Syberthon 2020/Articles
Appearance
Syberthon Topics | |
S.no | Topics |
1 | Cyber Crime and Security |
2 | Telecommunication and Information Gathering |
3 | Static Digital Visuals- Photos |
4 | Dynamic Digital Visuals-Videos |
5 | IP Address |
6 | MAC Address |
7 | Protecting Ourselves Online |
8 | Facebook Security |
9 | Alternatives to Google |
10 | Lets's get searching-How to Perform Best Google Searches |
11 | What does Google knows |
12 | Amazing Google Products |
13 | Significance of Email in our lives |
14 | User names and security |
15 | Search Engines and Their Types |
16 | Online Threats |
17 | Windows Security |
18 | Android Security |
19 | Wireless Security |
20 | Firewalls |
21 | Mac OS security |
22 | Encryption |
23 | Storage Devices and Security |
24 | Credit Cards |
25 | Monitering tools and their detection |
26 | Cloud Security |
27 | Browser Security |
28 | Social Engineering |
29 | Linux Security |
30 | Juice Jacking |
31 | VPNs on Diferent Operating Systems |
32 | Password and their management |
33 | Security on Shopping Websites |
34 | How not to get Hacked |
35 | Secure MessengerTelegram |
36 | Cyber Child Safety |
37 | How to Know if a Software is Authentic(Software Security) |
38 | IOS Security(Mobile) |
39 | Antivirus |
40 | Spam Blockers |
41 | How to report a Cyber Crime |
42 | Cyber Laws Around the World |
43 | How to Know if you Have Been Hacked |
44 | Incident Response and Recovery |
45 | Offline Threats |
46 | Surveillance |
47 | Top 10 Cyber Threats and Their Prevention |
48 | Recently discovered Vulnerabilities and Threats |
49 | |
50 | TOR Networks |
51 | Bring your own device(BYOD) |