Information Security Awareness for Women
SNO 1 |
Apps Used
Online tazi applications |
SNO 2 |
Desktop Security
Internet security |
SNO 3 |
Password Threats
Shoulder surfing |
SNO 4 |
Email Based Cyber Threats
Malicious attachments |
SNO 5 |
Browser Security
Web Browser Risks |
SNO 6 |
Usb Storage Device Security
How to stop Data Leakage via USB storage ? |
SNO 7 |
WI-FI Security
Free Wi-Fi s hotspots for cyber attacks |
SNO 8 |
Smart phone security
Mobile Phone Security Threats Categories |
SNO 9 |
Identity Theft
Online Taxi Booking Apps |
SNO 10 |
Internet Addiction
Boredom/Depression |
SNO 11 |
Online Scams
Dating and romance scams |
SNO 12 |
Phishing Attacks
What is phishing? |
SNO 13 |
WhatsApp Security
Lock your messaging and other important Apps with a App lock |
SNO 14 |
Instant Messaging Threats
Risks in Mobile Instant Messaging for women |
SNO 15 |
ATM Threats
Physical Attacks |
SNO 16 |
Social Networking
Fake friends |
SNO 17 |
Social Engineering
Gossips |
SNO 18 |
Online Shopping
Expensive branded products at low cost |
SNO 19 |
Cyber Bullying
Forwarding a private IM communication to others |
SNO 20 |
Broadband Internet Security
Broadband Security Threats |
SNO 21 |
Cyberstalking
How a cyberstalker may harm women? |
SNO 22 |
Digital Transactions
Safety and Security Concerns |
SNO 23 |
Internet Ethics
Acceptance |