Cyber Security Videos

How Does Email System Work (SMTP)- Email sending and receiving process requires multiple protocols to work together. These protocols are used by mail servers to exchange email between email clients and servers to retrieve and send email (IMAP, POP). To understand email working, email sending and receiving process, do watch the video-

Domain Name System (DNS) | Types of DNS | What Happens When You Visit a Website

Hackers steal your data by hijacking Bluetooth of your device

Bluetooth is being exploited by the hackers to hack our devices, steal data. Once device is infiltrated, hackers can listen your calls, read texts and even they may get OTP that you use to access various online facilities such as banking, shopping etc. I am sharing preventive measure to secure your digital device against Bluetooth attacks.

MITRE Att&ck Framework Part – 2 | Attack Tactics

MitreAtt&ck Tactics- means what are the adversary goals during attack. Tactic represents the underlying motive behind an ATT&CK technique. The MITRE ATT&CK framework has three different versions- • ATT&CK for Enterprise • ATT&CK for Mobile • ATT&CK for ICS

What is MITRE Att&ck Framework Basics

What are the adversaries, tactics, techniques, procedure (TTP) and common knowledge (CK)

  • Why do we use MITRE ATT&CK
  • Which technologies does ATT&CK apply to
  • Is MITRE ATT&CK open source

This video explains role of confidentiality, integrity & availability – CIA Triad in Cyber Security. It covers under mentioned points-

  • Cyber Security and Risk Management and role of Confidentiality, Integrity, and Availability.
  • CIA TRIAD defines primary goals and objectives of a security infrastructure or secure IT environment.
  • Cyber-attacks that may happen due to violation of Confidentiality, Integrity, and Availability.
  • Security controls to implement CIA triad

Subscribe YouTube channel for future updates

Mobile Data Leakage | Organization’s interest in your personal data | Important categories for Data Analysis

Get the detailed answers of questions on personal data leakage, theft of data. Why do Mobile Apps Steal Your Personal Data ? What is the interest of organizations in your personal data? How does your personal data gets leak?

What is masked aadhar ? How to Safegaurd from Aadhar Card Frauds!

Fraudsters trap innocent people by seeking details of their Aadhaar card through phone calls and emails and commit crime. This video explains the various features provided by the UIDAI (Unique Identification Authority of India) on its website along with some other preventive measures to protect the Aadhar card.

Biometric Lock/Unlock facility allows an Aadhaar card holder to lock and secure your aadhar card from financial frauds

Biometric Lock/Unlock facility allows an Aadhaar card holder to lock and temporarily unlock their biometrics. This facility aims to strengthen privacy and provides an added layer to secure Aadhar card from misuse by cyber fraudsters.

How to create virtual id in Aadhar in Hindi

VID can be used in place of Aadhaar number. A Virtual ID (VID) allows a user to go through the Aadhaar biometric ID verification process without exposing their 12-digit Aadhaar number to third parties. After the minimum validity period (currently set as 1 calendar day), on Aadhaar number holder requests regeneration, a new VID will be generated and the previous VID will be deactivated. In case resident opts for retrieval of VID, the last active VID will be sent to the Aadhaar number holder. Link to generate aadhar virtual id-

QR Code Payment Scam

  • What is QR Code Payment Scam
  • What are the preventive tips
  • What to do, where to report cyber crime incident

To know the answers of above mentioned questions, watch this video –

Ethical Hacking & Common Myths

Webinar on Cyber Crime & Preventive Measures –

It was organized by the Shivaji College (Delhi University) to spread cyber crime awareness among the college students and faculties.