SlideShare une entreprise Scribd logo
1  sur  25
Threats To Your Identity Online 
Shiva Bissessar, BSc (Hons), MBA, MSc 
Managing & Technical Director 
Pinaka Technology Solutions 
@PinakaTT 
http://www.slideshare.net/ShivaBissessar1 
https://www.linkedin.com/in/shivabissessar 
http://facebook.com/pinakaTT
Offering Corporate Entities & Public Institutions Consultancy On Strategic Matters Of ICT & Information Security
Loss of Privacy 
Self Imposed 
Trusted Party Blunder 
Malicious Actor 
In The Name of Security
Self Imposed
http://www.scmagazine.com/human-error-contributes-to-nearly-all-cyber-incidents-study-finds/article/356015/
http://edition.cnn.com/2013/03/11/tech/social-media/facebook-likes-study/
http://www.nytimes.com/2014/10/05/sunday-review/we-want-privacy-but-cant-stop-sharing.html?_r=0
Trusted Party Blunder
http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/all/
http://www.gizmodo.com.au/2014/09/report-apple-knew-of-security-problems-long-before-icloud-hack/
http://mashable.com/2012/06/07/linkedin-disabling-hacked-passwords/
Malicious Actor
http://www.trinidadexpress.com/news/E-mail-account-of-Presidents-staff-member-hacked-272444811.html
http://www.pcmag.com/article2/0,2817,2383197,00.asp
http://www.caribbeannewsnow.com/topstory-Trinidad-government-denies-spyware-in-school-computers-22696.html
June 2014, OAS Symantec Report, LATAM+ C Cyber Security Trends
http://www.nytimes.com/2014/09/30/upshot/its-so-much-more-fun-to-spread-rumors-than-the-truth.html?_r=0&abt=0002&abg=1
In The Name of Security
https://www.techdirt.com/articles/20140923/07120428605/law-enforcement-freaks-out-over-apple-googles-decision-to-encrypt-phone-info-default.shtml
PART I – General Information Security 
•Importance of Information Security 
•Local & Regional Context 
•Why Are There Growing Threats 
•Types of Attackers & Motivations 
•Consequences of Attacks 
•Web Security Essentials 
•Threat & Vulnerabilities 
PART II - Social Engineering 
•Users’ Security Appetite 
•Attack Scenario Analysis 
•Phishing, Spoofing, Vishing, Water Holing, Ransomware, Skimming 
•Resources 
End User Info. Security Awareness Workshop 
Shiva Bissessar, BSc (Hons), MBA, MSc 
Managing & Technical Director 
Pinaka Technology Solutions 
+868 678 5078 
spbisses@gmail.com
Threats To Your Identity Online 
Shiva Bissessar, BSc (Hons), MBA, MSc 
Managing & Technical Director 
Pinaka Technology Solutions 
@PinakaTT 
http://www.slideshare.net/ShivaBissessar1 
https://www.linkedin.com/in/shivabissessar 
http://facebook.com/pinakaTT

Contenu connexe

Tendances

My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 

Tendances (7)

Personal Branding In A Wired World
Personal Branding In A Wired WorldPersonal Branding In A Wired World
Personal Branding In A Wired World
 
Oops! - Risk analysis for user interfaces
Oops! - Risk analysis for user interfacesOops! - Risk analysis for user interfaces
Oops! - Risk analysis for user interfaces
 
Twitter For Beginners
Twitter For BeginnersTwitter For Beginners
Twitter For Beginners
 
Washington Association Of Realtors Social Media Training
Washington Association Of Realtors Social Media TrainingWashington Association Of Realtors Social Media Training
Washington Association Of Realtors Social Media Training
 
Top 10 Social Media Mistakes
Top 10 Social Media MistakesTop 10 Social Media Mistakes
Top 10 Social Media Mistakes
 
Top 10 SEO Mistakes
Top 10 SEO MistakesTop 10 SEO Mistakes
Top 10 SEO Mistakes
 
My Online Image
My Online ImageMy Online Image
My Online Image
 

En vedette (7)

Its not ITs problem
Its not ITs problemIts not ITs problem
Its not ITs problem
 
Caribbean DDoS activity
Caribbean DDoS activityCaribbean DDoS activity
Caribbean DDoS activity
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business model
 

Similaire à Threats to your identity online

Similaire à Threats to your identity online (20)

Social Media for PR 2011
Social Media for PR 2011Social Media for PR 2011
Social Media for PR 2011
 
Security news 20151119
Security news 20151119Security news 20151119
Security news 20151119
 
2 fa it101
2 fa it1012 fa it101
2 fa it101
 
Content Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 StepsContent Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 Steps
 
Content Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 StepsContent Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 Steps
 
Mdst1002 spring19
Mdst1002 spring19Mdst1002 spring19
Mdst1002 spring19
 
Social Media, Research and Statistics
Social Media, Research and StatisticsSocial Media, Research and Statistics
Social Media, Research and Statistics
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)
 
Pwned in high ed
Pwned in high edPwned in high ed
Pwned in high ed
 
Human and ai powered creativity in storytelling
Human and ai powered creativity in storytellingHuman and ai powered creativity in storytelling
Human and ai powered creativity in storytelling
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)Health Information Privacy and Security (October 21, 2020)
Health Information Privacy and Security (October 21, 2020)
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization2014-04-05 - SPSPhilly - Authentication and Authorization
2014-04-05 - SPSPhilly - Authentication and Authorization
 
Top 10 Web Hacking Techniques of 2014
Top 10 Web Hacking Techniques of 2014Top 10 Web Hacking Techniques of 2014
Top 10 Web Hacking Techniques of 2014
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
 
Flickthinkers.com Movie News, TV News, Games News,Trailers
Flickthinkers.com Movie News, TV News, Games News,TrailersFlickthinkers.com Movie News, TV News, Games News,Trailers
Flickthinkers.com Movie News, TV News, Games News,Trailers
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Threats to your identity online