12
TITLE : E- SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT : 2011390663

TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT : 2011390663

Embed Size (px)

Citation preview

TITLE : E-SAFETY

NAME : ABDUL HAFIQ ISKANDAR BIN ROZLANPROGRAM : SR221NO.STUDENT : 2011390663

oE-safety is about measures and best practices fer netizens to guard their personel safety and the security of their network.

E-Safety

objective

• Conditions where digital security breaches & attacks can happen

• Understand the effects of various kind of security breaches & attacks.

• Ways to get protect from security breaches & attacks.

• Important to safe guard digital safety and security.

• Shared Resources VS Dedicated Resources

Unethical Behavior

Downloading pirated software Printing a lot of personel files Storing files that have nothing to do

work such as personel photo files in the share storage

INTERNET dangers: Internet threats can take on a range of forms or attacks Internet can create illusion to turn strangers into “friends” It can damage your reputation.

Common Forms of Digital Security Breaches Identity Theft - Phishing e-mails Hacker & Crackers Cyber stalking Cyber bully Internet Predator and Pornography

Phishing e-mail• SPAM emails? - randomly sent email purporting to come from an

organisation or individual and claim to contain urgent news, confirmation of a non-existent order.

• Why? - to get as much personal information from a user as possible. This includes login information, date of birth, and other identifiable information that can help Cyberstalkers open up bogus accounts under your name or steal from your existing ones.

• Effect? Visiting to this web site with an unprotected computer and web browser allows the attacker to run spyware on your PC.

Protection from security breaches & attacks

Self Awareness• Online Banking: Only do online banking in the

security of your own home if at all possible. • Identity Theft• Phishing.• keeping up to date is very important.

Protection from security breaches & attacks

Implement policy • Good Password Practice:

Use strong password. Hard to guess.use hardly password Changed periodically by force password change on first

login and establish a maximum password lifetime. it will minimize the risk of unauthorized access.

Kept it secret. be VERY careful where it’s stored and don’t tell anyone else your password. And the most important thing is, you can remembered it: Embedding special characters like “P@sswOrd”. Use the first letters of a common phrase and throw in some

special characters and numbers like “Hope for the best, plan for the worst” to “H4tb,p4tw”.

Protection from security breaches & attacks

Implement policy on shared resources• A shared resource or network share is a device or piece of

information on a computer that can be remotely accessed from another computer via a local area network or Intranet. It can be a file access, printer, scanner or etc Best Practice:

Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job.

Ensure users have the correct hardware, resources and software in place to protect them against data breaches.

Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications

Ensuring users log off their accounts, turn of computers and don’t share passwords with others to prevent people accessing data.

Plan backup and recovery strategy to ensure organisation functioning well.

Ask user to report immediately to network admin if they see something weird on your pc.

Common forms of digital security breach

Identify theft:the importance of securing personel information on that computer.

Pishing email:phish,yir money gone. Hacker and cracker:kaspersky’s Malaysian site

Hacked By Turkish Hacker. Cyber Stalking:Cyber Stalking a serious threat Cyber Bullying:Nine teenegerfs chared in the

death of phoebe Prince Internet Predator:Calgary Man with luring 6

girls.

How erase the data from old computer

Dismantle the computer Take out the hard driver Physically destroy the hard disk

ThANK YoU……