Introduction:
Welcome to the enlightening presentation on "Safety and Online Awareness of Operation and Security of Digital Devices." This informative session was held at Chhayanaut Shangskriti-Bhavan, where we discussed crucial aspects related to the safe usage of digital devices and increasing awareness about online security. In this presentation, we will explore the potential risks associated with digital technologies and how to safeguard ourselves while navigating the vast online landscape. Let's delve into the essential concepts that promote a secure and responsible digital presence.
Section 1: Understanding the Digital Landscape
In this section, we take a closer look at the dynamic and evolving digital landscape. We discuss the significant growth of internet users worldwide and the increasing reliance on digital devices, such as computers, smartphones, tablets, and IoT devices. The benefits of technology are undeniable, but it's equally crucial to comprehend the potential threats lurking in the online world, including cyber-attacks, data breaches, and identity theft.
Section 2: Recognizing Online Threats
Here, we identify common online threats and their impact on individuals and organizations. Participants are educated on different types of cyber threats, such as malware, phishing, social engineering, and ransomware. We emphasize the importance of being vigilant and staying informed about the latest threats to protect ourselves effectively.
Section 3: Strengthening Device Security
This segment delves into best practices for securing digital devices. We discuss the significance of strong passwords, enabling two-factor authentication, keeping software up-to-date, and the use of reputable antivirus and security software. Practical tips are shared on securing smartphones and other mobile devices against theft or unauthorized access.
Section 4: Safe Internet Practices
In this part, we focus on safe internet practices to maintain privacy and security. We discuss the risks associated with oversharing personal information on social media and how to configure privacy settings effectively. Additionally, participants learn about safe browsing habits, avoiding suspicious websites, and using secure Wi-Fi connections.
Section 5: Social Engineering and Phishing Awareness
Social engineering is a deceptive technique used by cybercriminals to manipulate individuals into divulging sensitive information. We highlight common social engineering tactics and educate participants on how to recognize and avoid falling victim to these scams. We also emphasize the importance of being cautious while responding to emails, texts, or calls from unknown sources.
Section 6: Responsible Use of Public Wi-Fi
Public Wi-Fi networks can be convenient but are often unsecured, making users vulnerable to potential attacks.
4. A Business man lives in
Dhaka. Used to social
media for business and
relation.
He receive a phone
call from an unknown
number.
Biggest cyber crime
involving privacy
invasion in the world!
7. INTRODUCTION
Topic of the section Cyber
crime, Cyber Attacks,
Hacker, Hacking etc.
TYPES OF CYBER ATTACKS
Topic of the section,
Malware, Virus, Trojan,
Steps of hacking etc
IMPACT OF INTERNET
Topic of the section, Positive
and negative impact of
internet.
01
02
03
04
05
06
SOCILA ENGINEERING
ATTACKS
Steganography, Data hiding
technology, Encryption,
Decryption, Spoofing, etc
DIGITAL FORENSICs
ATTACKS
Evidence collection, Types of
forensics, different types
of technique, Anti-
Forensics, tips of analysis.
SECURITY AND SEFTY
Strong password, Device
security, Smartphone
security, malware
detecting, cleaning etc
9. জালিযালি এবং আলথিক অপরাধ
সাইবার সন্ত্রাস ও চাাঁদাবালজ, হযরালি ও হুমলক ধামলক
পিিগ্রাফী ধারি, সংরক্ষণ, লবিরি, সহাযিা
সাইবার যুদ্ধ
অিিাইি জুযা
অিিাইনি কাউনক আঘাি করা অপদস্থ করা
ফফক আইলি / ছদ্দনবশ ধারণ
16. STEPS OF CYBER CRIME
STEP 1: IDENTIFY THE VICTIM
STEP 2: INFORMATION GATHERING.
STEP 3: IDENTIFY LOOPHOLE.
STEP 4: ACTUAL HACK.
STEP 5: ESCAPE WITHOUT TRACE.
Hacking into computer, is just like breaking into a house
19. PHISHING ATTACKS
Phishing is the attempt to acquire sensitive
information, often for malicious reasons, by
masquerading as a trustworthy entity in an electronic
communication
PHISHING USING WEBSITE
SET (SOCIAL ENGINEERING TOOLKIT)
HTML/JAVA SCRIPT VIHSING
APK TERMUX
24. MITM attack is a general term for when a perpetrator
positions himself in a conversation between a user and an
application—making it appear as if a normal exchange of
information is underway.
INTERCEPTOT
39. Forensics is the application of science to solve a
legal problem
Digital Forensics is a part of forensic science (in
relation to computer crime) focusing on the
recovery and investigation of material (essentially
data) found in digital devices.
In a word, It is recovery Science
40. DELETED FILES
LOGS
SPECIAL SYSTEM FILES (REGISTRY ETC.)
EMAIL ARCHVES, PRINTER SPOOLS
ADMINIRTRATIVE SETTING
INTERNET HISTORY
CHAT ARCHIVES
ENCRYPTED FIELS /PASSWORD PROTECTED
FILES
41. A talented young boy
of 14/15 years who was
studying late went out
of the house to take
the exam and left his
bag and notebook in a
nearby shop and
disappeared.
The boy's parents filed
a complaint with the
law enforcement
agencies.
50. Character Certificate
Statement of Certificate
40%
10%
2%
8%
10%
12%
2% 3%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Character Chart
2019
This is to certify that
RAHIM son/daughter
of…YYYY…………is well
known to FACEBOOK
Ind. Since last
…2011….years and…..
month. To the best of our
knowledge and belief he/she
bearing following character.
Note : Pother pacali, রঙ্গমঞ্চ, গরুঠাকুর megh-Balika also known as Rahim that’s fake ID
55. PASSWORD CHANGING POLICY.
DON’T USE SIMPLE PASSWORD. (APNI123, 123456, 098765, 0171300056,
APNI00056)
DON’T CLICK ON UN TRUSTED LINK.
SPOOFING EMAIL (LOTTERY, GIRLFRIEND/BOYFRIEND, JOB)
REMOVE UNKNOWN FRIEND SOCIAL MEDIA.
USE STRONG PASSWORD.
DO NOT GIVE YOUR DEVICE TO UN TRUSTED PEOPLE.