SlideShare une entreprise Scribd logo
1  sur  33
What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must  have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around  57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
The Bottom Up Approach Secure  your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven What is a browser? Internet Explorer  “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
Opera– Experience The next generation in desktop Web browsing  Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Please change that default SSID !!  Common/Default SSID can put your router at risk!  Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters)  I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
Presentation By : Tripad Mishra (me@Tripad.im)
The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall How to choose? Try the free demos and compare antivirus  Free antivirus scan/application are not always good  Google around for independent reviews  Read :  http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Must have features  On Demand scanner  Proactive detection  Anti Spyware/ tracking cookie detection  Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
Questions ? Presentation By : Tripad Mishra (me@Tripad.im)

Contenu connexe

Tendances

Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Showzed_o07
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber securityTevfik Üret
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Internet security
Internet securityInternet security
Internet security
 
10 steps to cyber security
10 steps to cyber security10 steps to cyber security
10 steps to cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similaire à Web Security

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of TechnologyAkash Mittal
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book ReviewTirtha Mal
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfLucaMartins7
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer securitySwati Bhonde
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?Jim Isaak
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Pratimesh Pathak
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdfMILANOP1
 

Similaire à Web Security (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Network security
Network securityNetwork security
Network security
 
Flips Sides of Technology
Flips Sides of TechnologyFlips Sides of Technology
Flips Sides of Technology
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Ethical hacking Book Review
Ethical hacking Book ReviewEthical hacking Book Review
Ethical hacking Book Review
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Network Security
Network SecurityNetwork Security
Network Security
 
Operating systems and computer security
Operating systems and computer securityOperating systems and computer security
Operating systems and computer security
 
CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?
 
Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana) Browser Security by pratimesh Pathak ( Buldhana)
Browser Security by pratimesh Pathak ( Buldhana)
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Web Security

  • 1. What is Internet ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 2. What is Internet Internet is a global collection of huge number of networks which are connected to each other in a way or another. Birth of internet was in 1969, ARPAnetwith just 4 nodes which were connected at around 50 kbps!! VSNL introduced internet in 1995 with dialup connectivity in just 6 cities. When connected to a N/W computers are identified by their “online identity” – IP Addresses Presentation By : Tripad Mishra (me@Tripad.im)
  • 3. A Day in the life of “Internet” Around … 210 BILLION emails are sent each day! 2 BillionYouTube Videos are watched DAILY ! 500 Million+ people use Facebook 65 Million tweets are sent daily! 900,000 blogs articles are written DAILY ! Presentation By : Tripad Mishra (me@Tripad.im)
  • 4. IP-Address – Your Internet Identity 59.95.64.235 Presentation By : Tripad Mishra (me@Tripad.im)
  • 5. IP-Address – Your Internet Identity Unique identity to every computer on a “network” Presentation By : Tripad Mishra (me@Tripad.im)
  • 6. IP-Address – Your Internet Identity 2 Types of IP Addresses – Local and Internet IPs Internet IPs are provided by your ISP Local IPs are set by you(or your network administrator) Every computer/device must have atleast one IP address for it to work on a network IP Address is key information by which computers talk to each other To find out your public IP visit: www.CMyIP.com Presentation By : Tripad Mishra (me@Tripad.im)
  • 7. IP-Address – Your Internet Identity Run “CMD” > ipconfig /all Presentation By : Tripad Mishra (me@Tripad.im)
  • 8. Devices!! Between you and Facebook Presentation By : Tripad Mishra (me@Tripad.im)
  • 9. Why care for internet security ? 10% of world’s spam emails are send from India! Out of 22 Million PCs scanned in a survey more than 40% were found infected – PC world 1 out of every 8 computers is either vulnerable or is already infected with a malware! 420,000 scam e-mails are sent every hour (UK) Around 57,000 fake/phishing sites are made every week! 3 million per year!! Need More Reasons ? Presentation By : Tripad Mishra (me@Tripad.im)
  • 10. So how the hell can I secure myself? Every thing comes at a price … even security  You do need to understand somegeeky stuff!  …And need some common sense ! :-P So let me just introduce some security basics  Presentation By : Tripad Mishra (me@Tripad.im)
  • 11. The Bottom Up Approach Secure your: Router (Modem) Operating System Firewalls & Antivirus Browser and other internet applications Browsing habits! Presentation By : Tripad Mishra (me@Tripad.im)
  • 12. Browser –your stairway to heaven What is a browser? Internet Explorer “Hai Allah!!” Presentation By : Tripad Mishra (me@Tripad.im)
  • 13. Browser –your stairway to heaven Opera – because red rocks Presentation By : Tripad Mishra (me@Tripad.im)
  • 14. Opera– Experience Opera – The true multi platform browser The world’s fastest browser (windows) “The most stable browser” - dailytech.com Tabbed Browsing and Speed Dials Opera Link Opera Unite Opera Turbo Opera Security Opera Mini Presentation By : Tripad Mishra (me@Tripad.im)
  • 15. Opera– Experience The next generation in desktop Web browsing Opera 10 series Get opera: http://www.Opera.com(for PC) m.opera.com (for mobile phones) Presentation By : Tripad Mishra (me@Tripad.im)
  • 16. Safety in the wild! SSL encryption – keep those eavesdroppers away! Private browsing sessions Passwords – don’t we hate them :-P DNS – get those names right Tiny URLs – zorkajhatkadheere se Presentation By : Tripad Mishra (me@Tripad.im)
  • 17. Safety in the wild! Download with care! Understand phishing Use Google to your advantage Use link scanners Presentation By : Tripad Mishra (me@Tripad.im)
  • 18. The Router(modem) The really awful default passwords Router are sold with a simple/no default password Keep them long and uncommon! Bad Assumptions: Why will anyone access my router ? Free internet ? I have an unlimited plan! My routers WiFi range is not leaving my room.. No one can access it ! There are no terrorist in Nagpur :-P Presentation By : Tripad Mishra (me@Tripad.im)
  • 19. The Router(WiFi) Please change that default SSID !! Common/Default SSID can put your router at risk! Hiding SSID really doesn’t help! Presentation By : Tripad Mishra (me@Tripad.im)
  • 20. The Router(WiFi) Never ever leave your WiFi Open Please use WPA2 only WPA2 (AES) is the strongest encryption WEP keys were broken a decade ago please stop using them ! “password” is not a GOOD password! wad_2010_wAs_Awesome! (22 characters) I_Just_lov3_my_strong_paSS_w0rd (30+ characters) Presentation By : Tripad Mishra (me@Tripad.im)
  • 21. Presentation By : Tripad Mishra (me@Tripad.im)
  • 22. The Router(WiFi)(Advanced) Change routers default IP address Turn off DHCP if you don’t need it “Port forwarding” can cause problems Maintain logs Presentation By : Tripad Mishra (me@Tripad.im)
  • 23. Operating System Legal Operating system = Best security measure! Antivirus wont protect if you have a vulnerable OS Updates are important, atleast update 3 times in a month! Presentation By : Tripad Mishra (me@Tripad.im)
  • 24. Operating System – USB malware Most common technique to spread malware Turn off “Autorun” feature http://bit.ly/wad-autorun “Explore” all drives .. Don’t double click Keep hidden files ON Presentation By : Tripad Mishra (me@Tripad.im)
  • 25. Operating System – USB malware Start > RUN > gpedit.msc Presentation By : Tripad Mishra (me@Tripad.im)
  • 26. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 27. Operating System – USB malware Presentation By : Tripad Mishra (me@Tripad.im)
  • 28. Antivirus and Firewall Antivirus are your best bet against malwares Firewalls secure your internet access, its not a must be its good to have one Updates are a must! Presentation By : Tripad Mishra (me@Tripad.im)
  • 29. Antivirus and Firewall How to choose? Try the free demos and compare antivirus Free antivirus scan/application are not always good Google around for independent reviews Read : http://www.virusbtn.com http://www.passmark.com/benchmark-reports/ http://www.av-comparatives.org Presentation By : Tripad Mishra (me@Tripad.im)
  • 30. Antivirus and Firewall Must have features On Demand scanner Proactive detection Anti Spyware/ tracking cookie detection Browser Plugin* Presentation By : Tripad Mishra (me@Tripad.im)
  • 31. Antivirus and Firewall Presentation By : Tripad Mishra (me@Tripad.im)
  • 32. Spam, Phishing & Facebook What is SPAM ? Where does it SPAM come from ? Phishing – Bad grammar meets stupid people Facebook safety Facebook Privacy Facebook Apps “LOL this is freaking aweeesuuummm” Not everyone is your friend PDF files – this is new ;-) Presentation By : Tripad Mishra (me@Tripad.im)
  • 33. Questions ? Presentation By : Tripad Mishra (me@Tripad.im)