44
SECURE COMPUTER USER EC-Council Fundamental Cyber Security Seminar Session Commences on 6-Aug-2020 10:00 A.M

SECURE COMPUTER USER

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURE COMPUTER USER

SECURE COMPUTER USEREC-Council Fundamental Cyber Security Seminar

Session Commences on 6-Aug-2020 10:00 A.M

Page 2: SECURE COMPUTER USER

Welcome▪ PT Transindo Data Perkasa▪ Jl. Cikutra Baru Raya, nomor 28▪ Bandung, 40124▪ (022) 877 877 81▪ https://transindodata.com▪ [email protected]

▪ Manta Sanni▪ [email protected]▪ https://id.linkedin.com/in/mantasanni▪ +62 857 2233 1256

Page 3: SECURE COMPUTER USER

ECCO

UNCI

LCE

RT M

ATRI

X3

Page 4: SECURE COMPUTER USER

Download Netkrom Academy App

▪ Get latest news, promo & training schedule

▪ Easy registration and payment confirmation

▪ Digital copy of your training certificate

▪ Refer a friend and collect your commission

Page 6: SECURE COMPUTER USER
Page 7: SECURE COMPUTER USER
Page 8: SECURE COMPUTER USER

Data

▪ Personal data▪ ...

▪ Organizational data▪ ...

8

Page 9: SECURE COMPUTER USER

Potential Loss

▪ Financial loss▪ Unavailability of resources▪ Identity theft & fraud▪ Loss of trust▪ Data loss / theft▪ Misuse of computer resources

9

Page 10: SECURE COMPUTER USER

10

Page 13: SECURE COMPUTER USER

13

Page 15: SECURE COMPUTER USER

Elements of Data Security

▪ Confidentiality▪ Authenticity▪ Integrity▪ Availability▪ Nonrepudiation

▪ When to implement?▪ Precaution▪ Maintenance▪ Reaction

15

Page 16: SECURE COMPUTER USER

Microsoft Windows 10

▪ User account▪ BitLocker▪ EFS▪ Firewall▪ Defender▪ Family Options▪ File History

16

Page 17: SECURE COMPUTER USER

Mac OS X

▪ User account▪ Firewall▪ Parental control▪ Time machine▪ Automatic login

17

Page 20: SECURE COMPUTER USER

Symptomps▪ Slow▪ Pop up▪ Crash / BSOD▪ Suspicious hard drive,

network, and program activity▪ Antivirus, firewall, update

disabling▪ New browser homepage▪ Blacklisted IP address

20

Page 22: SECURE COMPUTER USER

Test your antivirus

▪ https://en.wikipedia.org/wiki/EICAR_test_file

22

Page 23: SECURE COMPUTER USER

Internet

▪ Threats from the Internet▪ Malware▪ Data breach, identity theft, social engineering scams▪ Child safety issues:

▪ Pornography: stealth sites, misdirected search/URL, ads▪ Cyberbullying: social media, chat room, email▪ Pedophile / predator: social media, chat room, email

23

Page 24: SECURE COMPUTER USER

Check your browser settings

▪ Tracking protection & Do-not-track request▪ Browsing history▪ Smart screen / sign up for alerts▪ Third Party Cookies▪ Javascript / ActiveX / Flash / Plugins

24

Page 25: SECURE COMPUTER USER

25

Page 26: SECURE COMPUTER USER

Social Media Threats

▪ Phishing▪ Identity theft▪ Malware▪ Site flaws▪ URL Spoofing▪ Clickjacking▪ Social Engineering

26

Page 27: SECURE COMPUTER USER

Tips

▪ Strong Password▪ Ignore ads/links▪ Friend request▪ Don’t share everything▪ People don’t really care but hackers do

▪ Privacy & security settings▪ Geotagging

27

Page 28: SECURE COMPUTER USER

28

Page 29: SECURE COMPUTER USER

Email

▪ Threats▪ Malicious attachment, malicious redirection, phishing, hoax

mail, spamming

▪ Tips▪ Strong password, two-step authentication, antivirus, anti-

spam, last-activity check, digitally signed email

29

Page 33: SECURE COMPUTER USER

haveibeenpwned.com

33

Page 35: SECURE COMPUTER USER

35

Page 36: SECURE COMPUTER USER

36

Page 37: SECURE COMPUTER USER

Mobile▪ IMEI

▪ Threats & risks▪ Eavesdropping▪ Unauthorized access▪ Theft & loss▪ Unmanaged application▪ Unsecured communication port▪ Mobile malware

▪ Vulnerabilities▪ Insecure data storage▪ Insufficient transport layer protection▪ Poor authorization & authentication

▪ Bluetooth attack▪ Bluesnarfing▪ Man in the middle ▪ Backdoor

37

Page 38: SECURE COMPUTER USER

Mobile▪ Mitigation▪ Be vigilant▪ PIN, Passcode, Encryption▪ Insurance▪ Data backup

▪ If lost…▪ Find my phone▪ Change all passwords▪ Sign out device▪ Police▪ Service provider

38

Page 39: SECURE COMPUTER USER

Cloud▪ What is cloud actually?

▪ IaaS▪ PaaS▪ SaaS

▪ Mitigation▪ Backup data▪ Update backup▪ Strong password▪ 2 Factor authentication▪ Encrypt

▪ Threats▪ Data breach▪ Data loss▪ Account hacking▪ Disgruntled employee▪ Shared space

▪ Privacy issues▪ Data ownership▪ Data location▪ Data migration▪ Data permanency

39

Page 40: SECURE COMPUTER USER

Network▪ Disable Bluetooth after use▪ Choose wired over wifi▪ Wifi security▪ WEP▪ WPA▪ WPA2▪ WPA3

▪ Firewall▪ Avoid public, non-secured wifi▪ What if it’s urgent?

40

Page 41: SECURE COMPUTER USER

VPN

▪ Avoid “Free” VPNs▪ Do some research▪ Beware of VPN myths:▪ Anonymous▪ No logging▪ Privacy

41

Page 42: SECURE COMPUTER USER

42

Page 44: SECURE COMPUTER USER

ECCO

UNCI

LCE

RT M

ATRI

X44