SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Tips for safe
  purchasing
  on the Web!
The TRUE SSL certificate
don’t settle for less!
When asked to show ID,
do you pull out a membership card
from your favorite club?
                                                                 An SSL (Secure Sockets Layer) certificate is
Of course not! It has no legal value,                            like a piece of ID. It is issued to websites by
and merely showing the card doesn’t                              organizations called Certificate Authorities
prove you are its real owner.                                    after control procedures whose complexity
                                                                 varies based on needs. The SSL certificate
On the Internet, the same holds true.
                                                                 guarantees the identity and transfer of data
The only way you can be confident                                 through a secured connection. All information
and rest assured that it’s safe and                              sent by a user to a website is encrypted, and
risk-free to share important data,                               only the website has the means to decrypt it.
                                                                 Without a certificate, the information travels in
including your bank account details,
                                                                 plain text and can be intercepted by hackers.
is to use an SSL certificate.




How can I recognize a certified website?
It’s easy! When a site prompts
                                                                                      There is no padlock displayed
your to enter sensitive data,        The use of HTTP, as opposed to HTTPS,            in the address bar.
                                     proves that the connection is not secured.       This “phishing” site is a scam!
ensuring you that your data will
be protected, you must check
two things. First, the address
should change from
http://www.nameofsite.com                          This website features a padlock,
                                                   but it is displayed on the page
to httpS://www.nameofsite.com.                     and not in the address bar.

The additional “s” indicates that
the connection is now secured.
Second, a padlock
should appear in your address bar.
Warning: a padlock displayed elsewhere on the screen has no value.
Seven golden rules
for well-informed buyers
   Don’t click on links in email
   The email might be from a hacker who has usurped the identity of a friend in an attempt to lead you
   to a fraudulent site and steal your sensitive data.

   Never send your bank account details by email
   Emails are not encrypted and the data they contain can be easily intercepted.


   Be wary of reassuring logos
   Anybody can add the logo of an antivirus vendor or bank to a website to make users think the site is
   protected. Dynamic site seals, on the other hand, are trustworthy.
   Be cautious!

   Don’t make purchases from Internet cafes
   There are hardware and software devices that track keyboard activity unbeknownst to users.
   Always use a trusted computer when entering sensitive data.

   Trust your instincts
   If a website makes you feel suspicious, it is probably not worthy of your trust.
   Stick to well-known sites.

   Always double-check the website address
   Sometimes typing www.keynetis.com instead of www.keyneCtics.com is all it takes to end up on a
   fraudulent site. Watch out for typos!

   Verify certificate quality
   Check the color of your address bar. Red means the certificate is worthless; no color means the
   certificate is valid but has not undergone in-depth verification. A green bar, on the other hand, means
   the site has been well-vetted and has been issued an Extended Validation SSL certificate. Such sites
   are also protected against phishing. Your connection is secured.
Don’t make it easier for them!
                                     One informed user is worth ten!
                                                        Be cautious!
                                                       Even the best anti-virus in the world cannot
                                                       guarantee total security. It is therefore essential
                                                       to remain very vigilant when you go online and
                                                       to be familiar with cybercriminal techniques in
                                                       order to avoid them.
                                                       Three types of attack are especially popular
                                                       these days:


Typosquatting         (also known as URL hijacking), is based on typographical errors.
Certain hackers create websites whose names are phonetically very similar or spelled almost
exactly the same as a well-known site. Always double-check the URL in the address bar.


Phishing is a technique that consists in fooling victims into believing that they are on a trus-
tworthy site (bank, administration, etc.) in order to steal their sensitive data. In this type of
attack, links are generally inserted into emails, directing the user to a fraudulent site or a site
whose name closely resembles that of a well-known site. Typically, if keynetics.com is an
authentic site, keynetics.myaccount.com could be a spoof. The only way to verify site
ownership is to make sure the address bar is green.

keylogging (or keystroke logging), is a technique in which hardware or software is used to
covertly track the keys struck on a keyboard. The hacker thus “eavesdrops” on all of your com-
puter activity in order to obtain sensitive data. Only use a trusted computer and install an anti-vi-
rus on your machine.




               To find out more, feel free to write us at: confiancesurinternet@keynectis.com
                      In order to be regularly informed about new guides on this topic.




                                            Protecteur d’identité
                                            Protecteur de liberté
                                            dans un monde connecté

Más contenido relacionado

La actualidad más candente

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
tamfin
 

La actualidad más candente (20)

Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Hacking
HackingHacking
Hacking
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
ETHICAL HACKER IN PATNA "RANJAN RAJA"
ETHICAL HACKER IN PATNA "RANJAN RAJA"ETHICAL HACKER IN PATNA "RANJAN RAJA"
ETHICAL HACKER IN PATNA "RANJAN RAJA"
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 

Destacado (7)

Smartroof E Brouchure
Smartroof E BrouchureSmartroof E Brouchure
Smartroof E Brouchure
 
Historia pewnego spotkania
Historia pewnego spotkaniaHistoria pewnego spotkania
Historia pewnego spotkania
 
Offer a trustworthy environment on your web site
Offer a trustworthy environment on your web siteOffer a trustworthy environment on your web site
Offer a trustworthy environment on your web site
 
Thank You Lord
Thank You  LordThank You  Lord
Thank You Lord
 
How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?How to offer a trustworhty environment on the web?
How to offer a trustworhty environment on the web?
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
Pomiar ryzykaprojektuinwestycyjnegomichalskig+f
Pomiar ryzykaprojektuinwestycyjnegomichalskig+fPomiar ryzykaprojektuinwestycyjnegomichalskig+f
Pomiar ryzykaprojektuinwestycyjnegomichalskig+f
 

Similar a Tips for safe purchasing on the web

Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
Rahul Sharma
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
jignesh khunt
 

Similar a Tips for safe purchasing on the web (20)

Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
 
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...
Geoff Huston's presentation on DANE (Keys in the DNS) at the New Zealand Inte...
 
3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report3441355 ln motileng_ssl_report
3441355 ln motileng_ssl_report
 
How does ssl work
How does ssl workHow does ssl work
How does ssl work
 
Secure sockets layer, ssl presentation
Secure sockets layer, ssl presentationSecure sockets layer, ssl presentation
Secure sockets layer, ssl presentation
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
Paid vs Free SSL Certificates: Which One Should You Pick in 2021?
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Types of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business NeedTypes of SSL Certificates for Every Business Need
Types of SSL Certificates for Every Business Need
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
What are ssl certificate that protects website
What are ssl certificate that protects websiteWhat are ssl certificate that protects website
What are ssl certificate that protects website
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Reducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-CommerceReducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-Commerce
 
Web application security part 02
Web application security part 02Web application security part 02
Web application security part 02
 
Importance of SSL.pdf
Importance of SSL.pdfImportance of SSL.pdf
Importance of SSL.pdf
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
 
What are the benefits of ssl certificate
What are the benefits of ssl certificateWhat are the benefits of ssl certificate
What are the benefits of ssl certificate
 

Último

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Tips for safe purchasing on the web

  • 1. Tips for safe purchasing on the Web!
  • 2. The TRUE SSL certificate don’t settle for less! When asked to show ID, do you pull out a membership card from your favorite club? An SSL (Secure Sockets Layer) certificate is Of course not! It has no legal value, like a piece of ID. It is issued to websites by and merely showing the card doesn’t organizations called Certificate Authorities prove you are its real owner. after control procedures whose complexity varies based on needs. The SSL certificate On the Internet, the same holds true. guarantees the identity and transfer of data The only way you can be confident through a secured connection. All information and rest assured that it’s safe and sent by a user to a website is encrypted, and risk-free to share important data, only the website has the means to decrypt it. Without a certificate, the information travels in including your bank account details, plain text and can be intercepted by hackers. is to use an SSL certificate. How can I recognize a certified website? It’s easy! When a site prompts There is no padlock displayed your to enter sensitive data, The use of HTTP, as opposed to HTTPS, in the address bar. proves that the connection is not secured. This “phishing” site is a scam! ensuring you that your data will be protected, you must check two things. First, the address should change from http://www.nameofsite.com This website features a padlock, but it is displayed on the page to httpS://www.nameofsite.com. and not in the address bar. The additional “s” indicates that the connection is now secured. Second, a padlock should appear in your address bar. Warning: a padlock displayed elsewhere on the screen has no value.
  • 3. Seven golden rules for well-informed buyers Don’t click on links in email The email might be from a hacker who has usurped the identity of a friend in an attempt to lead you to a fraudulent site and steal your sensitive data. Never send your bank account details by email Emails are not encrypted and the data they contain can be easily intercepted. Be wary of reassuring logos Anybody can add the logo of an antivirus vendor or bank to a website to make users think the site is protected. Dynamic site seals, on the other hand, are trustworthy. Be cautious! Don’t make purchases from Internet cafes There are hardware and software devices that track keyboard activity unbeknownst to users. Always use a trusted computer when entering sensitive data. Trust your instincts If a website makes you feel suspicious, it is probably not worthy of your trust. Stick to well-known sites. Always double-check the website address Sometimes typing www.keynetis.com instead of www.keyneCtics.com is all it takes to end up on a fraudulent site. Watch out for typos! Verify certificate quality Check the color of your address bar. Red means the certificate is worthless; no color means the certificate is valid but has not undergone in-depth verification. A green bar, on the other hand, means the site has been well-vetted and has been issued an Extended Validation SSL certificate. Such sites are also protected against phishing. Your connection is secured.
  • 4. Don’t make it easier for them! One informed user is worth ten! Be cautious! Even the best anti-virus in the world cannot guarantee total security. It is therefore essential to remain very vigilant when you go online and to be familiar with cybercriminal techniques in order to avoid them. Three types of attack are especially popular these days: Typosquatting (also known as URL hijacking), is based on typographical errors. Certain hackers create websites whose names are phonetically very similar or spelled almost exactly the same as a well-known site. Always double-check the URL in the address bar. Phishing is a technique that consists in fooling victims into believing that they are on a trus- tworthy site (bank, administration, etc.) in order to steal their sensitive data. In this type of attack, links are generally inserted into emails, directing the user to a fraudulent site or a site whose name closely resembles that of a well-known site. Typically, if keynetics.com is an authentic site, keynetics.myaccount.com could be a spoof. The only way to verify site ownership is to make sure the address bar is green. keylogging (or keystroke logging), is a technique in which hardware or software is used to covertly track the keys struck on a keyboard. The hacker thus “eavesdrops” on all of your com- puter activity in order to obtain sensitive data. Only use a trusted computer and install an anti-vi- rus on your machine. To find out more, feel free to write us at: confiancesurinternet@keynectis.com In order to be regularly informed about new guides on this topic. Protecteur d’identité Protecteur de liberté dans un monde connecté