SlideShare a Scribd company logo
#Security Researcher
#Co-Founder of Revolgen Systems
Email: avik.bhattacharjee@revolgen.com
@avikunplugged
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
Malware
Hostile,intrusive or annoying software or
program code(“malicious” + "software“)
Includes computer viruses, worms Trojan horses
,bots, spyware, adware etc.
Software is considered malware based on the
intent of the creator rather than any particular
features
How to Keep Yourself secure while browsing internet pre null meet kolkata
Adware
 Advertising-supported software is any software
package which automatically plays, displays, or
downloads advertising material to a computer after the
software is installed on it or while the application is
being used.
 Adware is software integrated into or bundled with a
program, typically as a way to recover programming
development costs through advertising income
Spyware
 A broad category of software designed to intercept or
take partial control of a computer's operation without
the informed consent of that machine's owner or
legitimate user
 In simpler terms, spyware is a type of program that
watches what users do with their computer and then
sends that information over the internet
How to Keep Yourself secure while browsing internet pre null meet kolkata
Phishing
 A criminal activity using Social Engineering
techniques.
 An attempt to acquire sensitive data, such as
passwords and credit card details, by masquerading
as a trustworthy person or business in an electronic
communication.
 Typically carried out using Email or an IM
How to Keep Yourself secure while browsing internet pre null meet kolkata
Protect your Passwords
Top 20 passwords of all time
How to Keep Yourself secure while browsing internet pre null meet kolkata
CREATING A STRONG PASSORD THAT IS EASY TO REMEMBER
WHAT TYPES OF PASSWORD TO AVOID
 Dictionary word in any language
 Word spelled backwards, common misspellings and
abbreviations.
 Sequence or repeated characters Such as using a row
of adjacent letters or numbers on your keyboard.
 Personal information such as your name,birthday
,Drivers License.
Cyber criminals use Advance tools for password cracking
Tracks you Leave on the internet
Protect your Lovable
Turn off Sharing
Avoid Automatically Connecting to
WIFI
Hotspots
Turn on Firewall
VPN
1.Use HTTPS
2. Use Two-Factor Authentication
3. Confirm the Network Name
4. Protect Your Passwords
5. Run Anti-Virus Software
Tor – Onion Proxy
How Tor Works
How to Keep Yourself secure while browsing internet pre null meet kolkata
Thanks!
How to Keep Yourself secure while browsing internet pre null meet kolkata

More Related Content

PPT
ISDD - Security Risks
PPT
Internet threats and defence mechanism
 
PPT
Jeopardy
PPTX
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
PPT
S P Y W A R E4 S I K
PPTX
Spyware
PPTX
Internet Security in Web 2.0
PPTX
What is IT security[1]
ISDD - Security Risks
Internet threats and defence mechanism
 
Jeopardy
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
S P Y W A R E4 S I K
Spyware
Internet Security in Web 2.0
What is IT security[1]

What's hot (20)

PPTX
7 Small Business Security Tips
PPTX
Presentation on cyber safety
PPTX
Malware
PPTX
Spyware risk it's time to get smart
PPTX
Computer Security
PPT
Malware, Trojans and Slurpware
PPTX
Internet Threats
PPTX
S01.L06 - Internet Security
PDF
Securing Mobile & Online Identity in the Cyber World
PPTX
Internet Threats
PPTX
Mobile protection
PPTX
Cybersecurity Awareness
PDF
UNDERSTANDING HACKING
PPTX
2 2 the dangers of computer crime
PPTX
Ethical hacking
PPTX
spyware
PPTX
Mobile security
PPTX
Smartphone security
PDF
What is a malware attack?
7 Small Business Security Tips
Presentation on cyber safety
Malware
Spyware risk it's time to get smart
Computer Security
Malware, Trojans and Slurpware
Internet Threats
S01.L06 - Internet Security
Securing Mobile & Online Identity in the Cyber World
Internet Threats
Mobile protection
Cybersecurity Awareness
UNDERSTANDING HACKING
2 2 the dangers of computer crime
Ethical hacking
spyware
Mobile security
Smartphone security
What is a malware attack?
Ad

Similar to How to Keep Yourself secure while browsing internet pre null meet kolkata (20)

PPTX
Computer security
PDF
How to Protect Your Devices from Internet-Based Malware.pdf
PPSX
IT Security Seminar Cougar CPS
PPTX
viruses.pptx
PDF
What is malware
PPTX
Internet security
PPTX
security issues
PDF
SAMPLE ATTACKS PRESENTATION.pdf
PPTX
Empowerment Technologies Lecture 3 (Philippines SHS)
PPT
Computer security
PPTX
CSC103 Digital Security
PPTX
mobile security.pptx
PPT
Ch # 10 computer security risks and safe guards
PPTX
PPT
Computer security and_privacy_2010-2011
PPTX
Cyber Security
PPTX
2nd Class PPT.pptx
PPT
Presented to Compass
PPTX
MALWARE AND ITS TYPES
PPTX
Cyber Security
Computer security
How to Protect Your Devices from Internet-Based Malware.pdf
IT Security Seminar Cougar CPS
viruses.pptx
What is malware
Internet security
security issues
SAMPLE ATTACKS PRESENTATION.pdf
Empowerment Technologies Lecture 3 (Philippines SHS)
Computer security
CSC103 Digital Security
mobile security.pptx
Ch # 10 computer security risks and safe guards
Computer security and_privacy_2010-2011
Cyber Security
2nd Class PPT.pptx
Presented to Compass
MALWARE AND ITS TYPES
Cyber Security
Ad

How to Keep Yourself secure while browsing internet pre null meet kolkata

  • 1. #Security Researcher #Co-Founder of Revolgen Systems Email: avik.bhattacharjee@revolgen.com @avikunplugged
  • 4. Malware Hostile,intrusive or annoying software or program code(“malicious” + "software“) Includes computer viruses, worms Trojan horses ,bots, spyware, adware etc. Software is considered malware based on the intent of the creator rather than any particular features
  • 6. Adware  Advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.  Adware is software integrated into or bundled with a program, typically as a way to recover programming development costs through advertising income
  • 7. Spyware  A broad category of software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user  In simpler terms, spyware is a type of program that watches what users do with their computer and then sends that information over the internet
  • 9. Phishing  A criminal activity using Social Engineering techniques.  An attempt to acquire sensitive data, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication.  Typically carried out using Email or an IM
  • 12. Top 20 passwords of all time
  • 14. CREATING A STRONG PASSORD THAT IS EASY TO REMEMBER
  • 15. WHAT TYPES OF PASSWORD TO AVOID  Dictionary word in any language  Word spelled backwards, common misspellings and abbreviations.  Sequence or repeated characters Such as using a row of adjacent letters or numbers on your keyboard.  Personal information such as your name,birthday ,Drivers License. Cyber criminals use Advance tools for password cracking
  • 16. Tracks you Leave on the internet
  • 19. Avoid Automatically Connecting to WIFI Hotspots
  • 21. VPN
  • 22. 1.Use HTTPS 2. Use Two-Factor Authentication 3. Confirm the Network Name 4. Protect Your Passwords 5. Run Anti-Virus Software
  • 23. Tor – Onion Proxy