introduction to cyber security

30
Introduction To Cyber Security Quick Heal Technologies Private Limited

Upload: quick-heal-technologies-pvt-ltd

Post on 06-Aug-2015

201 views

Category:

Software


2 download

TRANSCRIPT

Introduction To Cyber Security

Quick Heal Technologies Private Limited

• One out of five teens subjected to cyberbullying

— Times Of India

• Minor girl kills self over obscene pics on Facebook

— Hindustan Times

In The News

Dangers in the Cyber World

• Predators

• Pornography

• Financial Theft

• Information About You

The Impact Of Cyber Security

• Family & Kids

• Business

• Political Warfare

Cyber Security For Family & Kids

Quick Heal Technologies Private Limited

Our Concerns...

What our kids are doing online

How to keep family & kids safe in the online world

How to teach them to make smart choices when they’re online

How to continue the discussion about Internet safety with our families and others beyond this webinar

How do Kids & Family Access the Internet

• Mobile devices, including cell phones

• Laptops and personal computers

• Video game consoles

Online Troubles For Kids & Family

Quick Heal Technologies Private Limited

Online Troubles For Kids & Family

• Cyberbullying

• Disturbing / adult content

• Viruses and spyware

• Sexual predators

Cyber Bullying

• Posting or forwarding a private text or embarrassing images to others

• Tricking someone into revealing embarrassing information and forwarding it to others

• Spreading malicious rumors

• Stealing passwords

Inappropriate Content

• Kids who misspell a website address or click on the wrong link might stumble upon pornographic images and text, hate speech, or other inappropriate content.

Your computer may become infected with viruses and spyware through:

• downloads

• emails

• peer-to-peer networking

• infected websites

Malicious Files

Sexual Predators

• Masquerade as children or approachable adults

• Trick children into revealing personal information

• Lure children and teenagers into meeting them in person

Ensuring Kid Safety

• Locate your computer in a centralized area of your home.

-Kitchen, Living room….

• Discuss the use of the computer.

-Make the child aware of the intended use of your home computer

• Determine how much time is needed to be on the computer/Internet.

• Monitor their use.

Ensuring Kid Safety

Parental Control

• This simple utility prevents access to inappropriate websites. Parents can decide which websites are inappropriate.

• It allows to limit the amount of time spent online, set a schedule for what time of day Internet use is permitted, or both.

• Good Parental Control software should be foolproof against hacking, so a clever teen can't disable it.

Cyber Security For Business

Quick Heal Technologies Private Limited

Serious Threat

Richard Clarke was famously heard to say, "If you

spend more on coffee than on IT security, then you

will be hacked. What's more, you deserve to be

hacked.”

The growing number of attacks on our cyber

networks has become, in President Obama’s

words, “One of the most serious economic and

national security threats our nation faces.”

What Threatens Business Information

• Misuse

• Disasters

• Data interception

• Computer theft

• Identity/Password theft

• Malicious software

• Data theft/corruption

• Vandalism

• Human error

Cyber Security Tips For Business

• Train employees in security principles

• Protect information, computers, and networks from cyber attacks

• Provide firewall security for your Internet connection

• Create a mobile device action plan

• Make backup copies of important business data and information

• Control physical access to your computers and create user accounts for each employee.

• Secure your Wi-Fi networks.

• Employ best practices on payment cards.

• Limit employee access to data and information, and limit authority to install software.

• Passwords and authentication.

Cyber Security Tips For Business

Cyberwarfare

Quick Heal Technologies Private Limited

• Cyberwarfare is politically motivated hacking & information breach.

• It is a form of information warfare sometimes seen as analogous to conventional warfare.

Cyberwarfare

Motivations

• Military

• Terrorism

• Civil

• Private sector

• Non-profit research

How Can Quick Heal Help

Quick Heal Technologies Private Limited

Parental Control Feature

Other Features Of Quick Heal Products

Quick Heal Khareedo Gaadi Jeeto Contest

Write to us at: [email protected] Follow us on: Facebook - www.facebook.com/quickhealav Twitter - www.twitter.com/quickheal G+ - bit.ly/QuickHealGooglePlus YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Visit us: Website - www.quickheal.com Official Blog - www.blogs.quickheal.com

Thank You!

References

• http://timesofindia.indiatimes.com/tech/tech-news/One-out-of-five-teens-subjected-to-cyberbullying-research/articleshow/47087791.cms

• http://www.hindustantimes.com/india-news/odisha-minor-girl-kills-self-over-obscene-pics-on-facebook/article1-1338135.aspx

• https://www.dhs.gov/sites/default/files/publications/FCC%20Small%20Biz%20Tip%20Sheet_0.pdf

• http://en.wikipedia.org/wiki/Cyberwarfare