introduction to cyber security
TRANSCRIPT
• One out of five teens subjected to cyberbullying
— Times Of India
• Minor girl kills self over obscene pics on Facebook
— Hindustan Times
In The News
Our Concerns...
What our kids are doing online
How to keep family & kids safe in the online world
How to teach them to make smart choices when they’re online
How to continue the discussion about Internet safety with our families and others beyond this webinar
How do Kids & Family Access the Internet
• Mobile devices, including cell phones
• Laptops and personal computers
• Video game consoles
Online Troubles For Kids & Family
• Cyberbullying
• Disturbing / adult content
• Viruses and spyware
• Sexual predators
Cyber Bullying
• Posting or forwarding a private text or embarrassing images to others
• Tricking someone into revealing embarrassing information and forwarding it to others
• Spreading malicious rumors
• Stealing passwords
Inappropriate Content
• Kids who misspell a website address or click on the wrong link might stumble upon pornographic images and text, hate speech, or other inappropriate content.
Your computer may become infected with viruses and spyware through:
• downloads
• emails
• peer-to-peer networking
• infected websites
Malicious Files
Sexual Predators
• Masquerade as children or approachable adults
• Trick children into revealing personal information
• Lure children and teenagers into meeting them in person
Ensuring Kid Safety
• Locate your computer in a centralized area of your home.
-Kitchen, Living room….
• Discuss the use of the computer.
-Make the child aware of the intended use of your home computer
• Determine how much time is needed to be on the computer/Internet.
• Monitor their use.
Ensuring Kid Safety
Parental Control
• This simple utility prevents access to inappropriate websites. Parents can decide which websites are inappropriate.
• It allows to limit the amount of time spent online, set a schedule for what time of day Internet use is permitted, or both.
• Good Parental Control software should be foolproof against hacking, so a clever teen can't disable it.
Serious Threat
Richard Clarke was famously heard to say, "If you
spend more on coffee than on IT security, then you
will be hacked. What's more, you deserve to be
hacked.”
The growing number of attacks on our cyber
networks has become, in President Obama’s
words, “One of the most serious economic and
national security threats our nation faces.”
What Threatens Business Information
• Misuse
• Disasters
• Data interception
• Computer theft
• Identity/Password theft
• Malicious software
• Data theft/corruption
• Vandalism
• Human error
Cyber Security Tips For Business
• Train employees in security principles
• Protect information, computers, and networks from cyber attacks
• Provide firewall security for your Internet connection
• Create a mobile device action plan
• Make backup copies of important business data and information
• Control physical access to your computers and create user accounts for each employee.
• Secure your Wi-Fi networks.
• Employ best practices on payment cards.
• Limit employee access to data and information, and limit authority to install software.
• Passwords and authentication.
Cyber Security Tips For Business
• Cyberwarfare is politically motivated hacking & information breach.
• It is a form of information warfare sometimes seen as analogous to conventional warfare.
Cyberwarfare
Write to us at: [email protected] Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal G+ - bit.ly/QuickHealGooglePlus YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Visit us: Website - www.quickheal.com Official Blog - www.blogs.quickheal.com
References
• http://timesofindia.indiatimes.com/tech/tech-news/One-out-of-five-teens-subjected-to-cyberbullying-research/articleshow/47087791.cms
• http://www.hindustantimes.com/india-news/odisha-minor-girl-kills-self-over-obscene-pics-on-facebook/article1-1338135.aspx
• https://www.dhs.gov/sites/default/files/publications/FCC%20Small%20Biz%20Tip%20Sheet_0.pdf
• http://en.wikipedia.org/wiki/Cyberwarfare