CYBER SECURITY

 

Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.

Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes the discipline dedicated to protecting that information and the systems used to process or store it. As the volume and sophistication of cyber attacks grow, companies and organizations, especially those that are tasked with safeguarding information relating to national security, health, or financial records, need to take steps to protect their sensitive business and personnel information. As early as March 2013, the nation’s top intelligence officials cautioned that cyber attacks and digital spying are the top threat to national security, eclipsing even terrorism.

INTRODUCTION

  • HISTORY OF INTERNET
  • Internet Addresses
  • DNS
  • Internet Infrastructure
  • World Wide Web

INTRODUCTION TO CYBER CRIME

  • CLASSIFICATION OF CYBER CRIMES
  • REASONS FOR COMMISSION OF CYBER CRIMES

MALWARE AND ITS TYPE

  • ADWARE
  • SPYWARE
  • BROWSER HIJACKING SOFTWARE
  • VIRUS
  • WORMS
  • TROJAN HORSE
  • SCAREWARE

KINDS OF CYBER CRIME

  • CYBER STALKING
  • CHILD PORNOGRAPHY
  • FORGERY AND COUNTERFEITING
  • SOFTWARE PIRACY AND CRIME RELATED TO IPRS
  • CYBER TERRORISM
  • PHISHING
  • COMPUTER VANDALISM
  • COMPUTER HACKING
  • CREATING AND DISTRIBUTING VIRUSES OVER INTERNET
  • SPAMMING
  • CROSS SITE SCRIPTING
  • ONLINE AUCTION FRAUD
  • CYBER SQUATTING
  • LOGIC BOMBS
  • WEB JACKING
  • INTERNET TIME THEFTS
  • DENIAL OF SERVICE ATTACK
  • SALAMI ATTACK
  • DATA DIDDLING
  • EMAIL SPOOFING

AUTHENTICATION

ENCRYPTION

DIGITAL SIGNATURES

ANTIVIRUS

FIREWALL

STEGANOGRAPHY

COMPUTER FORENSICS

WHY SHOULD WE REPORT CYBER CRIME?

INTRODUCTION

SOME RECENT CYBER CRIME INCIDENTS

INTRODUCTION

COUNTER CYBER SECURITY INTIATIVES IN INDIA

GENERATING SECURE PASSWORD

  • GUIDELINE FOR SETTING SECURE PASSWORD

USING PASSWORD MANAGER

  • WHAT IS A PASSWORD MANAGER?
  • WHY YOU SHOULD USE IT?
  • HOW DOES IT WORK?
  • SOME POPULAR PASSWORD MANAGERS

ENABLING TWO-STEP VERIFICATION

SECURING COMPUTER USING FREE ANTIVIRUS

CONFIGURING FIREWALL ON MAC COMPUTER

  • TURNING ON AND CONFIGURING THE MAC OS X FIREWALL

WORKING WITH WINDOWS FIREWALL IN WINDOWS

  • FIREWALL IN WINDOWS 7
  • CONFIGURING WINDOWS FIREWALL
  • HOW TO START & USE THE WINDOWS FIREWALL WITH ADVANCED SECURITY
  • How to Access the Windows Firewall with Advanced Security
  • What Are The Inbound & Outbound Rules?
  • What Are The Connection Security Rules?
  • What Does the Windows Firewall with Advanced Security Monitor?

FINDING THE BEST BROWSER ACCORDING TO THE USERS REQUIREMENT

SAFE BROWSING

  • HOW DO I KNOW IF A WEBSITE IS SECURE?

TIPS FOR BUYING ONLINE

CLEARING CACHE FOR BROWSERS

  • CLEARING CACHE FOR CHROME BROWSERS ABOVE VERSION 10
  • CLEARING CACHE FOR CHROME BROWSERS FROM VERSION 1 TO 9
  • CLEARING CACHE FOR SAFARI FOR IOS, IPHONE AND IPAD
  • CLEARING CACHE FOR SAFARI FOR MAC OS X
  • CLEARING CACHE FOR SAFARI FOR WINDOWS
  • CLEARING CACHE FOR INTERNET EXPLORER 9, 10 AND 11
  • CLEARING CACHE FOR INTERNET EXPLORER 8
  • CLEARING CACHE FOR FIREFOX
  • CLEARING CACHE FOR FIREFOX 33
  • CLEARING CACHE FOR OPERA
  • CLEARING CACHE FOR CCLEANER

WHAT IS WIRELESS LAN?

MAJOR ISSUES WITH WLAN

  • SECURE WLAN
  • WI-FI AT HOME

SAFE BROWSING GUIDELINES FOR SOCIAL NETWORKING SITES

  • GENERAL TIPS ON USING SOCIAL NETWORKING PLATFORMS SAFELY
  • POSTING PERSONAL DETAILS
  • FRIENDS, FOLLOWERS AND CONTACTS
  • STATUS UPDATES
  • SHARING ONLINE CONTENT
  • REVEALING YOUR LOCATION
  • SHARING VIDEOS AND PHOTOS
  • INSTANT CHATS
  • JOINING AND CREATING GROUPS, EVENTS AND COMMUNITIES

EMAIL SECURITY TIPS

INTRODUCTION

SMARTPHONE SECURITY GUIDELINES

  • PURSES, WALLETS, SMARTPHONES
  • PLATFORMS, SETUP AND INSTALLATION
  • Platforms and Operating Systems
  • Feature Phones
  • Branded and locked smartphones
  • General Setup
  • Installing and updating applications
  • COMMUNICATING SECURELY(THROUGH VOICE AND MESSAGES) WITH A SMARTPHONE
  • Secure Voice Communication
  • Sending Messages Securely
  • Storing Information on your Smartphone
  • Sending Email from your Smartphone
  • Capturing Media with your Smartphone
  • Accessing the Internet Securely from your Smartphone
  • Advanced Smart Phone Security