SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
Arjun Chetry
Cyber Safety
Be Smart to Smart Devices
Arjun Chetry
Assistant Director (IT)
North Eastern Police Academy
MHA, Govt. of India.
International Certification
Cellebrite certified Operator & Cellebrite Certified Physical Analyser
Computer Hacking Forensics Investigator from EC-Council, US
Red Hat Certified System Administrator from Red Hat Linux
Red Hat Certified Engineer from Red Hat Linux
Cisco Certified Network Associate from Cisco Academy
Certified Information Security Expert from Innobuzz
Main Courses/Training Attended:
Digital Evidence & Digital forensics Training under FBI during ATA Course
Cyber crime Training under Computer Emergency Response Team of India
Memory forensics training from Data Security Council of India
Resource Person
Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc.
Research Publication
Published national & international research papers
B.Sc. M.C.A, Research Scholar in Digital Forensics
Points to cover in this Session
Cyberspace – WHY important to understand cybersafety
Why phone is termed SMARTPHONE
How attackers working ?
BE SMART – HOW to Handle SMARTPHONE
Cyber Safety Settings by SMARTPHONE Users
Be aware – website/portal for reference
Cyberspace facts – India
The twentieth century has brought to reality the idea of a global village, where
digital technology has interconnected and enmeshed the world economies, cultures
and populations.
India is no exception, with over 400 million internet users as of 2018, making it
the second-largest internet population in the world.
While greater connectivity via the world wide web promises large-scale progress, it
also leaves our digital societies open to new vulnerabilities.
Cyber crimes know no borders and evolve at a pace at par with emerging
technologies.
• Source : https://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use
List of countries by number of mobile phones in use
Just my Guess – believe or not
• Every Activity in cyberspace (Education,
Celebration, Motivation, Imagination)
• Every place you’ve ever been
• Everything you’ve told to Siri/HelloGoogle
• All of Your personal IDs or Your passwords
• Every message/emails you send/receive
• All the information you've given to Google
(Search/watch/played/speak)
• How fast you’re traveling/Running/Eating?
• How long you are sleeping?
• Everything that you want to purchase or sell
SmartPhone
knows
Let’s See – How we handling such smart device till date...
“Data = information =Power”
Entertainment Travelling Publication Advertisement – Many more
“ Attacks Point of view ”
SRC: CERT – India Website
High
Low
1980 1985 1990 1995 2000+
password guessing
self-replicating code
password cracking
exploiting known vulnerabilities
disabling audits
back doors
hijacking
sessions
sweepers
sniffers
packet spoofing
GUI
automated probes/scans
denial of service
www attacks
Tools
Attackers
Intruder
Knowledge
“stealth” / advanced
scanning techniques
burglaries
network mgmt. diagnostics
distributed
attack tools
Cross site scripting
Staged
attack
bots
Source: CERT
Progress
Cyber Attack Sophistication Continues To Evolve
Metasploit – hacking / pentesting platform
The world's most widely used hacking /
pen testing platform, Metasploit, has
capabilities to exploit just about any
system including Android mobile devices.
Top 7 Vulnerabilities In Android Applications 2019
Should you stop using computer or mobile?
Be SMART to handle
SMART Device in SMART World
Delete
FormatWipe
How ----- SMART?
Strong passwords or separate password for
each account
ENABLE MULTIFACTOR AUTHENTICATION
Talk to your children/friends about
the internet or cyber crime
Small Steps make a Big Difference
Always use SSL connections to any websites
Virtual Private Networks (VPNs)
• A Virtual Private Network (VPN) service or app is the centerpiece of
your defenses against unsecured Wi-Fi.
Manage
your social
media
settings
Device
privacy –
Your Safety
Know your
Device –
Understand
the DANGER
How ----- SMART?
Encrypt your phone
Be Cautious with your LOCATION data
Keep BACK UP DATA safe
Turn off any UNNECESSARY APP permissions
Be wary of third-party app stores
How ----- SMART?
Facebook
How ----- SMART?
How ----- SMART?
Android Privacy Settings
Iphone Privacy Settings
How ----- SMART?
How ----- SMART?
How ----- SMART?
Android & IPhone
WhatsApp: +91-9485028139
https://www.youtube.com/c/CyberSafetyAwareness
Subscribe - channel for more cyber safety points
Arjun Chetry
Email : chetry.arjun@gmail.com
Reference: Entire Materials was collected from Surface web and no content is copyright to speaker.
It is compiled for educational purpose only
Thank you

Contenu connexe

Tendances

CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
Patricia M Watson
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

Tendances (20)

Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Internet security
Internet securityInternet security
Internet security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 

Similaire à Cyber safety

Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
Ken Huang
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 

Similaire à Cyber safety (20)

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...datasheet-quickheal-total-securitypdf...
datasheet-quickheal-total-securitypdf...
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
Mobi hoc panel_arpanpal
Mobi hoc panel_arpanpalMobi hoc panel_arpanpal
Mobi hoc panel_arpanpal
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Dernier (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Cyber safety

  • 1. Arjun Chetry Cyber Safety Be Smart to Smart Devices
  • 2. Arjun Chetry Assistant Director (IT) North Eastern Police Academy MHA, Govt. of India. International Certification Cellebrite certified Operator & Cellebrite Certified Physical Analyser Computer Hacking Forensics Investigator from EC-Council, US Red Hat Certified System Administrator from Red Hat Linux Red Hat Certified Engineer from Red Hat Linux Cisco Certified Network Associate from Cisco Academy Certified Information Security Expert from Innobuzz Main Courses/Training Attended: Digital Evidence & Digital forensics Training under FBI during ATA Course Cyber crime Training under Computer Emergency Response Team of India Memory forensics training from Data Security Council of India Resource Person Delivered lecture at Universities, Judiciary Academy, Indian Air force, etc. Research Publication Published national & international research papers B.Sc. M.C.A, Research Scholar in Digital Forensics
  • 3. Points to cover in this Session Cyberspace – WHY important to understand cybersafety Why phone is termed SMARTPHONE How attackers working ? BE SMART – HOW to Handle SMARTPHONE Cyber Safety Settings by SMARTPHONE Users Be aware – website/portal for reference
  • 4. Cyberspace facts – India The twentieth century has brought to reality the idea of a global village, where digital technology has interconnected and enmeshed the world economies, cultures and populations. India is no exception, with over 400 million internet users as of 2018, making it the second-largest internet population in the world. While greater connectivity via the world wide web promises large-scale progress, it also leaves our digital societies open to new vulnerabilities. Cyber crimes know no borders and evolve at a pace at par with emerging technologies.
  • 5. • Source : https://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use List of countries by number of mobile phones in use
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Just my Guess – believe or not • Every Activity in cyberspace (Education, Celebration, Motivation, Imagination) • Every place you’ve ever been • Everything you’ve told to Siri/HelloGoogle • All of Your personal IDs or Your passwords • Every message/emails you send/receive • All the information you've given to Google (Search/watch/played/speak) • How fast you’re traveling/Running/Eating? • How long you are sleeping? • Everything that you want to purchase or sell SmartPhone knows
  • 12. Let’s See – How we handling such smart device till date...
  • 13. “Data = information =Power” Entertainment Travelling Publication Advertisement – Many more
  • 14. “ Attacks Point of view ”
  • 15. SRC: CERT – India Website
  • 16. High Low 1980 1985 1990 1995 2000+ password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools Attackers Intruder Knowledge “stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Cross site scripting Staged attack bots Source: CERT Progress Cyber Attack Sophistication Continues To Evolve
  • 17.
  • 18.
  • 19.
  • 20. Metasploit – hacking / pentesting platform The world's most widely used hacking / pen testing platform, Metasploit, has capabilities to exploit just about any system including Android mobile devices.
  • 21. Top 7 Vulnerabilities In Android Applications 2019
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Should you stop using computer or mobile?
  • 27. Be SMART to handle SMART Device in SMART World
  • 29. How ----- SMART? Strong passwords or separate password for each account ENABLE MULTIFACTOR AUTHENTICATION Talk to your children/friends about the internet or cyber crime Small Steps make a Big Difference
  • 30. Always use SSL connections to any websites
  • 31. Virtual Private Networks (VPNs) • A Virtual Private Network (VPN) service or app is the centerpiece of your defenses against unsecured Wi-Fi.
  • 32. Manage your social media settings Device privacy – Your Safety Know your Device – Understand the DANGER How ----- SMART?
  • 33. Encrypt your phone Be Cautious with your LOCATION data Keep BACK UP DATA safe Turn off any UNNECESSARY APP permissions Be wary of third-party app stores How ----- SMART?
  • 35.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 49.
  • 50.
  • 51. WhatsApp: +91-9485028139 https://www.youtube.com/c/CyberSafetyAwareness Subscribe - channel for more cyber safety points Arjun Chetry Email : chetry.arjun@gmail.com Reference: Entire Materials was collected from Surface web and no content is copyright to speaker. It is compiled for educational purpose only Thank you