machines 
•ATM is out of order - manual Cash deposits 
•Stealing an entire ATM - easiest way
Protect Yourself at ATM 
•Cover your password with your hand 
•Use familiar ATMs and limit your visits 
•Check bank balances frequently 
•Observe the ATM 
•Prefer to use chip-and-PIN cards
SECURITY IDEA 
The Internet is a shared resource and securing it is Our Shared Responsibility.
Thank you… www.ce.qu.edu.az/~aadamov

Más contenido relacionado

La actualidad más candente

Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in EducationTyrone Grandison
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 

La actualidad más candente (20)

Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cyber crime
cyber crimecyber crime
cyber crime
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 

Similar a Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene.

Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationNick Chandi
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 

Similar a Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. (20)

Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 

Más de Abzetdin Adamov

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Understanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningUnderstanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningAbzetdin Adamov
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...Abzetdin Adamov
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Introduction to object oriented programming
Introduction to object oriented programmingIntroduction to object oriented programming
Introduction to object oriented programmingAbzetdin Adamov
 
Qafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemQafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemAbzetdin Adamov
 
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuÜniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuAbzetdin Adamov
 
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...Abzetdin Adamov
 
e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...Abzetdin Adamov
 
The Truth about Cloud Computing as new Paradigm in IT
The Truth about Cloud Computing  as new Paradigm in ITThe Truth about Cloud Computing  as new Paradigm in IT
The Truth about Cloud Computing as new Paradigm in ITAbzetdin Adamov
 
The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...Abzetdin Adamov
 
University Management Information System
University Management Information SystemUniversity Management Information System
University Management Information SystemAbzetdin Adamov
 

Más de Abzetdin Adamov (17)

Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Understanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine LearningUnderstanding your Data - Data Analytics Lifecycle and Machine Learning
Understanding your Data - Data Analytics Lifecycle and Machine Learning
 
Big Data & Privacy
Big Data & PrivacyBig Data & Privacy
Big Data & Privacy
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...Latest Trends in Technology:BigData Analytics, Virtualization, Cloud Computi...
Latest Trends in Technology: BigData Analytics, Virtualization, Cloud Computi...
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Introduction to object oriented programming
Introduction to object oriented programmingIntroduction to object oriented programming
Introduction to object oriented programming
 
Introduction to AJAX
Introduction to AJAXIntroduction to AJAX
Introduction to AJAX
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
Qafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-systemQafqaz university-inegrated-management-information-system
Qafqaz university-inegrated-management-information-system
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği PlatformuÜniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
Üniversite Bilgi Sistemi - Birimlerin İşbirliği Platformu
 
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
INFORMATION TECHNOLOGIES AS THE BASE OF THE BUSINESS PROCESS MANAGEMENT IMPLE...
 
e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...e-Government Strategy. Government Transformation in Developing Countries of t...
e-Government Strategy. Government Transformation in Developing Countries of t...
 
The Truth about Cloud Computing as new Paradigm in IT
The Truth about Cloud Computing  as new Paradigm in ITThe Truth about Cloud Computing  as new Paradigm in IT
The Truth about Cloud Computing as new Paradigm in IT
 
The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...The Role of Business Process Management in Success of the e-Government Projec...
The Role of Business Process Management in Success of the e-Government Projec...
 
University Management Information System
University Management Information SystemUniversity Management Information System
University Management Information System
 

Último

Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !risocarla2016
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Último (20)

Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 
James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !James Joyce, Dubliners and Ulysses.ppt !
James Joyce, Dubliners and Ulysses.ppt !
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Rohini Delhi 💯Call Us 🔝8264348440🔝
 

Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene.

  • 1. Steps and Tips to Protect Yourself and your Private Information while Online. Cyber Hygiene. Shahdag, 29 November 2014 Assoc.Prof. Abzetdin ADAMOV Chair of Computer Engineering Department IEEE Computer Society Azerbaijan Chapter aadamov@qu.edu.az www.ce.qu.edu.az/~aadamov
  • 2. Content •Malicious Code Types •The Impact of Cybercrime •Cybercrime as a Service (CaaS) •Top Ten Threads for 2014 •New Urgency to Improve Networks Security •Protect Yourself and your Private Information •How Your Privacy can be Compromised? •Maintaining Your Privacy •Kids' Online Safety •ATM Oriented Scams and Protection
  • 3. Just Imagine!!! •10 years ago Skype, Facebook, YouTube, Twitter, Dropbox, and Instagram didn't exist. •20 years ago there were only 130 websites total, Google wasn't even around yet, and you had to pay for an email account through an ISP. •30 years ago there was no Internet. What has Internet Brought to Us?
  • 4. Malicious Code Types •Viruses - This type of malicious code requires you to actually do something before it infects your computer. •Worms - Worms propagate without you r doing anything. They typically start by exploiting a software vulnerability •Trojan Horses - A Trojan horse program is software that claims to do one thing while, in fact, doing something different behind the scenes. •Spyware - Spyware sends information about what you're doing on the Internet to a third-party
  • 5. Malicious Code Types Spyware Trojan Horses
  • 7. Cost of Cybercrime in five countries range of $1.4 - $46 million
  • 8. Types of cyber attacks
  • 9. Everything as a Service •Infrastructure as a Service (IaaS) •Platform as a Service (PaaS) •Software as a Service (SaaS) •Network as a Service (NaaS) •Cybercrime as a Service (CaaS)
  • 10. Why they doing this? •DDoS attacks cost just $10 per hour; •For Spamming $10 to spam a million e-mail addresses; •Malware against antivirus software $30 per month; •A Trojan can costs from $8 to thousands; •SMS fraud services about $150 to spam 10,000 people; •Hacking email account (Gmail, Yandex, …) from $45 Paid services offered by hackers:
  • 11. Cyber Security Aspects •Information Security; •Network Security; •System Security; •Application Security; •Operating System Security; •Database Security; •Language Security.
  • 12. Top Ten Threads for 2014 1.Injection 2.Broken Authentication and Session Management 3.Cross-Site Scripting (XSS) 4.Insecure Direct Object References 5.Security Misconfiguration 6.Sensitive Data Exposure 7.Missing Function Level Access Control 8.Cross-Site Request Forgery (CSRF) 9.Using Components with Known Vulnerabilities 10.Unvalidated Redirects and Forwards According to OWASP (Open Web Application Security Project)
  • 14. New Urgency to Improve Networks Security •In place effective security on all networks •Authorized users with excellent cyber hygiene techniques •CIO’s, Network Administrators, Operations Center Directors, other IT Professionals with latest knowledge, skills •Goal: future generation users with innate cyber security skills: –Safe in a connected environment as second nature –Ready access to latest information and updates –Cyber security format that becomes the default use case •Public-Private partnership in information sharing, response actions with privacy respected •Leaders and Managers across all enterprises with cyber vulnerability awareness knowledge
  • 15. USA Experience •National Cyber Security Awareness Month (NCSAM) - October •Data Privacy Day (DPD) - Data Privacy Day is held on January 28th every year. •National Cyber Security Education Council (NCEC) •Cyber Security For National Security (CS4NS) www.cs4ns.com •Job fairs for Security-Cleared professionals www.techexpousa.com
  • 17. Protect Yourself and your Private Information
  • 18. How Your Privacy can be Compromised? •Not using a secure email or webmail account. •Using a work email account for personal email •Website interactions can be monitored •Via phishing •Via vishing (short for 'voice phishing') •Using unsecured WiFi networks •Using unencrypted links for sensitive communications (VPN) •Not using secure websites when banking or paying online •Not using strong passwords
  • 19. Use Secure Websites for Sensitive Information None Secure Secure
  • 20. How Your Privacy can be Compromised? (Cont…) •Staying logged in to a website or email account •Via spyware and viruses •Via physical keystroke loggers •Not storing personal or financial documents securely •Not shredding unwanted personal or financial documents •Being taken into people’s confidence too easily
  • 21. Ways of Getting Your Phone Number and eMail •You overshare your number •You accept Terms of Use without reading or understanding them •Big data has killed privacy •Technology can dial billions of random numbers •The credit bureaus give away your information •Charities take all the fun out of being philanthropic (get deeper access to your wallet just for $5)
  • 22. Maintaining Your Privacy 1.Use effective and updated antivirus/antispyware software 2.In a public or work, check your computer physically 3.Use secure websites when shopping or banking online 4.Log out of secure websites when you have finished transaction 5.Use strong passwords and change them regularly 6.Avoid using a work email address for personal use 7.Make sure your home/office WiFi network is secured 8.Store personal and financial documents securely 9.Be careful to whom you disclose personal information 10.Where possible, avoid using your real name online 11.Be offline, if not using Internet
  • 23. Maintaining Your Privacy (Cont…) 12.Be cautious about who is trying to befriend you online 13.Use an anonymous webmail account for website registrations 14.Keep your social network activity private 15.Lie when setting up password security questions 16.Only give out as much personal information as you need to 17.Never install potentially unwanted programs (PUPs) or unknown programs 18.Do not answer chain email even came from friends 19.Make regular backups of critical data 20.Set clear guidelines for children about information sharing 21.Monitor your children’s online activity
  • 24. Special Recommendations 1.Don’t fill out your social media profile (don't complete) 2.Turn on private browsing (Chrome - New Incognito Window, IE - InPrivate Prowsing) 3.Lock down your hardware (require a password after sleep or boots up) 4.Use passcode on mobile devices (also lock or wipe status)
  • 25. What if Your Online Privacy is Compromised? •Contact your financial institution immediately •Close any accounts that may have been compromised •Inform your closest friends and coworkers •Watch for any unexplainable charges to your account •Report your situation to local police
  • 26. Kids' Online Safety •Talk to your kids about bullying •Talk Early and Often •As soon as your child is using a computer, a cell phone •Types of Virtual Worlds - virtuality under control •Talk about private information •Too much gaming is not good •Teach to use computer purposely
  • 27. ATM Oriented Scams •Attached card reader •Card blocking and "helpful" person •WiFi scanners and fake ATM machines •ATM is out of order - manual Cash deposits •Stealing an entire ATM - easiest way
  • 28. Protect Yourself at ATM •Cover your password with your hand •Use familiar ATMs and limit your visits •Check bank balances frequently •Observe the ATM •Prefer to use chip-and-PIN cards
  • 29. SECURITY IDEA The Internet is a shared resource and securing it is Our Shared Responsibility.