Mohamed MALKI Internet Security Staying safe online 1
Mohamed MALKI
Internet Security Staying safe online
1
OutLine
Introduction.
Internet Security: What it is, and why we need it.
Hackers: Who is he, Classes, Hacking Phases.
Attacks exemples.
What should I do to be safe online ?.
Conclusion
2
Introduction:
While the internet offers enormous advantages and opportunities, it also presents
various security risks.
It’s where we access our banking records, credit card statements, tax returns and
other highly sensitive personal information.
Banks take extensive steps to protect the information transmitted and processed
when banking online.
But with all the good things the Internet offers us, it also opens the door to serious,
potentially devastating threats.
3
Generally, Internet security include browser security, the security of data
entered through a Web form, and overall authentication and protection
of data sent via Internet Protocol.
We must secure our computers with technology in the same way that we
secure the doors to our offices Security
We must act in ways that protect us against the risks and threats that come with Internet use Safety
Internet Security:
What it is4
Request
-Identifies your computer
-Where it is located
carries with it unwanted hidden software- Installed in your computer.
- watches and records everything
you do online.
- leaving your passwords.
- and other personal and
sensitive information vulnerable
The criminals use in accessing :
• your private information.
• stealing your identity or your money.
• It can also be used to highjack your
computer for illegal purposes.
Internet Security:
Why you need it.
Response
5
Hackers:
Who is a Hacker ?
Intelligent individuals with excellent
computer skills with the ability to create
and explore computer’s software
and Hardware
For some hackers,hacking is a hobby to see how
many computers they can compromise
Their intention can either be to gain
knowledge or to poke around to do illegal
things
6
Hackers
Hacker Classes :
Black Hats Grey Hats White Hats
Individuals with extraordinary computing skills,Restoring to malicious or destructive activities and also known as Crackers
Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysts
Individuals who work both offensively and defensively at various times
7
Hackers
Hacking Phases :
Reconnaissance ScanningGaining Access
Maintaining Access
Covering Tracks
8
Attacks exemples.
Phishing
‘ ’ Phishing is the attempt to acquire sensitive
information such as usernames, passwords,
and credit card details (and sometimes,
indirectly, money) by masquerading as a trustworthy entity in an electronic communication ’ ’
9
Attacks exemples.
Phishing
10
Attacks exemples.
Pharming
Is another technique used
to steal confidential
access code. It works by
redirecting users to a
rogue server
11
Attacks exemples.
SQL injection
SQL injection is a technique used to take advantage of non validated input vulnerabilities to pass SQL commands through a web application for execution by a backend database
12
Attacks exemples.
SQL injection
13
What should I do to be safe online ?.14
Keep you
passwords private
and create ones
too strong that are
hard to “crack”
What should I do to be safe online ?.
To protect your self
If you have received
an Email encounters,
you may have been
the target of a
common scam called
‘phishing’.
15
Be wary of publishing any
information that identifies
you, such as your phone
number, photos of your
home, your address, date
of birth or full name.
What should I do to be safe online ?.
To protect your self
If you make purchases
or do your banking
online, make sure you
protect your financial
information
Use ‘https://’
16
What should I do to be safe online ?.
To protect your Computer
Use Anti-virus Software:
Anti-virus software can
detect and destroy
computer viruses before
they cause damage
Use Anti-spyware Software:
Use anti-spyware software
so unknown people cannot
lurk on your computer and
potentially
steal your information
17
What should I do to be safe online ?.
To protect your Computer
Keep Your Computer Updated:
Install all security updates
as soon as they are
available Automatic
updates provide the best protection Use a Firewall:
It is a placed at the
gateway between the two
networks which is usually a private Network and a
public network such as the
internet
Firewall
WAN
LAN
18
Conclusion
Whenever using internet or an online financial system, ensure that
your system is still under your control and not a spoofed puppet.
Protecting your self from internet threats.
Being aware of the dangers of the internet and taking the right steps
to avoid them means you can enjoy the internet safely.
19
Thank you for your attention !!!
20