Information Security Awareness for Women

SNO

1

Apps Used

Online tazi applications
Education applications
Banking applications
shopping applications
job portals
Chatting/instant messaging application
travel and hotel booking apps

SNO

2

Desktop Security

Internet security
Data security
Browser security
Email security
Wireless security
Modem security

SNO

3

Password Threats

Shoulder surfing
Rainbow table attack
Bruteforce attacks
Password recover/reset systems
Dictinory attack

SNO

4

Email Based Cyber Threats

Malicious attachments
Fake e-Mails
Spam e-Mails
Phishing e-mails
Hoaxes

SNO

5

Browser Security

Web Browser Risks
Browser Cookies
Pop-ups
Scripts

SNO

6

Usb Storage Device Security

How to stop Data Leakage via USB storage ?
What to do when you lose the Device ?
How to stop Device theft ?
Mobile as USB

SNO

7

WI-FI Security

Free Wi-Fi s hotspots for cyber attacks
Tracking an Individual

SNO

8

Smart phone security

Mobile Phone Security Threats Categories
Lost or Stolen devices
Typical impact of attacks against Mobile Phones

SNO

9

Identity Theft

Online Taxi Booking Apps
Women Empowerment Schemes
Fake Weight loss/Beauty Apps/Travel and Hotel Booking APPs
Online Dating/Matrimonial websites

SNO

10

Internet Addiction

Boredom/Depression
Stress and escapism
Social Media
Online Shopping
Online Gaming
Online chatting

SNO

11

Online Scams

Dating and romance scams
Lottery scam
Fake quizzes that extract your information
Rental Property scam
Email Scam Like -- Congratulations you have won Webcam
Digital Camera
or cash prize of unbelievable amount etc
Charity scam

SNO

12

Phishing Attacks

What is phishing?
Exciting offers through email

SNO

13

WhatsApp Security

Lock your messaging and other important Apps with a App lock
Uncheck WhatsApp photos from saving directly to camera roll
Hide ‘last seen’ timestamp
Watch out for scams

SNO

14

Instant Messaging Threats

Risks in Mobile Instant Messaging for women
Leakage of Sensitive Information
Surveillance/Tracking
Impersonation

SNO

15

ATM Threats

Physical Attacks
Logical Attacks -ATM malware/ cash out attack/ jackpotting
Card Skimming
Eavesdropping
Card Trapping

SNO

16

Social Networking

Fake friends
Fake advertisement
Identity theft
Spam E-mails
Abusive
vulgar
or irreverent language
Sharing too much information

SNO

17

Social Engineering

Gossips
Personal Pride or Confidence
Online
Vishing

SNO

18

Online Shopping

Expensive branded products at low cost
Natural remedies for weight loss
Expensive Jewelry
Keep computer OS updated
Shop only through trusted sites

SNO

19

Cyber Bullying

Forwarding a private IM communication to others
Impersonating to spread rumours
By using web sites or blogs
Humiliating text sent over cell phones
Posting embarrassing photos or video

SNO

20

Broadband Internet Security

Broadband Security Threats
Guidelines for Securing Broadband In¬ternet Access

SNO

21

Cyberstalking

How a cyberstalker may harm women?
How you know that you are a victim of cyberstalking?
What should you do to be safe from cyberstalking
What you should avoid to be safe from cyberstalking ?

SNO

22

Digital Transactions

Safety and Security Concerns
Online banking
Mobile banking
Aadhaar based payment

SNO

23

Internet Ethics

Acceptance
Sensitivity to National and Local cultures
While using e-Mail and chatting
Pretending to be someone else
Avoid Bad language
Hide personal information

isea-loading.gif