SlideShare a Scribd company logo
Certified
Secure Computer
User v3
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
BE CYBER SMART
DON’T FALL FOR THE
TRAP!
The C|SCU program teaches safe use of computers,
devices, and networks. It covers key security topics like
identity theft, phishing, malware, and data protection,
helping users become secure and skilled.
Certified Secure Computer User
C|SCU V3
GOES BEYOND SECURITY
AWARENESS VERSION 3
• Coverage on the latest Operating Systems
• Latest Tools and Techniques to maximize
security
• Coverage on securing Gaming Consoles and
IoT/Smart Home Devices
• Techniques to secure Home Offices and
Remote Work locations
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Table of Content
1
INTRODUCTION TO DATA
SECURITY
4 SECURITY ON SOCIAL
NETWORKING SITES
2 SECURING OPERATING
SYSTEMS
5 SECURING EMAIL
COMMUNICATIONS
3 MALWARE AND ANTIVIRUS 6 SECURING MOBILE
DEVICES
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Table of Content
7 SECURING THE CLOUD 10
SECURING IOT DEVICES
AND GAMING CONSOLES
8 SECURING NETWORK
CONNECTIONS
11 SECURE REMOTE WORK
9 DATA BACKUP AND DISASTER
RECOVERY
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE 01
Foundations of Securing Digital Information
Introduction To Data Security
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Module
Objectives
- Define data and understand its significance in the digital age
- Identify common threats to data security
- Explore the fundamental elements of security
- Discuss strategies for implementing effective security measures
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
UNDERSTANDING
DATA
- Data comprises raw facts and figures that can be processed to generate
meaningful information
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 01
- Types of Data:
- Structured Data: Organized and searchable (e.g., databases)
- Unstructured Data: Lacks a predefined format (e.g., emails, videos)
- Semi-structured Data: Combines elements of both (e.g., JSON, XML)
IMPORTANCE OF DATA IN THE
INFORMATION AGE
- Data drives decision-making processes
- Underpins innovations in technology and services
- Ensures privacy, compliance, and operational integrity
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 02
COMMON THREATS TO DATA SECURITY
- Malware Attacks: Harmful software that exploits devices
- Phishing Scams: Fraudulent attempts to obtain sensitive information
- Insider Threats: Risks from individuals within the organization
- Physical Threats: Theft or damage of hardware containing data
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 03
FUNDAMENTAL ELEMENTS OF
SECURITY
- Confidentiality: Accessible only to authorized individuals
- Integrity: Ensures accuracy and completeness of data
- Availability: Accessible to authorized users when needed
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 04
IMPLEMENTING SECURITY MEASURES
- Technical Measures:
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 05
- Encryption to protect data
- Firewalls and intrusion detection systems
- Administrative Measures:
- Security policies and training programs
- Physical Measures:
- Secure access to hardware
- Surveillance and monitoring systems
DATA - THE DIGITAL
BUILDING BLOCKS
What is Data?
• Raw facts and figures.
• Basis for all digital operations.
Examples:
• Text, numbers, multimedia, sensor readings.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Next Page
CYBER GITA Page 06
WHAT IS DATA?
Definition:
Page 07
Next Page
CYBER GITA
Data is unprocessed, unorganized information.
Characteristics
• Raw and unstructured.
• Requires processing to gain meaning.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHY DATA IS
VALUABLE
Page 08
Next Page
CYBER GITA
• Drives decision-making.
• Backbone of AI, IoT, and Big Data.
• Critical for personal, organizational, and societal
functions.
Fun Fact
• Data is often called the "new oil."
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
THREATS TO DATA - COMMON
THREATS
Page 09
Next Page
CYBER GITA
• Unauthorized access (hacking).
• Data breaches and leaks.
• Malware and ransomware attacks.
• Insider threats.
Impact
• Loss of trust.
• Financial and reputational damage.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
DATA SECURITY
Page 10
Next Page
CYBER GITA
• Protecting data from unauthorized access and corruption.
Core Principles:
• Confidentiality: Only authorized users access data.
• Integrity: Data remains accurate and trustworthy.
• Availability: Data is accessible when needed.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
ELEMENTS OF SECURITY
Page 11
Next Page
CYBER GITA
Key Components:
• Authentication (e.g., passwords, biometrics).
• Encryption (data protection during transmission).
• Backup and recovery.
• Access control policies.
• Monitoring and auditing.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
IMPLEMENTING SECURITY
Page 12
Next Page
CYBER GITA
Practical Steps:
• Use strong passwords and multi-factor authentication.
• Encrypt sensitive data.
• Regularly update software and systems.
• Educate employees and users on security practices.
• Monitor networks and systems for vulnerabilities.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE 02
www.cybergita.com
Securing Operating Systems
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHAT IS SECURING AN
OPERATING SYSTEM?
Page 09
Next Page
CYBER GITA
Why is it important?
Protecting the operating system from threats to maintain system
integrity, confidentiality, and availability.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Prevent unauthorized access.
• Safeguard sensitive data.
• Ensure stable system performance.
LABS
Page 10
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Guidelines to Secure Windows 10
• Create a User Account Password in Windows 10
• Change a User Account Password in Windows 10
• Disable the Guest Account in Windows 10
• Lock Out Unwanted Guests in Windows 10
• Rename the Administrator Account in Windows 10
• Enable Software/Windows Update in Windows 10
• Enabling Windows Firewall in Windows 10
LABS
Page 11
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Adding New Apps in Windows Defender Firewall
• Turn on Windows Security
• Enable BitLocker in Windows 10
• Windows Encrypting File System (EFS)
• How to Decrypt a File Using EFS in Windows?
• Disabling Unnecessary Services in Windows 10
• Killing Unwanted Processes in Windows 10
• Hiding FIles and Folders in Windows 10
LABS
Page 12
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Disable Simple File Sharing in Windows 10
• Raise the UAC Slider Bar
only Windows Lab
MODULE 03
www.cybergita.com
Malware and Antivirus
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHAT IS MALWARE?
Page 14
Next Page
CYBER GITA
Purpose
• Malware (malicious software) is a program or file designed to harm,
exploit, or damage a system or network.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Disrupt operations.
• Steal sensitive information.
• Gain unauthorized access.
TYPES OF MALWARE
Page 15
Next Page
CYBER GITA
• Viruses
• Worms
• Ransomware
• Trojan Horses
• Spyware
• Adware
• Rootkits
• Keyloggers
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHAT IS ANTIVIRUS?
Page 16
Next Page
CYBER GITA
Purpose
• Antivirus software is a program designed to detect, prevent, and
remove malware from computers and networks.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Protect systems from known threats.
• Scan files and activities for suspicious behavior.
HOW DOES ANTIVIRUS WORK?
Page 17
Next Page
CYBER GITA
• Signature-Based Detection
• Heuristic Analysis
• Real-Time Scanning
• Quarantine and Removal
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
LIMITATIONS OF ANTIVIRUS
SOFTWARE
Page 18
Next Page
CYBER GITA
• Limited to Known Threats
• False Positives/Negatives
• Resource-Intensive
• Insufficient Against Advanced Threats
• Dependency on Updates
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INSTALL ANTIVIRUS SOFTWARE
Page 18
Next Page
CYBER GITA
• Provides protection against viruses, Trojans, worms, spyware,
spam, hackers, and unknown threats.
• Functions as a two-way firewall:
• Monitors incoming and outgoing traffic.
• Blocks suspicious data transfers.
• Supports data restoration for corrupted files.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WINDOWS DEFENDER ANTIVIRUS
(WINDOWS 10)
Page 18
Next Page
CYBER GITA
• Real-Time Protection: Secures emails, applications, Internet, and
cloud services.
• Key Features:
• Quick Scan: Scans areas prone to malware.
• Full Scan: Analyzes all files and applications for threats.
• Includes Windows Defender Security Center for comprehensive
security.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
EICAR TEST & ANTIVIRUS SECURITY
CHECKLIST
Page 18
Next Page
CYBER GITA
• The EICAR file is a harmless test file recognized by all antivirus software.
How to Create:
• Open Notepad.
• Copy-paste this line:
• X50!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
• Save the file as EICAR.COM.
Result:
• If antivirus software is active, saving the file will trigger an alert.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
ANTIVIRUS SECURITY CHECKLIST
Page 18
Next Page
CYBER GITA
• Install up-to-date antivirus software.
• Configure antivirus to scan:
• DVD-ROMs, emails, pen drives, external drives, websites, and downloads.
• Install and configure firewall software for all computers and networks.
• Schedule weekly automatic scans.
• Enable automatic updates for antivirus software.
• Create procedures for:
• Updating antivirus software.
• Handling computer viruses and infections effectively.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE 04
www.cybergita.com
INTERNET SECURITY
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INTRODUCTION TO INTERNET
SECURITY
Page 18
Next Page
CYBER GITA
• Internet security refers to the protection of data, privacy,
and communication online.
• It involves measures to prevent cyber threats, such as
malware, phishing, and hacking.
• A secure web experience requires awareness and best
practices in browsing.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INTRODUCTION TO WEB BROWSERS
Page 18
Next Page
CYBER GITA
• A web browser is a software application used to access the
internet.
• Common browsers: Microsoft Edge, Mozilla Firefox, Google
Chrome, Safari.
• Browsers play a key role in security by blocking malicious
content and encrypting connections.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING THE WEB BROWSER
Page 18
Next Page
CYBER GITA
• Keep browsers updated to the latest version.
• Use strong, unique passwords for accounts.
• Enable security features like HTTPS enforcement and pop-
up blockers.
• Disable unnecessary plugins and extensions.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING MICROSOFT EDGE
Page 18
Next Page
CYBER GITA
• Enable Microsoft Defender SmartScreen.
• Use InPrivate browsing mode.
• Disable autofill for sensitive information.
• Manage tracking prevention settings.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING MOZILLA FIREFOX
Page 18
Next Page
CYBER GITA
• Use Enhanced Tracking Protection.
• Enable HTTPS-Only mode.
• Block third-party cookies.
• Use secure add-ons verified by Mozilla.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING SAFARI
Page 18
Next Page
CYBER GITA
• Enable Intelligent Tracking Prevention.
• Use Private Browsing mode.
• Manage website permissions.
• Keep Safari updated for security patches.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING GOOGLE CHROME
Page 18
Next Page
CYBER GITA
• Enable Safe Browsing mode.
• Use password manager and security checkup tools.
• Turn on site permissions management.
• Clear browsing data regularly.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
BROWSER FEATURES AND THEIR
RISKS
Page 18
Next Page
CYBER GITA
• Autofill: Can be exploited by malicious scripts.
• Extensions: Risk of malware-infected add-ons.
• Cookies: Can track user activity and compromise privacy.
• Pop-ups: Often used for phishing attacks.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
HOW TO IDENTIFY A SECURE
WEBSITE
Page 18
Next Page
CYBER GITA
• Look for HTTPS in the URL.
• Check for a valid security certificate.
• Avoid websites with too many pop-ups.
• Be cautious of suspicious-looking domain names.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INSTANT MESSAGING SECURITY
Page 18
Next Page
CYBER GITA
• Instant Messaging (IM) allows real-time communication but
has security risks.
• Risks include phishing, malware, and identity theft.
• Messages can be intercepted if not encrypted.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SECURITY ISSUES IN INSTANT
MESSAGING
Page 18
Next Page
CYBER GITA
• Fake profiles and impersonation.
• Spread of malware via links and attachments.
• Data leaks due to weak authentication.
• Social engineering attacks.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MITIGATING SECURITY ISSUES IN IM
Page 18
Next Page
CYBER GITA
• Use end-to-end encrypted messaging apps.
• Enable two-factor authentication (2FA).
• Do not share sensitive information over IM.
• Report suspicious accounts and messages.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
CHILD ONLINE SAFETY
Page 18
Next Page
CYBER GITA
• Children are vulnerable to online threats such as
cyberbullying and grooming.
• Parents and guardians must educate children about safe
online practices.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
GUIDELINES FOR CHILD ONLINE
SAFETY
Page 18
Next Page
CYBER GITA
• Set age-appropriate internet restrictions.
• Teach children about safe browsing and privacy.
• Monitor online activities without invading privacy.
• Encourage open communication.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
DETERMINING IF CHILDREN ARE AT
RISK
Page 18
Next Page
CYBER GITA
• Sudden behavioral changes.
• Secrecy about online activities.
• Receiving gifts from strangers.
• Increased time spent online late at night.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
PROTECTING CHILDREN FROM
ONLINE THREATS
Page 18
Next Page
CYBER GITA
• Use parental control tools.
• Teach children to recognize scams and suspicious behavior.
• Set clear rules for internet use.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
ENCOURAGING CHILDREN TO
REPORT
Page 18
Next Page
CYBER GITA
• Teach them to report cyberbullying and inappropriate
content.
• Create a safe environment where they feel comfortable
sharing concerns.
• Encourage reporting suspicious online behavior to parents
or teachers.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
HOW TO REPORT A CRIME
Page 18
Next Page
CYBER GITA
• Report cyber crimes to law enforcement authorities.
• Use official reporting portals for cyber threats.
• Inform school authorities or child safety organizations if
children are affected.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
ACTIONS TO TAKE WHEN A CHILD BECOMES A VICTIM
OF ONLINE ABUSE
Page 18
Next Page
CYBER GITA
• Stay calm and provide emotional support.
• Document any harmful interactions as evidence.
• Block and report the offender.
• Seek professional help if necessary.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
KIDZSEARCH WEB PORTAL
Page 18
Next Page
CYBER GITA
• A child-friendly search engine that filters unsafe content.
• Provides educational resources in a secure environment.
• Encourages safe and productive internet use for kids.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
LINK
MODULE SUMMARY
Page 18
Next Page
CYBER GITA
• Internet security is essential for safe browsing and
communication.
• Secure web browsers by enabling privacy settings and
keeping them updated.
• Recognize and mitigate risks in instant messaging.
• Protect children from online threats by educating them and
using protective measures.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE 05
www.cybergita.com
Security On Social Networking Sites
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
Next Page
CYBER GITA
• Understand the concept of virtual social networking
• Understand What a Profile is on a Social Networking Site and The information it Contains
• Understand the risk associated with online social networking
• understand what grotagging is and the risks it poses
• understand the various risks of online social networking that minors are exposed to
• configure the security settings of Facebook
• configure the security settings of Twitter
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INTRODUCTION TO SOCIAL NETWORKING SITES
Next Page
CYBER GITA
• Social networking sites allow users to create profiles, connect,
and share content.
• Examples: Facebook, Twitter (X), Instagram, LinkedIn, Snapchat.
• These platforms offer benefits but also pose security risks.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHAT IS A PROFILE?
Next Page
CYBER GITA
• A user’s online identity consisting of personal information.
• Common elements: Name, Profile picture, Bio, Contact details,
Interests, Location.
• Public vs Private profiles.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INFORMATION AVAILABLE ON SOCIAL MEDIA
Next Page
CYBER GITA
• Public Information: Posts, comments, likes, profile pictures.
• Private Information: Messages, saved payment details, location
history.
• Risks: Identity theft, impersonation, data leaks.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
UNDERSTANDING VARIOUS SOCIAL NETWORKING
SECURITY THREATS
Next Page
CYBER GITA
Phishing: Fake login pages to steal credentials.
Identity Theft: Using personal data for fraud.
Malware: Viruses spread through links & downloads.
Site Flaws: Security loopholes allowing data leaks.
URL Spoofing: Fake URLs mimicking real sites.
Clickjacking: Hidden malicious buttons.
Social Engineering: Manipulation to gain access.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
WHAT IS GEOTAGGING?
Next Page
CYBER GITA
Geotagging adds location data to photos & posts.
Risks: Can expose real-time location, making users vulnerable.
Attackers can track movement patterns.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
HOW TO DISABLE GEOTAGGING IN ANDROID
& IOS
Next Page
CYBER GITA
Android:
• Open Camera App > Settings.
• Turn off "Save Location" or "Geotagging."
iOS:
• Go to Settings > Privacy > Location Services.
• Select Camera > Choose "Never" or "While Using the App."
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
SOCIAL NETWORKING THREATS TO MINORS
Next Page
CYBER GITA
• Contact with predators through chatrooms and friend requests.
• Cyberbullying through comments, messages, and posts.
• Grooming: Manipulation of minors for exploitation.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
STAYING SAFE ON FACEBOOK
Next Page
CYBER GITA
• Profile Settings:
• Keep profile private, restrict friend requests.
• General Settings:
• Secure username, email, and password.
• Security Settings:
• Enable Two-Factor Authentication (2FA).
• Turn on login alerts.
• Privacy Settings:
• Review audience for posts.
• Limit visibility of past posts.
• Control who can look you up.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
STAYING SAFE ON TWITTER (X)
Next Page
CYBER GITA
• Password & Account Security:
• Use a strong password.
• Enable Two-Factor Authentication.
• Email Notifications & Privacy Controls:
• Disable unnecessary notifications.
• Restrict who can tag, mention, or message you.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE 06
www.cybergita.com
Securing Email Communications
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
📌 MODULE OVERVIEW
CYBER GITA
🔹 Understand the concept of an email
🔹 Identify different email clients & service providers
🔹 Why email security is important
🔹 Common email threats
🔹 Email security procedures
🔹 Best practices for securing email communications
🔹 Latest trends in email security threats and countermeasures
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
📧 WHAT IS AN EMAIL?
CYBER GITA
• Email (Electronic Mail) is a method of sending digital messages
over the internet.
• It allows users to communicate quickly with text, attachments,
and links.
• Uses SMTP, POP3, and IMAP protocols for sending and
receiving emails.
• Modern email services also support cloud storage integration
and advanced encryption features.
📌 Example: Gmail, Outlook, Yahoo Mail, Zoho Mail, ProtonMail.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
️
🛠️EMAIL CLIENTS & SERVICE PROVIDERS
CYBER GITA
• Microsoft Outlook – Used widely in corporate environments for
professional email communication.
• Mozilla Thunderbird – Open-source and customizable email client.
• Apple Mail – Default email client for macOS and iOS devices.
• Mailbird – A unified email client that integrates with multiple
services.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
EMAIL CLIENTS (SOFTWARE TO ACCESS EMAILS)
🛠️EMAIL CLIENTS & SERVICE PROVIDERS
CYBER GITA
• Gmail (Google) – Offers advanced AI-driven spam filtering and
security.
• Outlook.com (Microsoft) – Integrated with Microsoft Office and
OneDrive.
• Yahoo Mail – Provides large email storage and integrated news
services.
• ProtonMail – A privacy-focused email service with end-to-end
encryption.
• Zoho Mail – Business email with advanced admin controls.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
EMAIL SERVICE PROVIDERS (WEB-BASED EMAIL SERVICES)
🔐 WHY IS EMAIL SECURITY IMPORTANT?
CYBER GITA
✅ Prevents unauthorized access to sensitive information.
✅ Protects against phishing, spam, and malware.
✅ Ensures confidentiality, integrity, and authenticity of messages.
✅ Helps organizations comply with cybersecurity regulations like GDPR and HIPAA.
✅ Reduces the risk of business email compromise (BEC) and financial fraud.
✅ Secures corporate communications and helps maintain business continuity.
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
📌 Example: If an attacker gains access to an employee’s email,
they can steal confidential business data, send fraudulent
messages, or conduct phishing attacks within an organization.
🚨 COMMON EMAIL THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Phishing Attacks
1️
1️
⃣
🔸 Fake emails trick users into giving sensitive information like passwords or financial details.
🔸 Example: "Your bank account has been compromised! Click here to reset your password."
🔸 Spear Phishing – Targeted phishing aimed at a specific individual or company.
🔸 Whaling – Phishing attacks targeting high-level executives.
🚨 COMMON EMAIL THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Spam & Malware
2️
⃣
🔸 Unwanted emails that contain malicious links or attachments.
🔸 Example: An email with a virus-infected attachment that installs malware when opened.
🔸 Can be used for ransomware distribution, credential theft, or financial fraud.
🚨 COMMON EMAIL THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Business Email Compromise (BEC)
3️
3️
⃣
🔸 Attackers impersonate CEO or managers to trick employees into sending
money or sensitive data.
🔸 Example: A fake email from a "CEO" instructing finance staff to transfer
funds to an attacker-controlled account.
🚨 COMMON EMAIL THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Email Spoofing
4️
⃣
🔸 Hackers forge sender addresses to make emails appear from trusted contacts.
🔸 Used in phishing and fraud attacks.
🔸 Can be prevented using DMARC, DKIM, and SPF authentication protocols.
🚨 COMMON EMAIL THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Man-in-the-Middle (MITM) Attacks
5️
5️
⃣
🔸 Attackers intercept email communications to steal sensitive data.
🔸 Often happens over unsecured public Wi-Fi networks.
🔸 Can be prevented using email encryption and VPN services.
️
🛡️EMAIL SECURITY PROCEDURES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
✅ 1. Use Strong Authentication
🔹 Enable Two-Factor Authentication (2FA) for email accounts.
🔹 Use strong, unique passwords and avoid reusing passwords across accounts.
✅ 2. Email Encryption
🔹 Encrypt emails using PGP (Pretty Good Privacy) or S/MIME to prevent
unauthorized access.
🔹 Organizations can use end-to-end encryption to secure emails in transit.
🛡️EMAIL SECURITY PROCEDURES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
✅ 3. Anti-Phishing & Spam Filters
🔹 Use email security tools like DMARC, DKIM, and SPF to prevent spoofing and phishing.
🔹 Regularly update spam filters to block malicious emails.
✅ 4. Secure Email Gateways
🔹 Implement firewalls, intrusion detection systems (IDS), and email security solutions
(e.g., Proofpoint, Mimecast).
🔹 Use secure email gateways (SEGs) to scan inbound and outbound email traffic.
🛡️EMAIL SECURITY PROCEDURES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
✅ 5. Employee Awareness Training
🔹 Educate users on identifying phishing emails, avoiding suspicious links, and reporting email threats.
🔹 Conduct regular cybersecurity awareness training in organizations.
✅ 6. Regular Security Audits & Monitoring
🔹 Conduct periodic security assessments to check for vulnerabilities.
🔹 Monitor email activity logs for unusual login attempts or unauthorized access.
🔎 CONCLUSION
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
🔹 Email is an essential communication tool but comes with security risks that
must be managed.
🔹 Understanding email threats helps in preventing cyber attacks.
🔹 Using email security best practices keeps communications safe & secure.
🔹 Organizations must implement email security policies, employee training, and
security solutions to protect against threats.
📌 Tip: Always verify email senders, avoid clicking unknown links, use encryption, and
report suspicious emails
MODULE 07
www.cybergita.com
Securing Mobile Devices
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
INTRODUCTION TO MOBILE SECURITY
CYBER GITA
What is Mobile Security?
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Mobile security refers to protecting smartphones, tablets, and other portable devices from threats
like hacking, malware, and unauthorized access.
• It involves securing data, applications, networks, and user identities to prevent cyberattacks.
Why is Mobile Security Important?
• Personal Data Protection: Safeguards sensitive data like contacts, photos, and financial details.
• Business Security: Prevents exposure of confidential company data on employee devices.
• Cybercrime Growth: Rising threats due to mobile banking, online shopping, and communication.
• Financial Loss: Hacked devices can cause fraud, identity theft, and ransomware attacks.
WHAT IS AN IMEI NUMBER?
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• IMEI (International Mobile Equipment Identity) is a 15-digit unique number assigned to every mobile device.
• It is used for identification, tracking, and blocking lost/stolen devices.
How to Find Your IMEI?
Dial *#06# on your phone.
Check in Settings > About Phone.
Look at the phone’s box or inside the SIM tray.
WHY IS IMEI IMPORTANT?
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Tracking Lost/Stolen Devices: If a phone is stolen, the police or service providers can track and block it using IMEI.
• Preventing IMEI Cloning: Hackers may clone IMEIs to use stolen devices undetected.
• Device Authentication: IMEI ensures only legitimate devices connect to a network.
Threats to IMEI
• IMEI Tampering: Criminals can change the IMEI to bypass tracking.
• Fake IMEI Numbers: Some unauthorized phones have duplicated
IMEIs, making them untraceable.
RISKS FACED BY MOBILE DEVICES
CYBER GITA
1. Physical Threats
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Device Theft/Loss: Losing a phone exposes personal and financial data.
• Damage Risks: Accidental drops, water damage, or hardware failure.
2. Cyber Security Threats
• Hacking: Attackers can gain remote access through weak passwords or unpatched vulnerabilities.
• Phishing: Fake SMS/emails trick users into revealing login credentials.
3. Network Threats
• Public Wi-Fi Attacks: Hackers can intercept data on unsecured Wi-Fi networks.
• Man-in-the-Middle Attacks: Attackers secretly relay or alter communications.
RISKS FACED BY MOBILE DEVICES
CYBER GITA
4. Application Risks
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Malicious Apps: Some apps request excessive permissions and steal data.
• Data Leaks: Apps collect and sell personal data without users knowing.
UNDERSTANDING MOBILE MALWARE
CYBER GITA
What is Mobile Malware?
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Malware is malicious software designed to infect and harm mobile devices.
• It spreads through malicious apps, phishing links, fake updates, and infected USB connections.
Types of Mobile Malware
1.Spyware: Secretly collects user data (e.g., Pegasus spyware).
2.Ransomware: Locks files and demands money to restore access.
3.Trojans: Disguised as useful apps but steal data in the background.
4.Adware: Bombards users with unwanted ads and slows down devices.
5.Banking Trojans: Steal banking credentials and intercept OTPs.
BLUETOOTH SECURITY THREATS
CYBER GITA
Why is Bluetooth a Risk?
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Bluetooth allows wireless connections but can be exploited by hackers if not secured properly.
Common Bluetooth Attacks
1.Bluesnarfing: Hackers steal files via Bluetooth without user consent.
2.Bluejacking: Attackers send spam messages to nearby devices.
3.Bluetooth Eavesdropping: Hackers secretly listen to conversations.
HOW TO SECURE BLUETOOTH?
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Keep Bluetooth OFF when not in use.
• Set Bluetooth to “Not Discoverable” mode.
• Use strong PINs for Bluetooth pairing.
• Avoid pairing in public places.
SECURITY FEATURES OF ANDROID &
IOS
CYBER GITA
Android Security
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Google Play Protect: Scans apps for malware.
• App Sandboxing: Apps run in isolated environments to prevent data leaks.
• Biometric Authentication: Face unlock, fingerprint.
• Two-Factor Authentication (2FA): Adds an extra security layer.
iOS Security
• App Store Review: Apple verifies all apps before listing.
• Secure Enclave: Stores fingerprint and Face ID data securely.
• End-to-End Encryption: Protects iMessage, FaceTime.
• Lockdown Mode: Restricts risky activities for high-security users.
MOBILE SECURITY TOOLS
CYBER GITA
Top Security Apps
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Antivirus Apps: Avast, McAfee, Bitdefender.
• VPNs (Virtual Private Networks): Encrypts internet traffic (NordVPN, ExpressVPN).
• Password Managers: Securely store passwords (LastPass, 1Password).
• Device Tracking Tools: Find My iPhone, Google Find My Device.
How to Choose a Good Security App?
• Check reviews & security certifications.
• Avoid unknown or free apps that collect excessive data.
• Ensure it gets regular security updates.
BEST PRACTICES FOR MOBILE
SECURITY
CYBER GITA
1. Keep Software Updated
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Updates fix security flaws and prevent hacking.
2. Use Strong Authentication
• Use biometrics, PINs, and Two-Factor Authentication (2FA).
3. Avoid Public Wi-Fi
• Use a VPN if necessary.
4. Be Careful with App Permissions
• Only grant necessary permissions.
• Avoid apps asking for unrelated permissions (e.g., a calculator asking for location access).
BEST PRACTICES FOR MOBILE
SECURITY
CYBER GITA
5. Regularly Backup Data
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Use cloud storage or external drives to avoid data loss.
6. Monitor Device Activity
• Regularly check battery usage, data usage, and installed apps.
7. Be Aware of Social Engineering Attacks
• Don’t click on suspicious links in SMS/emails.
• Avoid downloading apps from untrusted sources.
MODULE 08
www.cybergita.com
Securing Cloud
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Understand types of clouds and their services.
• Learn the advantages of cloud services.
• Identify threats to cloud accounts and countermeasures.
• Address privacy issues in cloud computing.
• Choose the correct cloud advisor for your needs.
Design
• Use bullet points for clarity.
• Add icons for each objective (e.g., cloud, shield,
lock, magnifying glass).
TYPES OF CLOUDS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Public Cloud:
• Services provided over the internet (e.g., AWS, Azure).
Private Cloud:
• Dedicated infrastructure for a single organization.
Hybrid Cloud:
• Combines public and private clouds.
Community Cloud:
• Shared infrastructure for a specific community.
CLOUD SERVICE MODELS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
1.IaaS (Infrastructure as a Service):
⚬ Virtualized computing resources (e.g., AWS EC2).
2.PaaS (Platform as a Service):
⚬ Platform for app development (e.g., Google App Engine).
3.SaaS (Software as a Service):
⚬ Software delivered over the internet (e.g., Microsoft 365).
ADVANTAGES OF CLOUD SERVICES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Scalability: Easily adjust resources based on demand.
Cost Efficiency: Pay-as-you-go pricing models.
Accessibility: Access data and apps from anywhere.
Disaster Recovery: Robust backup and recovery solutions.
Automatic Updates: Regular updates from providers.
THREATS TO CLOUD ACCOUNTS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Data Breaches: Unauthorized access to sensitive data.
Account Hijacking: Attackers gaining control of accounts.
Insider Threats: Malicious or negligent actions by employees.
Misconfiguration: Improper settings leading to vulnerabilities.
DDoS Attacks: Overwhelming services with traffic.
COUNTERMEASURES FOR CLOUD
THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Strong Authentication: Use MFA for cloud accounts.
• Encryption: Encrypt data at rest and in transit.
• Access Controls: Implement RBAC and least privilege.
• Regular Audits: Conduct security assessments.
• Incident Response Plan: Develop and test a response plan.
PRIVACY ISSUES IN CLOUD
COMPUTING
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Data Ownership: Who owns the data stored in the cloud?
Data Residency: Compliance with local data protection laws.
Third-Party Access: How providers handle data access.
ADDRESSING PRIVACY ISSUES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Read Privacy Policies: Understand provider practices.
Data Encryption: Protect sensitive data.
Compliance: Ensure adherence to regulations (e.g., GDPR, HIPAA).
Data Minimization: Store only necessary data.
CHOOSING A CLOUD ADVISOR
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Assess Expertise: Look for certifications (e.g., CCSK, CCSP).
Evaluate Reputation: Check reviews and case studies.
Understand Your Needs: Align with organizational goals.
Cost vs. Value: Balance cost and benefits.
Ongoing Support: Ensure continuous monitoring and support.
CASE STUDY: SECURING A CLOUD
ENVIRONMENT
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Describe a real-world example of a cloud security breach and how it was resolved.
• Highlight lessons learned and best practices.
BEST PRACTICES FOR CLOUD
SECURITY
• Regularly update and patch cloud systems.
• Train employees on cloud security awareness.
• Monitor cloud activity for suspicious behavior.
• Use encryption and strong access controls.
• Conduct regular security audits.
MODULE 09
www.cybergita.com
Securing Network Connections
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Understand different types of networks.
• Set up your home network securely.
• Configure wireless networks on Windows and Mac.
• Identify threats to wireless networks and their countermeasures.
• Use firewalls, antivirus, and encryption to secure wireless networks.
UNDERSTANDING DIFFERENT TYPES
OF NETWORKS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• LAN (Local Area Network): Small area (e.g., home, office).
• WAN (Wide Area Network): Large area (e.g., the internet).
• WLAN (Wireless Local Area Network): Wireless version of LAN.
• VPN (Virtual Private Network): Secure connection over the internet.
• Key Point: Each network type has unique security considerations.
TYPES OF
NETWORKS:
SETTING UP YOUR HOME NETWORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Choose a Router: Select a reliable, secure router.
• Connect Devices: Use Ethernet or Wi-Fi.
• Configure Settings: Change default admin credentials, enable WPA3 encryption.
• Test the Network: Ensure all devices can connect.
• Pro Tip: Regularly update your router’s firmware for security patches.
STEPS TO SET UP A HOME
NETWORK:
SETTING UP WIRELESS NETWORKS IN WINDOWS
AND MAC
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Go to Settings > Network & Internet > Wi-Fi.
• Select your network and enter the password.
• Set the network as Private for better security.
WINDOWS:
• Go to System Preferences > Network.
• Select Wi-Fi, choose your network, and enter the password.
• Enable Firewall in Security & Privacy.
MAC:
THREATS TO WIRELESS NETWORKS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Eavesdropping: Hackers intercept data.
• Rogue Access Points: Fake Wi-Fi networks.
• Man-in-the-Middle Attacks: Hackers alter communication.
• Brute Force Attacks: Guessing passwords.
• Key Point: Wireless networks are vulnerable if not properly secured.
COMMON THREATS:
COUNTERMEASURES FOR WIRELESS NETWORK
THREATS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Use WPA3 encryption for Wi-Fi.
• Disable SSID broadcasting to hide your network.
• Enable MAC address filtering to allow only trusted devices.
• Regularly update router firmware.
• Use a VPN for secure browsing.
• Key Point: Layered security is the best defense.
PROTECTION STRATEGIES:
USING FIREWALLS, ANTIVIRUS, AND
ENCRYPTION
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Blocks unauthorized access to your network.
• Enable built-in firewalls on Windows and Mac.
FIREWALL:
• Protects against malware and viruses.
• Keep it updated for the latest threat definitions.
ANTIVIRUS:
• Use WPA3 for Wi-Fi and HTTPS for websites.
• Encrypt sensitive files with tools like BitLocker (Windows) or FileVault (Mac).
ENCRYPTION:
BEST PRACTICES FOR SECURING NETWORK
CONNECTIONS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Use strong, unique passwords for all devices and networks.
• Regularly update software and firmware.
• Avoid using public Wi-Fi for sensitive tasks.
• Monitor connected devices for suspicious activity.
• Educate family members or employees about network security.
TOP TIPS:
SUMMARY
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Understand different network types and their security needs.
• Set up home and wireless networks securely.
• Identify threats and implement countermeasures.
• Use firewalls, antivirus, and encryption for protection.
• Final Thought: A secure network is the foundation of digital safety.
RECAP:
MODULE 10
www.cybergita.com
Data Backup and Disaster Recovery
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• By the end of this module, you will be able to:
• Understand the importance and need for data backups
• Understand the reasons behind data loss incidents
• Identify what files to back up and when
• Learn about different types of data backups
• Learn how to create backups and restore data on Windows and Mac
• Understand the difference between data deletion and data destruction, and
the importance of the latter
• Let me know if you need any modifications
IMPORTANCE OF DATA BACKUPS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Prevents data loss due to accidental deletion, corruption, or hardware failure
• Ensures business continuity and disaster recovery
• Protects against cyber threats like ransomware and malware
• Saves time and effort in case of system crashes
REASONS BEHIND DATA LOSS
INCIDENTS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Accidental deletion of files
• Hardware failures (e.g., hard drive crashes)
• Software corruption or system crashes
• Cyber attacks (e.g., ransomware, malware, hacking)
• Natural disasters (e.g., fire, flood, earthquakes)
• Human errors (e.g., overwriting important files)
WHAT FILES TO BACKUP & WHEN?
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Critical Documents: Work files, contracts, reports
• Personal Data: Photos, videos, personal records
• System Files: Configuration and application settings
• When to Backup?
• Daily for critical data
• Weekly or monthly for less frequently used files
• Before major system updates or changes
TYPES OF DATA BACKUPS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Full Backup: Copies all selected data
• Incremental Backup: Backs up only the changed data since the last backup
• Differential Backup: Backs up data changed since the last full backup
• Mirror Backup: Creates an exact replica of the data
• Cloud Backup: Stores data on remote servers for easy recovery
HOW TO CREATE AND RESTORE BACKUPS
(WINDOWS & MAC)
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Windows:
• Use File History or Backup & Restore tool
• Create system image backups
• Restore from backups via Control Panel
• Mac:
• Use Time Machine for automatic backups
• Restore files or the entire system from a backup drive
DATA DELETION VS. DATA DESTRUCTION
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Data Deletion: Removes file references but can be recovered
• Data Destruction: Permanently erases data using secure methods (e.g.,
shredding, overwriting, degaussing)
• Why is Data Destruction Important?
• Prevents unauthorized recovery
• Ensures compliance with data privacy laws
SUMMARY & BEST PRACTICES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Regularly back up important data
• Use a combination of local and cloud backups
• Automate backups for consistency
• Test your backups periodically
• Secure backups with encryption
MODULE 11
www.cybergita.com
Securing IoT Devices and
Gaming Consoles
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
1.Understand IoT Devices.
2.Identify the various security risks associated with IoT devices and their countermeasures.
3.Identify the security risks associated with IoT children’s toys.
4.Understand the security best practices for IoT children’s toys.
5.Understand smart home systems and how to secure Alexa devices.
6.Understand the security risks associated with gaming consoles.
7.Identify the security measures to protect gaming consoles.
UNDERSTANDING IOT DEVICES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Definition of IoT (Internet of Things)
Examples of IoT devices (smart thermostats, wearables, smart home devices)
How IoT devices work (connectivity, data exchange)
SECURITY RISKS ASSOCIATED WITH
IOT DEVICES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Lack of encryption
• Weak authentication mechanisms
• Vulnerable firmware/software
• Botnet attacks (e.g., Mirai botnet)
• Countermeasures:
⚬ Regular firmware updates
⚬ Strong passwords and multi-factor authentication
⚬ Network segmentation
SECURITY RISKS IN IOT CHILDREN’S
TOYS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Privacy concerns (data collection)
• Unauthorized access to microphones/cameras
• Lack of parental controls
• Countermeasures:
• Research before purchasing
• Disable unnecessary features
• Monitor usage
BEST PRACTICES FOR SECURING IOT CHILDREN’S
TOYS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Change default passwords
• Regularly update firmware
• Disable remote access features
• Use a secure Wi-Fi network
• Monitor for recalls or security patches
SECURING SMART HOME SYSTEMS AND ALEXA
DEVICES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Risks:
• Voice command hijacking
• Unauthorized access to smart home devices
Best Practices:
• Enable two-factor authentication
• Use a strong Wi-Fi password
• Disable unused features (e.g., voice purchasing)
• Regularly review activity logs
SECURITY RISKS IN GAMING CONSOLES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Phishing and social engineering attacks
• Unauthorized in-game purchases
• Exploitation of vulnerabilities in online gaming
networks
• Countermeasures:
⚬ Use strong, unique passwords
⚬ Enable parental controls
⚬ Keep software updated
PROTECTING GAMING CONSOLES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Enable two-factor authentication
• Regularly update console firmware
• Avoid sharing personal information online
• Use a secure network (avoid public Wi-Fi)
• Monitor for suspicious activity
SUMMARY
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• IoT devices and gaming consoles are vulnerable to
various security risks.
• Implementing best practices (e.g., strong passwords,
regular updates) can mitigate these risks.
• Stay informed about emerging threats and solutions.
MODULE 12
www.cybergita.com
Secure Remote Working
Next Page
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE OBJECTIVES
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
• Understand remote work and its need.
• Identify the various types of remote work.
• Identify the security risks associated with remote work.
• Implement secure remote work.
• Understand the best practices for secure remote work.
• Understand the best practices for secure remote meetings.
UNDERSTANDING REMOTE WORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Definition of remote work
Why remote work is needed (flexibility, cost savings, global talent access)
Examples of remote work (full-time remote, hybrid, freelancing)
TYPES OF REMOTE WORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Full-time remote work
Hybrid work (part-time remote, part-time office)
Freelancing/contract work
Remote teams and distributed workforces
SECURITY RISKS IN REMOTE WORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Unsecured home networks
Phishing and social engineering attacks
Use of personal devices (BYOD risks)
Data leakage and unauthorized access
Weak passwords and lack of multi-factor authentication
IMPLEMENTING SECURE REMOTE
WORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Use a Virtual Private Network (VPN)
Ensure endpoint security (antivirus, firewalls)
Encrypt sensitive data
Implement multi-factor authentication (MFA)
Regularly update software and systems
BEST PRACTICES FOR SECURE REMOTE
WORK
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Use company-approved devices and software
Avoid public Wi-Fi for work-related tasks
Regularly back up data
Conduct security awareness training
Monitor and audit remote access logs
BEST PRACTICES FOR SECURE REMOTE
MEETINGS
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Use secure video conferencing tools (e.g., Zoom, Microsoft Teams)
Enable waiting rooms and password protection
Lock meetings once all participants have joined
Avoid sharing meeting links publicly
Be cautious of screen sharing and file sharing
SUMMARY
CYBER GITA
Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
Remote work offers flexibility but comes with security risks.
Implementing secure practices (e.g., VPNs, MFA, encryption) is critical.
Follow best practices for remote work and meetings to stay secure.

More Related Content

PPTX
What's New In CompTIA Security+ - Course Technology Computing Conference
PPTX
Cyber security
PPTX
BCE L-3omputer security Basics.pptx
PPTX
Cybersecurity - Introduction and Preventive Measures
PDF
Ethics in Information Technology - An Overview
PPTX
Data protection and security
PPTX
Introduction to Cyber Security
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
What's New In CompTIA Security+ - Course Technology Computing Conference
Cyber security
BCE L-3omputer security Basics.pptx
Cybersecurity - Introduction and Preventive Measures
Ethics in Information Technology - An Overview
Data protection and security
Introduction to Cyber Security
Disruptionware-TRustedCISO103020v0.7.pptx

Similar to Certified Secure Computer User CSCUv3 by Cyber Gita (20)

PPTX
Cybersecurity Training
PPT
Bulletproof IT Security
PPSX
Cyber security & Data Protection
PPT
Cyber security & Importance of Cyber Security
PDF
cybersecurity-180303131014.pdf
PPTX
CyberSecurity Threats in the Digital Age(1).pptx
PPTX
Cyber security
PDF
Computer Security 101 by Montaigne
PDF
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
PPT
Chapter 3 Ensuring Internet Security
PPTX
Network Security of Data Protection
PPTX
Cyber security
PPT
CyberSecurity presentation for basic knowledge about this topic
PPT
Data security
PPTX
Security_Awareness_Primer.pptx
PPTX
23 network security threats pkg
PPTX
2014CyberSecurityProject
PPTX
Computer-Security.pptx
PPTX
Data security
PDF
Cyber Security Matters a book by Hama David Bundo
Cybersecurity Training
Bulletproof IT Security
Cyber security & Data Protection
Cyber security & Importance of Cyber Security
cybersecurity-180303131014.pdf
CyberSecurity Threats in the Digital Age(1).pptx
Cyber security
Computer Security 101 by Montaigne
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Chapter 3 Ensuring Internet Security
Network Security of Data Protection
Cyber security
CyberSecurity presentation for basic knowledge about this topic
Data security
Security_Awareness_Primer.pptx
23 network security threats pkg
2014CyberSecurityProject
Computer-Security.pptx
Data security
Cyber Security Matters a book by Hama David Bundo
Ad

Recently uploaded (20)

PDF
composite construction of structures.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Well-logging-methods_new................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Sustainable Sites - Green Building Construction
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Construction Project Organization Group 2.pptx
composite construction of structures.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Well-logging-methods_new................
Foundation to blockchain - A guide to Blockchain Tech
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
573137875-Attendance-Management-System-original
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
bas. eng. economics group 4 presentation 1.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
OOP with Java - Java Introduction (Basics)
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Sustainable Sites - Green Building Construction
Mechanical Engineering MATERIALS Selection
Lecture Notes Electrical Wiring System Components
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Construction Project Organization Group 2.pptx
Ad

Certified Secure Computer User CSCUv3 by Cyber Gita

  • 1. Certified Secure Computer User v3 CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 2. BE CYBER SMART DON’T FALL FOR THE TRAP! The C|SCU program teaches safe use of computers, devices, and networks. It covers key security topics like identity theft, phishing, malware, and data protection, helping users become secure and skilled. Certified Secure Computer User
  • 3. C|SCU V3 GOES BEYOND SECURITY AWARENESS VERSION 3 • Coverage on the latest Operating Systems • Latest Tools and Techniques to maximize security • Coverage on securing Gaming Consoles and IoT/Smart Home Devices • Techniques to secure Home Offices and Remote Work locations Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Table of Content 1 INTRODUCTION TO DATA SECURITY 4 SECURITY ON SOCIAL NETWORKING SITES 2 SECURING OPERATING SYSTEMS 5 SECURING EMAIL COMMUNICATIONS 3 MALWARE AND ANTIVIRUS 6 SECURING MOBILE DEVICES Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 5. Table of Content 7 SECURING THE CLOUD 10 SECURING IOT DEVICES AND GAMING CONSOLES 8 SECURING NETWORK CONNECTIONS 11 SECURE REMOTE WORK 9 DATA BACKUP AND DISASTER RECOVERY Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 6. MODULE 01 Foundations of Securing Digital Information Introduction To Data Security Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 7. Module Objectives - Define data and understand its significance in the digital age - Identify common threats to data security - Explore the fundamental elements of security - Discuss strategies for implementing effective security measures Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 8. UNDERSTANDING DATA - Data comprises raw facts and figures that can be processed to generate meaningful information Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 01 - Types of Data: - Structured Data: Organized and searchable (e.g., databases) - Unstructured Data: Lacks a predefined format (e.g., emails, videos) - Semi-structured Data: Combines elements of both (e.g., JSON, XML)
  • 9. IMPORTANCE OF DATA IN THE INFORMATION AGE - Data drives decision-making processes - Underpins innovations in technology and services - Ensures privacy, compliance, and operational integrity Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 02
  • 10. COMMON THREATS TO DATA SECURITY - Malware Attacks: Harmful software that exploits devices - Phishing Scams: Fraudulent attempts to obtain sensitive information - Insider Threats: Risks from individuals within the organization - Physical Threats: Theft or damage of hardware containing data Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 03
  • 11. FUNDAMENTAL ELEMENTS OF SECURITY - Confidentiality: Accessible only to authorized individuals - Integrity: Ensures accuracy and completeness of data - Availability: Accessible to authorized users when needed Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 04
  • 12. IMPLEMENTING SECURITY MEASURES - Technical Measures: Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 05 - Encryption to protect data - Firewalls and intrusion detection systems - Administrative Measures: - Security policies and training programs - Physical Measures: - Secure access to hardware - Surveillance and monitoring systems
  • 13. DATA - THE DIGITAL BUILDING BLOCKS What is Data? • Raw facts and figures. • Basis for all digital operations. Examples: • Text, numbers, multimedia, sensor readings. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Next Page CYBER GITA Page 06
  • 14. WHAT IS DATA? Definition: Page 07 Next Page CYBER GITA Data is unprocessed, unorganized information. Characteristics • Raw and unstructured. • Requires processing to gain meaning. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 15. WHY DATA IS VALUABLE Page 08 Next Page CYBER GITA • Drives decision-making. • Backbone of AI, IoT, and Big Data. • Critical for personal, organizational, and societal functions. Fun Fact • Data is often called the "new oil." Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 16. THREATS TO DATA - COMMON THREATS Page 09 Next Page CYBER GITA • Unauthorized access (hacking). • Data breaches and leaks. • Malware and ransomware attacks. • Insider threats. Impact • Loss of trust. • Financial and reputational damage. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 17. DATA SECURITY Page 10 Next Page CYBER GITA • Protecting data from unauthorized access and corruption. Core Principles: • Confidentiality: Only authorized users access data. • Integrity: Data remains accurate and trustworthy. • Availability: Data is accessible when needed. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 18. ELEMENTS OF SECURITY Page 11 Next Page CYBER GITA Key Components: • Authentication (e.g., passwords, biometrics). • Encryption (data protection during transmission). • Backup and recovery. • Access control policies. • Monitoring and auditing. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 19. IMPLEMENTING SECURITY Page 12 Next Page CYBER GITA Practical Steps: • Use strong passwords and multi-factor authentication. • Encrypt sensitive data. • Regularly update software and systems. • Educate employees and users on security practices. • Monitor networks and systems for vulnerabilities. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 20. MODULE 02 www.cybergita.com Securing Operating Systems Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 21. WHAT IS SECURING AN OPERATING SYSTEM? Page 09 Next Page CYBER GITA Why is it important? Protecting the operating system from threats to maintain system integrity, confidentiality, and availability. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Prevent unauthorized access. • Safeguard sensitive data. • Ensure stable system performance.
  • 22. LABS Page 10 Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Guidelines to Secure Windows 10 • Create a User Account Password in Windows 10 • Change a User Account Password in Windows 10 • Disable the Guest Account in Windows 10 • Lock Out Unwanted Guests in Windows 10 • Rename the Administrator Account in Windows 10 • Enable Software/Windows Update in Windows 10 • Enabling Windows Firewall in Windows 10
  • 23. LABS Page 11 Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Adding New Apps in Windows Defender Firewall • Turn on Windows Security • Enable BitLocker in Windows 10 • Windows Encrypting File System (EFS) • How to Decrypt a File Using EFS in Windows? • Disabling Unnecessary Services in Windows 10 • Killing Unwanted Processes in Windows 10 • Hiding FIles and Folders in Windows 10
  • 24. LABS Page 12 Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Disable Simple File Sharing in Windows 10 • Raise the UAC Slider Bar only Windows Lab
  • 25. MODULE 03 www.cybergita.com Malware and Antivirus Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 26. WHAT IS MALWARE? Page 14 Next Page CYBER GITA Purpose • Malware (malicious software) is a program or file designed to harm, exploit, or damage a system or network. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Disrupt operations. • Steal sensitive information. • Gain unauthorized access.
  • 27. TYPES OF MALWARE Page 15 Next Page CYBER GITA • Viruses • Worms • Ransomware • Trojan Horses • Spyware • Adware • Rootkits • Keyloggers Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 28. WHAT IS ANTIVIRUS? Page 16 Next Page CYBER GITA Purpose • Antivirus software is a program designed to detect, prevent, and remove malware from computers and networks. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Protect systems from known threats. • Scan files and activities for suspicious behavior.
  • 29. HOW DOES ANTIVIRUS WORK? Page 17 Next Page CYBER GITA • Signature-Based Detection • Heuristic Analysis • Real-Time Scanning • Quarantine and Removal Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 30. LIMITATIONS OF ANTIVIRUS SOFTWARE Page 18 Next Page CYBER GITA • Limited to Known Threats • False Positives/Negatives • Resource-Intensive • Insufficient Against Advanced Threats • Dependency on Updates Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 31. INSTALL ANTIVIRUS SOFTWARE Page 18 Next Page CYBER GITA • Provides protection against viruses, Trojans, worms, spyware, spam, hackers, and unknown threats. • Functions as a two-way firewall: • Monitors incoming and outgoing traffic. • Blocks suspicious data transfers. • Supports data restoration for corrupted files. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 32. WINDOWS DEFENDER ANTIVIRUS (WINDOWS 10) Page 18 Next Page CYBER GITA • Real-Time Protection: Secures emails, applications, Internet, and cloud services. • Key Features: • Quick Scan: Scans areas prone to malware. • Full Scan: Analyzes all files and applications for threats. • Includes Windows Defender Security Center for comprehensive security. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 33. EICAR TEST & ANTIVIRUS SECURITY CHECKLIST Page 18 Next Page CYBER GITA • The EICAR file is a harmless test file recognized by all antivirus software. How to Create: • Open Notepad. • Copy-paste this line: • X50!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* • Save the file as EICAR.COM. Result: • If antivirus software is active, saving the file will trigger an alert. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 34. ANTIVIRUS SECURITY CHECKLIST Page 18 Next Page CYBER GITA • Install up-to-date antivirus software. • Configure antivirus to scan: • DVD-ROMs, emails, pen drives, external drives, websites, and downloads. • Install and configure firewall software for all computers and networks. • Schedule weekly automatic scans. • Enable automatic updates for antivirus software. • Create procedures for: • Updating antivirus software. • Handling computer viruses and infections effectively. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 35. MODULE 04 www.cybergita.com INTERNET SECURITY Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 36. INTRODUCTION TO INTERNET SECURITY Page 18 Next Page CYBER GITA • Internet security refers to the protection of data, privacy, and communication online. • It involves measures to prevent cyber threats, such as malware, phishing, and hacking. • A secure web experience requires awareness and best practices in browsing. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 37. INTRODUCTION TO WEB BROWSERS Page 18 Next Page CYBER GITA • A web browser is a software application used to access the internet. • Common browsers: Microsoft Edge, Mozilla Firefox, Google Chrome, Safari. • Browsers play a key role in security by blocking malicious content and encrypting connections. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 38. SECURING THE WEB BROWSER Page 18 Next Page CYBER GITA • Keep browsers updated to the latest version. • Use strong, unique passwords for accounts. • Enable security features like HTTPS enforcement and pop- up blockers. • Disable unnecessary plugins and extensions. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 39. SECURING MICROSOFT EDGE Page 18 Next Page CYBER GITA • Enable Microsoft Defender SmartScreen. • Use InPrivate browsing mode. • Disable autofill for sensitive information. • Manage tracking prevention settings. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 40. SECURING MOZILLA FIREFOX Page 18 Next Page CYBER GITA • Use Enhanced Tracking Protection. • Enable HTTPS-Only mode. • Block third-party cookies. • Use secure add-ons verified by Mozilla. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 41. SECURING SAFARI Page 18 Next Page CYBER GITA • Enable Intelligent Tracking Prevention. • Use Private Browsing mode. • Manage website permissions. • Keep Safari updated for security patches. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 42. SECURING GOOGLE CHROME Page 18 Next Page CYBER GITA • Enable Safe Browsing mode. • Use password manager and security checkup tools. • Turn on site permissions management. • Clear browsing data regularly. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 43. BROWSER FEATURES AND THEIR RISKS Page 18 Next Page CYBER GITA • Autofill: Can be exploited by malicious scripts. • Extensions: Risk of malware-infected add-ons. • Cookies: Can track user activity and compromise privacy. • Pop-ups: Often used for phishing attacks. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 44. HOW TO IDENTIFY A SECURE WEBSITE Page 18 Next Page CYBER GITA • Look for HTTPS in the URL. • Check for a valid security certificate. • Avoid websites with too many pop-ups. • Be cautious of suspicious-looking domain names. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 45. INSTANT MESSAGING SECURITY Page 18 Next Page CYBER GITA • Instant Messaging (IM) allows real-time communication but has security risks. • Risks include phishing, malware, and identity theft. • Messages can be intercepted if not encrypted. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 46. SECURITY ISSUES IN INSTANT MESSAGING Page 18 Next Page CYBER GITA • Fake profiles and impersonation. • Spread of malware via links and attachments. • Data leaks due to weak authentication. • Social engineering attacks. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 47. MITIGATING SECURITY ISSUES IN IM Page 18 Next Page CYBER GITA • Use end-to-end encrypted messaging apps. • Enable two-factor authentication (2FA). • Do not share sensitive information over IM. • Report suspicious accounts and messages. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 48. CHILD ONLINE SAFETY Page 18 Next Page CYBER GITA • Children are vulnerable to online threats such as cyberbullying and grooming. • Parents and guardians must educate children about safe online practices. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 49. GUIDELINES FOR CHILD ONLINE SAFETY Page 18 Next Page CYBER GITA • Set age-appropriate internet restrictions. • Teach children about safe browsing and privacy. • Monitor online activities without invading privacy. • Encourage open communication. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 50. DETERMINING IF CHILDREN ARE AT RISK Page 18 Next Page CYBER GITA • Sudden behavioral changes. • Secrecy about online activities. • Receiving gifts from strangers. • Increased time spent online late at night. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 51. PROTECTING CHILDREN FROM ONLINE THREATS Page 18 Next Page CYBER GITA • Use parental control tools. • Teach children to recognize scams and suspicious behavior. • Set clear rules for internet use. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 52. ENCOURAGING CHILDREN TO REPORT Page 18 Next Page CYBER GITA • Teach them to report cyberbullying and inappropriate content. • Create a safe environment where they feel comfortable sharing concerns. • Encourage reporting suspicious online behavior to parents or teachers. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 53. HOW TO REPORT A CRIME Page 18 Next Page CYBER GITA • Report cyber crimes to law enforcement authorities. • Use official reporting portals for cyber threats. • Inform school authorities or child safety organizations if children are affected. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 54. ACTIONS TO TAKE WHEN A CHILD BECOMES A VICTIM OF ONLINE ABUSE Page 18 Next Page CYBER GITA • Stay calm and provide emotional support. • Document any harmful interactions as evidence. • Block and report the offender. • Seek professional help if necessary. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 55. KIDZSEARCH WEB PORTAL Page 18 Next Page CYBER GITA • A child-friendly search engine that filters unsafe content. • Provides educational resources in a secure environment. • Encourages safe and productive internet use for kids. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. LINK
  • 56. MODULE SUMMARY Page 18 Next Page CYBER GITA • Internet security is essential for safe browsing and communication. • Secure web browsers by enabling privacy settings and keeping them updated. • Recognize and mitigate risks in instant messaging. • Protect children from online threats by educating them and using protective measures. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 57. MODULE 05 www.cybergita.com Security On Social Networking Sites Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 58. MODULE OBJECTIVES Next Page CYBER GITA • Understand the concept of virtual social networking • Understand What a Profile is on a Social Networking Site and The information it Contains • Understand the risk associated with online social networking • understand what grotagging is and the risks it poses • understand the various risks of online social networking that minors are exposed to • configure the security settings of Facebook • configure the security settings of Twitter Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 59. INTRODUCTION TO SOCIAL NETWORKING SITES Next Page CYBER GITA • Social networking sites allow users to create profiles, connect, and share content. • Examples: Facebook, Twitter (X), Instagram, LinkedIn, Snapchat. • These platforms offer benefits but also pose security risks. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 60. WHAT IS A PROFILE? Next Page CYBER GITA • A user’s online identity consisting of personal information. • Common elements: Name, Profile picture, Bio, Contact details, Interests, Location. • Public vs Private profiles. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 61. INFORMATION AVAILABLE ON SOCIAL MEDIA Next Page CYBER GITA • Public Information: Posts, comments, likes, profile pictures. • Private Information: Messages, saved payment details, location history. • Risks: Identity theft, impersonation, data leaks. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 62. UNDERSTANDING VARIOUS SOCIAL NETWORKING SECURITY THREATS Next Page CYBER GITA Phishing: Fake login pages to steal credentials. Identity Theft: Using personal data for fraud. Malware: Viruses spread through links & downloads. Site Flaws: Security loopholes allowing data leaks. URL Spoofing: Fake URLs mimicking real sites. Clickjacking: Hidden malicious buttons. Social Engineering: Manipulation to gain access. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 63. WHAT IS GEOTAGGING? Next Page CYBER GITA Geotagging adds location data to photos & posts. Risks: Can expose real-time location, making users vulnerable. Attackers can track movement patterns. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 64. HOW TO DISABLE GEOTAGGING IN ANDROID & IOS Next Page CYBER GITA Android: • Open Camera App > Settings. • Turn off "Save Location" or "Geotagging." iOS: • Go to Settings > Privacy > Location Services. • Select Camera > Choose "Never" or "While Using the App." Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 65. SOCIAL NETWORKING THREATS TO MINORS Next Page CYBER GITA • Contact with predators through chatrooms and friend requests. • Cyberbullying through comments, messages, and posts. • Grooming: Manipulation of minors for exploitation. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 66. STAYING SAFE ON FACEBOOK Next Page CYBER GITA • Profile Settings: • Keep profile private, restrict friend requests. • General Settings: • Secure username, email, and password. • Security Settings: • Enable Two-Factor Authentication (2FA). • Turn on login alerts. • Privacy Settings: • Review audience for posts. • Limit visibility of past posts. • Control who can look you up. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 67. STAYING SAFE ON TWITTER (X) Next Page CYBER GITA • Password & Account Security: • Use a strong password. • Enable Two-Factor Authentication. • Email Notifications & Privacy Controls: • Disable unnecessary notifications. • Restrict who can tag, mention, or message you. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 68. MODULE 06 www.cybergita.com Securing Email Communications Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 69. 📌 MODULE OVERVIEW CYBER GITA 🔹 Understand the concept of an email 🔹 Identify different email clients & service providers 🔹 Why email security is important 🔹 Common email threats 🔹 Email security procedures 🔹 Best practices for securing email communications 🔹 Latest trends in email security threats and countermeasures Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 70. 📧 WHAT IS AN EMAIL? CYBER GITA • Email (Electronic Mail) is a method of sending digital messages over the internet. • It allows users to communicate quickly with text, attachments, and links. • Uses SMTP, POP3, and IMAP protocols for sending and receiving emails. • Modern email services also support cloud storage integration and advanced encryption features. 📌 Example: Gmail, Outlook, Yahoo Mail, Zoho Mail, ProtonMail. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 71. ️ 🛠️EMAIL CLIENTS & SERVICE PROVIDERS CYBER GITA • Microsoft Outlook – Used widely in corporate environments for professional email communication. • Mozilla Thunderbird – Open-source and customizable email client. • Apple Mail – Default email client for macOS and iOS devices. • Mailbird – A unified email client that integrates with multiple services. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. EMAIL CLIENTS (SOFTWARE TO ACCESS EMAILS)
  • 72. 🛠️EMAIL CLIENTS & SERVICE PROVIDERS CYBER GITA • Gmail (Google) – Offers advanced AI-driven spam filtering and security. • Outlook.com (Microsoft) – Integrated with Microsoft Office and OneDrive. • Yahoo Mail – Provides large email storage and integrated news services. • ProtonMail – A privacy-focused email service with end-to-end encryption. • Zoho Mail – Business email with advanced admin controls. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. EMAIL SERVICE PROVIDERS (WEB-BASED EMAIL SERVICES)
  • 73. 🔐 WHY IS EMAIL SECURITY IMPORTANT? CYBER GITA ✅ Prevents unauthorized access to sensitive information. ✅ Protects against phishing, spam, and malware. ✅ Ensures confidentiality, integrity, and authenticity of messages. ✅ Helps organizations comply with cybersecurity regulations like GDPR and HIPAA. ✅ Reduces the risk of business email compromise (BEC) and financial fraud. ✅ Secures corporate communications and helps maintain business continuity. Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. 📌 Example: If an attacker gains access to an employee’s email, they can steal confidential business data, send fraudulent messages, or conduct phishing attacks within an organization.
  • 74. 🚨 COMMON EMAIL THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Phishing Attacks 1️ 1️ ⃣ 🔸 Fake emails trick users into giving sensitive information like passwords or financial details. 🔸 Example: "Your bank account has been compromised! Click here to reset your password." 🔸 Spear Phishing – Targeted phishing aimed at a specific individual or company. 🔸 Whaling – Phishing attacks targeting high-level executives.
  • 75. 🚨 COMMON EMAIL THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Spam & Malware 2️ ⃣ 🔸 Unwanted emails that contain malicious links or attachments. 🔸 Example: An email with a virus-infected attachment that installs malware when opened. 🔸 Can be used for ransomware distribution, credential theft, or financial fraud.
  • 76. 🚨 COMMON EMAIL THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Business Email Compromise (BEC) 3️ 3️ ⃣ 🔸 Attackers impersonate CEO or managers to trick employees into sending money or sensitive data. 🔸 Example: A fake email from a "CEO" instructing finance staff to transfer funds to an attacker-controlled account.
  • 77. 🚨 COMMON EMAIL THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Email Spoofing 4️ ⃣ 🔸 Hackers forge sender addresses to make emails appear from trusted contacts. 🔸 Used in phishing and fraud attacks. 🔸 Can be prevented using DMARC, DKIM, and SPF authentication protocols.
  • 78. 🚨 COMMON EMAIL THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Man-in-the-Middle (MITM) Attacks 5️ 5️ ⃣ 🔸 Attackers intercept email communications to steal sensitive data. 🔸 Often happens over unsecured public Wi-Fi networks. 🔸 Can be prevented using email encryption and VPN services.
  • 79. ️ 🛡️EMAIL SECURITY PROCEDURES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. ✅ 1. Use Strong Authentication 🔹 Enable Two-Factor Authentication (2FA) for email accounts. 🔹 Use strong, unique passwords and avoid reusing passwords across accounts. ✅ 2. Email Encryption 🔹 Encrypt emails using PGP (Pretty Good Privacy) or S/MIME to prevent unauthorized access. 🔹 Organizations can use end-to-end encryption to secure emails in transit.
  • 80. 🛡️EMAIL SECURITY PROCEDURES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. ✅ 3. Anti-Phishing & Spam Filters 🔹 Use email security tools like DMARC, DKIM, and SPF to prevent spoofing and phishing. 🔹 Regularly update spam filters to block malicious emails. ✅ 4. Secure Email Gateways 🔹 Implement firewalls, intrusion detection systems (IDS), and email security solutions (e.g., Proofpoint, Mimecast). 🔹 Use secure email gateways (SEGs) to scan inbound and outbound email traffic.
  • 81. 🛡️EMAIL SECURITY PROCEDURES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. ✅ 5. Employee Awareness Training 🔹 Educate users on identifying phishing emails, avoiding suspicious links, and reporting email threats. 🔹 Conduct regular cybersecurity awareness training in organizations. ✅ 6. Regular Security Audits & Monitoring 🔹 Conduct periodic security assessments to check for vulnerabilities. 🔹 Monitor email activity logs for unusual login attempts or unauthorized access.
  • 82. 🔎 CONCLUSION CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. 🔹 Email is an essential communication tool but comes with security risks that must be managed. 🔹 Understanding email threats helps in preventing cyber attacks. 🔹 Using email security best practices keeps communications safe & secure. 🔹 Organizations must implement email security policies, employee training, and security solutions to protect against threats. 📌 Tip: Always verify email senders, avoid clicking unknown links, use encryption, and report suspicious emails
  • 83. MODULE 07 www.cybergita.com Securing Mobile Devices Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 84. INTRODUCTION TO MOBILE SECURITY CYBER GITA What is Mobile Security? Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Mobile security refers to protecting smartphones, tablets, and other portable devices from threats like hacking, malware, and unauthorized access. • It involves securing data, applications, networks, and user identities to prevent cyberattacks. Why is Mobile Security Important? • Personal Data Protection: Safeguards sensitive data like contacts, photos, and financial details. • Business Security: Prevents exposure of confidential company data on employee devices. • Cybercrime Growth: Rising threats due to mobile banking, online shopping, and communication. • Financial Loss: Hacked devices can cause fraud, identity theft, and ransomware attacks.
  • 85. WHAT IS AN IMEI NUMBER? CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • IMEI (International Mobile Equipment Identity) is a 15-digit unique number assigned to every mobile device. • It is used for identification, tracking, and blocking lost/stolen devices. How to Find Your IMEI? Dial *#06# on your phone. Check in Settings > About Phone. Look at the phone’s box or inside the SIM tray.
  • 86. WHY IS IMEI IMPORTANT? CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Tracking Lost/Stolen Devices: If a phone is stolen, the police or service providers can track and block it using IMEI. • Preventing IMEI Cloning: Hackers may clone IMEIs to use stolen devices undetected. • Device Authentication: IMEI ensures only legitimate devices connect to a network. Threats to IMEI • IMEI Tampering: Criminals can change the IMEI to bypass tracking. • Fake IMEI Numbers: Some unauthorized phones have duplicated IMEIs, making them untraceable.
  • 87. RISKS FACED BY MOBILE DEVICES CYBER GITA 1. Physical Threats Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Device Theft/Loss: Losing a phone exposes personal and financial data. • Damage Risks: Accidental drops, water damage, or hardware failure. 2. Cyber Security Threats • Hacking: Attackers can gain remote access through weak passwords or unpatched vulnerabilities. • Phishing: Fake SMS/emails trick users into revealing login credentials. 3. Network Threats • Public Wi-Fi Attacks: Hackers can intercept data on unsecured Wi-Fi networks. • Man-in-the-Middle Attacks: Attackers secretly relay or alter communications.
  • 88. RISKS FACED BY MOBILE DEVICES CYBER GITA 4. Application Risks Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Malicious Apps: Some apps request excessive permissions and steal data. • Data Leaks: Apps collect and sell personal data without users knowing.
  • 89. UNDERSTANDING MOBILE MALWARE CYBER GITA What is Mobile Malware? Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Malware is malicious software designed to infect and harm mobile devices. • It spreads through malicious apps, phishing links, fake updates, and infected USB connections. Types of Mobile Malware 1.Spyware: Secretly collects user data (e.g., Pegasus spyware). 2.Ransomware: Locks files and demands money to restore access. 3.Trojans: Disguised as useful apps but steal data in the background. 4.Adware: Bombards users with unwanted ads and slows down devices. 5.Banking Trojans: Steal banking credentials and intercept OTPs.
  • 90. BLUETOOTH SECURITY THREATS CYBER GITA Why is Bluetooth a Risk? Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Bluetooth allows wireless connections but can be exploited by hackers if not secured properly. Common Bluetooth Attacks 1.Bluesnarfing: Hackers steal files via Bluetooth without user consent. 2.Bluejacking: Attackers send spam messages to nearby devices. 3.Bluetooth Eavesdropping: Hackers secretly listen to conversations.
  • 91. HOW TO SECURE BLUETOOTH? CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Keep Bluetooth OFF when not in use. • Set Bluetooth to “Not Discoverable” mode. • Use strong PINs for Bluetooth pairing. • Avoid pairing in public places.
  • 92. SECURITY FEATURES OF ANDROID & IOS CYBER GITA Android Security Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Google Play Protect: Scans apps for malware. • App Sandboxing: Apps run in isolated environments to prevent data leaks. • Biometric Authentication: Face unlock, fingerprint. • Two-Factor Authentication (2FA): Adds an extra security layer. iOS Security • App Store Review: Apple verifies all apps before listing. • Secure Enclave: Stores fingerprint and Face ID data securely. • End-to-End Encryption: Protects iMessage, FaceTime. • Lockdown Mode: Restricts risky activities for high-security users.
  • 93. MOBILE SECURITY TOOLS CYBER GITA Top Security Apps Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Antivirus Apps: Avast, McAfee, Bitdefender. • VPNs (Virtual Private Networks): Encrypts internet traffic (NordVPN, ExpressVPN). • Password Managers: Securely store passwords (LastPass, 1Password). • Device Tracking Tools: Find My iPhone, Google Find My Device. How to Choose a Good Security App? • Check reviews & security certifications. • Avoid unknown or free apps that collect excessive data. • Ensure it gets regular security updates.
  • 94. BEST PRACTICES FOR MOBILE SECURITY CYBER GITA 1. Keep Software Updated Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Updates fix security flaws and prevent hacking. 2. Use Strong Authentication • Use biometrics, PINs, and Two-Factor Authentication (2FA). 3. Avoid Public Wi-Fi • Use a VPN if necessary. 4. Be Careful with App Permissions • Only grant necessary permissions. • Avoid apps asking for unrelated permissions (e.g., a calculator asking for location access).
  • 95. BEST PRACTICES FOR MOBILE SECURITY CYBER GITA 5. Regularly Backup Data Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Use cloud storage or external drives to avoid data loss. 6. Monitor Device Activity • Regularly check battery usage, data usage, and installed apps. 7. Be Aware of Social Engineering Attacks • Don’t click on suspicious links in SMS/emails. • Avoid downloading apps from untrusted sources.
  • 96. MODULE 08 www.cybergita.com Securing Cloud Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 97. MODULE OBJECTIVES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Understand types of clouds and their services. • Learn the advantages of cloud services. • Identify threats to cloud accounts and countermeasures. • Address privacy issues in cloud computing. • Choose the correct cloud advisor for your needs. Design • Use bullet points for clarity. • Add icons for each objective (e.g., cloud, shield, lock, magnifying glass).
  • 98. TYPES OF CLOUDS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Public Cloud: • Services provided over the internet (e.g., AWS, Azure). Private Cloud: • Dedicated infrastructure for a single organization. Hybrid Cloud: • Combines public and private clouds. Community Cloud: • Shared infrastructure for a specific community.
  • 99. CLOUD SERVICE MODELS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. 1.IaaS (Infrastructure as a Service): ⚬ Virtualized computing resources (e.g., AWS EC2). 2.PaaS (Platform as a Service): ⚬ Platform for app development (e.g., Google App Engine). 3.SaaS (Software as a Service): ⚬ Software delivered over the internet (e.g., Microsoft 365).
  • 100. ADVANTAGES OF CLOUD SERVICES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Scalability: Easily adjust resources based on demand. Cost Efficiency: Pay-as-you-go pricing models. Accessibility: Access data and apps from anywhere. Disaster Recovery: Robust backup and recovery solutions. Automatic Updates: Regular updates from providers.
  • 101. THREATS TO CLOUD ACCOUNTS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Data Breaches: Unauthorized access to sensitive data. Account Hijacking: Attackers gaining control of accounts. Insider Threats: Malicious or negligent actions by employees. Misconfiguration: Improper settings leading to vulnerabilities. DDoS Attacks: Overwhelming services with traffic.
  • 102. COUNTERMEASURES FOR CLOUD THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Strong Authentication: Use MFA for cloud accounts. • Encryption: Encrypt data at rest and in transit. • Access Controls: Implement RBAC and least privilege. • Regular Audits: Conduct security assessments. • Incident Response Plan: Develop and test a response plan.
  • 103. PRIVACY ISSUES IN CLOUD COMPUTING CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Data Ownership: Who owns the data stored in the cloud? Data Residency: Compliance with local data protection laws. Third-Party Access: How providers handle data access.
  • 104. ADDRESSING PRIVACY ISSUES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Read Privacy Policies: Understand provider practices. Data Encryption: Protect sensitive data. Compliance: Ensure adherence to regulations (e.g., GDPR, HIPAA). Data Minimization: Store only necessary data.
  • 105. CHOOSING A CLOUD ADVISOR CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Assess Expertise: Look for certifications (e.g., CCSK, CCSP). Evaluate Reputation: Check reviews and case studies. Understand Your Needs: Align with organizational goals. Cost vs. Value: Balance cost and benefits. Ongoing Support: Ensure continuous monitoring and support.
  • 106. CASE STUDY: SECURING A CLOUD ENVIRONMENT CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Describe a real-world example of a cloud security breach and how it was resolved. • Highlight lessons learned and best practices. BEST PRACTICES FOR CLOUD SECURITY • Regularly update and patch cloud systems. • Train employees on cloud security awareness. • Monitor cloud activity for suspicious behavior. • Use encryption and strong access controls. • Conduct regular security audits.
  • 107. MODULE 09 www.cybergita.com Securing Network Connections Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 108. MODULE OBJECTIVES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Understand different types of networks. • Set up your home network securely. • Configure wireless networks on Windows and Mac. • Identify threats to wireless networks and their countermeasures. • Use firewalls, antivirus, and encryption to secure wireless networks.
  • 109. UNDERSTANDING DIFFERENT TYPES OF NETWORKS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • LAN (Local Area Network): Small area (e.g., home, office). • WAN (Wide Area Network): Large area (e.g., the internet). • WLAN (Wireless Local Area Network): Wireless version of LAN. • VPN (Virtual Private Network): Secure connection over the internet. • Key Point: Each network type has unique security considerations. TYPES OF NETWORKS:
  • 110. SETTING UP YOUR HOME NETWORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Choose a Router: Select a reliable, secure router. • Connect Devices: Use Ethernet or Wi-Fi. • Configure Settings: Change default admin credentials, enable WPA3 encryption. • Test the Network: Ensure all devices can connect. • Pro Tip: Regularly update your router’s firmware for security patches. STEPS TO SET UP A HOME NETWORK:
  • 111. SETTING UP WIRELESS NETWORKS IN WINDOWS AND MAC CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Go to Settings > Network & Internet > Wi-Fi. • Select your network and enter the password. • Set the network as Private for better security. WINDOWS: • Go to System Preferences > Network. • Select Wi-Fi, choose your network, and enter the password. • Enable Firewall in Security & Privacy. MAC:
  • 112. THREATS TO WIRELESS NETWORKS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Eavesdropping: Hackers intercept data. • Rogue Access Points: Fake Wi-Fi networks. • Man-in-the-Middle Attacks: Hackers alter communication. • Brute Force Attacks: Guessing passwords. • Key Point: Wireless networks are vulnerable if not properly secured. COMMON THREATS:
  • 113. COUNTERMEASURES FOR WIRELESS NETWORK THREATS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Use WPA3 encryption for Wi-Fi. • Disable SSID broadcasting to hide your network. • Enable MAC address filtering to allow only trusted devices. • Regularly update router firmware. • Use a VPN for secure browsing. • Key Point: Layered security is the best defense. PROTECTION STRATEGIES:
  • 114. USING FIREWALLS, ANTIVIRUS, AND ENCRYPTION CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Blocks unauthorized access to your network. • Enable built-in firewalls on Windows and Mac. FIREWALL: • Protects against malware and viruses. • Keep it updated for the latest threat definitions. ANTIVIRUS: • Use WPA3 for Wi-Fi and HTTPS for websites. • Encrypt sensitive files with tools like BitLocker (Windows) or FileVault (Mac). ENCRYPTION:
  • 115. BEST PRACTICES FOR SECURING NETWORK CONNECTIONS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Use strong, unique passwords for all devices and networks. • Regularly update software and firmware. • Avoid using public Wi-Fi for sensitive tasks. • Monitor connected devices for suspicious activity. • Educate family members or employees about network security. TOP TIPS:
  • 116. SUMMARY CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Understand different network types and their security needs. • Set up home and wireless networks securely. • Identify threats and implement countermeasures. • Use firewalls, antivirus, and encryption for protection. • Final Thought: A secure network is the foundation of digital safety. RECAP:
  • 117. MODULE 10 www.cybergita.com Data Backup and Disaster Recovery Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 118. MODULE OBJECTIVES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • By the end of this module, you will be able to: • Understand the importance and need for data backups • Understand the reasons behind data loss incidents • Identify what files to back up and when • Learn about different types of data backups • Learn how to create backups and restore data on Windows and Mac • Understand the difference between data deletion and data destruction, and the importance of the latter • Let me know if you need any modifications
  • 119. IMPORTANCE OF DATA BACKUPS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Prevents data loss due to accidental deletion, corruption, or hardware failure • Ensures business continuity and disaster recovery • Protects against cyber threats like ransomware and malware • Saves time and effort in case of system crashes
  • 120. REASONS BEHIND DATA LOSS INCIDENTS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Accidental deletion of files • Hardware failures (e.g., hard drive crashes) • Software corruption or system crashes • Cyber attacks (e.g., ransomware, malware, hacking) • Natural disasters (e.g., fire, flood, earthquakes) • Human errors (e.g., overwriting important files)
  • 121. WHAT FILES TO BACKUP & WHEN? CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Critical Documents: Work files, contracts, reports • Personal Data: Photos, videos, personal records • System Files: Configuration and application settings • When to Backup? • Daily for critical data • Weekly or monthly for less frequently used files • Before major system updates or changes
  • 122. TYPES OF DATA BACKUPS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Full Backup: Copies all selected data • Incremental Backup: Backs up only the changed data since the last backup • Differential Backup: Backs up data changed since the last full backup • Mirror Backup: Creates an exact replica of the data • Cloud Backup: Stores data on remote servers for easy recovery
  • 123. HOW TO CREATE AND RESTORE BACKUPS (WINDOWS & MAC) CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Windows: • Use File History or Backup & Restore tool • Create system image backups • Restore from backups via Control Panel • Mac: • Use Time Machine for automatic backups • Restore files or the entire system from a backup drive
  • 124. DATA DELETION VS. DATA DESTRUCTION CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Data Deletion: Removes file references but can be recovered • Data Destruction: Permanently erases data using secure methods (e.g., shredding, overwriting, degaussing) • Why is Data Destruction Important? • Prevents unauthorized recovery • Ensures compliance with data privacy laws
  • 125. SUMMARY & BEST PRACTICES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Regularly back up important data • Use a combination of local and cloud backups • Automate backups for consistency • Test your backups periodically • Secure backups with encryption
  • 126. MODULE 11 www.cybergita.com Securing IoT Devices and Gaming Consoles Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 127. MODULE OBJECTIVES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. 1.Understand IoT Devices. 2.Identify the various security risks associated with IoT devices and their countermeasures. 3.Identify the security risks associated with IoT children’s toys. 4.Understand the security best practices for IoT children’s toys. 5.Understand smart home systems and how to secure Alexa devices. 6.Understand the security risks associated with gaming consoles. 7.Identify the security measures to protect gaming consoles.
  • 128. UNDERSTANDING IOT DEVICES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Definition of IoT (Internet of Things) Examples of IoT devices (smart thermostats, wearables, smart home devices) How IoT devices work (connectivity, data exchange)
  • 129. SECURITY RISKS ASSOCIATED WITH IOT DEVICES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Lack of encryption • Weak authentication mechanisms • Vulnerable firmware/software • Botnet attacks (e.g., Mirai botnet) • Countermeasures: ⚬ Regular firmware updates ⚬ Strong passwords and multi-factor authentication ⚬ Network segmentation
  • 130. SECURITY RISKS IN IOT CHILDREN’S TOYS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Privacy concerns (data collection) • Unauthorized access to microphones/cameras • Lack of parental controls • Countermeasures: • Research before purchasing • Disable unnecessary features • Monitor usage
  • 131. BEST PRACTICES FOR SECURING IOT CHILDREN’S TOYS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Change default passwords • Regularly update firmware • Disable remote access features • Use a secure Wi-Fi network • Monitor for recalls or security patches
  • 132. SECURING SMART HOME SYSTEMS AND ALEXA DEVICES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Risks: • Voice command hijacking • Unauthorized access to smart home devices Best Practices: • Enable two-factor authentication • Use a strong Wi-Fi password • Disable unused features (e.g., voice purchasing) • Regularly review activity logs
  • 133. SECURITY RISKS IN GAMING CONSOLES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Phishing and social engineering attacks • Unauthorized in-game purchases • Exploitation of vulnerabilities in online gaming networks • Countermeasures: ⚬ Use strong, unique passwords ⚬ Enable parental controls ⚬ Keep software updated
  • 134. PROTECTING GAMING CONSOLES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Enable two-factor authentication • Regularly update console firmware • Avoid sharing personal information online • Use a secure network (avoid public Wi-Fi) • Monitor for suspicious activity
  • 135. SUMMARY CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • IoT devices and gaming consoles are vulnerable to various security risks. • Implementing best practices (e.g., strong passwords, regular updates) can mitigate these risks. • Stay informed about emerging threats and solutions.
  • 136. MODULE 12 www.cybergita.com Secure Remote Working Next Page CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 137. MODULE OBJECTIVES CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. • Understand remote work and its need. • Identify the various types of remote work. • Identify the security risks associated with remote work. • Implement secure remote work. • Understand the best practices for secure remote work. • Understand the best practices for secure remote meetings.
  • 138. UNDERSTANDING REMOTE WORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Definition of remote work Why remote work is needed (flexibility, cost savings, global talent access) Examples of remote work (full-time remote, hybrid, freelancing)
  • 139. TYPES OF REMOTE WORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Full-time remote work Hybrid work (part-time remote, part-time office) Freelancing/contract work Remote teams and distributed workforces
  • 140. SECURITY RISKS IN REMOTE WORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Unsecured home networks Phishing and social engineering attacks Use of personal devices (BYOD risks) Data leakage and unauthorized access Weak passwords and lack of multi-factor authentication
  • 141. IMPLEMENTING SECURE REMOTE WORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Use a Virtual Private Network (VPN) Ensure endpoint security (antivirus, firewalls) Encrypt sensitive data Implement multi-factor authentication (MFA) Regularly update software and systems
  • 142. BEST PRACTICES FOR SECURE REMOTE WORK CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Use company-approved devices and software Avoid public Wi-Fi for work-related tasks Regularly back up data Conduct security awareness training Monitor and audit remote access logs
  • 143. BEST PRACTICES FOR SECURE REMOTE MEETINGS CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Use secure video conferencing tools (e.g., Zoom, Microsoft Teams) Enable waiting rooms and password protection Lock meetings once all participants have joined Avoid sharing meeting links publicly Be cautious of screen sharing and file sharing
  • 144. SUMMARY CYBER GITA Copyright © by Cyber Gita. All Rights Reserved. Reproduction is Strictly Prohibited. Remote work offers flexibility but comes with security risks. Implementing secure practices (e.g., VPNs, MFA, encryption) is critical. Follow best practices for remote work and meetings to stay secure.