Online Teachers Training On Cyber Safety and Security: Leading A Secured Digital Life
Online Teachers Training On Cyber Safety and Security: Leading A Secured Digital Life
Life…….
www.infosecawareness.in
Agenda of the session
A social networking
service is an online
platform used to build
social networks or social
relations with other
people who share similar
personal or career
interests, activities,
backgrounds or real-life
connections.
CYBER CRIME & EVIDENCE
o Child Porn
o Breech of Computer Security
o Fraud/Theft
o Copyright Violations
o Identity Theft
o Narcotics Investigations
o Threats
o Burglary
o Suicide
o Homicide
o Administrative Investigations
o Sexual Assault
o Stalking
28-10-2020
Social Networking
⦿Social Networking sites may be used for
⦿Meeting the people online across the world
⦿Making friendship with the people who are far away
⦿Profile building
⦿Self representation
⦿Exchanging / Sharing the information related to studies or
education, current affairs, sports, business, transport, movies,
latest news updates, event announcements, exchanging the
thoughts etc
⦿Share the data files, videos, music, photos
28-10-2020
Social Networking Risks and Challenges
Social networking has become most popular activity in today’s Internet world and epically
growing kinds
Disadvantage : Trapped by scammers or hackers leading to loss of confidentiality and identity theft,
•Most of the sites and services provide options for privacy settings
• Don’t ever click suspicious link while logged into social networking accounts.
•Install a good and latest version of Anti-virus to keep your system free from malicious applications
• Don’t ever share your password and keep changing your password regularly.
•Don’t ever login to any site other than the legitimate sites
•Use Virtual Keyboard, wherever possible to enter your password for better security as these cannot be captured
by key-loggers.
www.infosecawareness.in 28-10-2020
www.infosecawareness.in 28-10-2020
www.infosecawareness.in 28-10-2020
Friend created fake profile and posted
offensive messages
LINK: https://tineye.com/
HOW TO CHECK A WEBSITE IS GENUINE OR NOT?
1. GO TO THIS LINK
⮚http://isea.nitk.ac.in/catchphishdemo/client.html
⮚Put your website URL & it will tell that a particular website is fake or
genuine.
WhatsApp Security
www.infosecawareness.in 28-10-2020
A few guidelines most video conferencing policies include are:
• Users must get permission to record a video conference from everyone on the call.
• Personal mobile devices should not be used to record video conferences.
• Sensitive information should be discussed in designated video conference rooms and not in public
places or open office spaces.
• Video conferences conducted at a user’s desk should train the camera to focus on the users face,
and any visible confidential data should be removed from camera view.
• Cameras and microphones should be turned off when not in use.
• Remote control of cameras is for authenticated users only.
• Recording of the video should be notified to the host of the meeting. This should be supported by
the application itself
ANY
QUESTIONS ?
Follow us
www.infosecawareness.in
https://www.facebook.com/infosecawareness
https://www.youtube.com/channel/UCWPBKQryyVv
ydUy4rYsbBfA
https://plus.google.com/u/0/1069378698601397
09031/posts