Top Banner
WhatsApp – Tweaking Security -The new face of Information Technology Services 1
16

WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Dec 25, 2015

Download

Documents

Derrick Clark
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

WhatsApp – Tweaking

Security -The new face of Information Technology Services 1

Page 2: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Security -The new face of Information Technology Services 2

Page 3: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

ATM Frauds

Security -The new face of Information Technology Services 3

Page 4: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

ATM Frauds

Security -The new face of Information Technology Services 4

Page 5: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

ATM Card Safety• Always use the same ATM as far as possible

• Most ATM keyboards and card slots are set within the body and are not projecting above the base. Check to be sure

• When entering your PIN number, cover it using your hand

• Always follow your card at restaurants and fuel refilling stations

Security -The new face of Information Technology Services 5

Page 6: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Wireless Network Threats

6

accidental association

malicious association

ad hoc networks

nontraditional networks

identity theft (MAC

spoofing)

man-in-the middle attacks

denial of service (DoS)

network injection

Page 7: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Not only terrorism, what else

7

Connected to open network?– Attacker can read your mails– Attacker can see your password (even gmail)– Attacker can see your credit card numbers– Attacker can access confidential information on

your computer– Attacker can chat with your girlfriend posing as

you.

Page 8: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Wireless Security Techniques

8

use encryptionuse encryption

use anti-virus and anti-spyware

software and a firewall

use anti-virus and anti-spyware

software and a firewall

turn off identifier broadcasting

turn off identifier broadcasting

change the identifier on your router from the

default

change the identifier on your router from the

default

change your router’s pre-set

password for administration

change your router’s pre-set

password for administration

allow only specific computers to access your

wireless network

allow only specific computers to access your

wireless network

Page 9: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Further Advised

9

• Change the router login password frequently• Change the wireless WPA password frequently• Avoid temptation to connect to open wireless just looking for free

internet.• We can configure DHCP more tightly.

Example I have 3 machines at home, I’ll create a IP pool of 3 IPs onlyI’ll do DHCP reservation using the MAC of these 3 IP Effectively I’m not allowing any outsider machine to connect

• We can configure MAC binding.Allow only MY machines to connectMany access points support MAC bindingAny other machine will not be able to connect to my Wi-Fi

Page 10: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Other Cyber Crimes

10

CYBER CRIME ACTION AGAINST THE CRIME

CYBER STALKINGCyber stalking is a criminal offense with penalties against the assailant, including jail.

CRIMES INVOLVING MONEY imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

CYBER PORNOGRAPHYimprisonment of either description for a term which may extend to two three years and with fine which may extend to five lakh rupees.

CHILD PORNOGRAPHYimprisonment of either description for a term which may extend to five years and also with fine which may extend to ten lakh rupees.

CYBER BULLYING, ONLINE GAMBLING, EMAIL SPOOFING

Cyber Bullying is one type of "Unauthorized use" or "Unauthorized access to the facilities". This is "hacking" under Section 66 of ITA 2008 and also liable for compensation under Section 43 of ITA 2008.

IDENTITY THEFT, INTELLECTUAL PROPERTY CRIMES, DENIAL OF SERVICE ATTACK.

imprisonment for a term which may extend to three years and shall also be liable to fine which may extend to rupees Ten lakh.

Page 11: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

What You Can Do

11

• Avoid leaving your laptop unsupervised• Set up a user account and password to prevent unauthorized

access to your computer files.• Know what you can share.• Learn about reporting options• Learn and set your privacy settings• Block Cyberbullies• Save the Evidence• Create strong passwords• Set up new Accounts• Talk to your elders.• Choose your friends wisely• Find out consequences for inappropriate posts.• Use appropriate usernames• Be careful while posting comments, pictures and videos.• Scan your computer for virus/ missing OS files from time to time

Page 12: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Dos• Secure your passwords:» Use a different password for each account» Use a mix of Upper Case, Lower Case and special characters

• Signing in and out

• Use secure networks ( HTTPS )

• Keep your device clean

• Do tell your parents immediately if you have encountered any problem while using the internet or if you have engaged in an uncomfortable situation.

• Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see.

• Treat others online the way you’d like to be treated.

Security -The new face of Information Technology Services 12

Page 13: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Don’t• Posting your personal profile on the web. This may be used by online

predators against you

• Don’t give your real identity to anyone you meet online. This includes your real name, address, school information, e-mail address, password, and bank account information.

• Don’t reply to or start a conversation with people you don’t know. Don’t accept gift offerings from them.

• Don’t fill out any survey, membership, or application forms asking for your personal information

• Don’t disable any security settings your parents have set such as antivirus, firewall, filtering,

• Don’t download any files that are given to you by people you’ve met online. Don’t download any files from your e-mail unless they are solicited.

Security -The new face of Information Technology Services 13

Page 14: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

QUESTIONS

14

For more information about cyber-safety at UC Davis, visit http://security.ucdavis.edu.

For answers to questions about this tutorial, contact [email protected]

For help implementing a cyber-safety measure on your work/school computer, contact IT Express at 0657289938787

Page 15: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
Page 16: WhatsApp – Tweaking Security -The new face of Information Technology Services 1.

Thank You

Security -The new face of Information Technology Services 16