Syberthon Topics
|
S.no
|
Topics
|
1
|
Cyber Crime and Security
|
2
|
Telecommunication and Information Gathering
|
3
|
Static Digital Visuals- Photos
|
4
|
Dynamic Digital Visuals-Videos
|
5
|
IP Address
|
6
|
MAC Address
|
7
|
Protecting Ourselves Online
|
8
|
Facebook Security
|
9
|
Alternatives to Google
|
10
|
Lets's get searching-How to Perform Best Google Searches
|
11
|
What does Google knows
|
12
|
Amazing Google Products
|
13
|
Significance of Email in our lives
|
14
|
User names and security
|
15
|
Search Engines and Their Types
|
16
|
Online Threats
|
17
|
Windows Security
|
18
|
Android Security
|
19
|
Wireless Security
|
20
|
Firewalls
|
21
|
Mac OS security
|
22
|
Encryption
|
23
|
Storage Devices and Security
|
24
|
Credit Cards
|
25
|
Monitering tools and their detection
|
26
|
Cloud Security
|
27
|
Browser Security
|
28
|
Social Engineering
|
29
|
Linux Security
|
30
|
Juice Jacking
|
31
|
VPNs on Diferent Operating Systems
|
32
|
Password and their management
|
33
|
Security on Shopping Websites
|
34
|
How not to get Hacked
|
35
|
Secure MessengerTelegram
|
36
|
Cyber Child Safety
|
37
|
How to Know if a Software is Authentic(Software Security)
|
38
|
IOS Security(Mobile)
|
39
|
Antivirus
|
40
|
Spam Blockers
|
41
|
How to report a Cyber Crime
|
42
|
Cyber Laws Around the World
|
43
|
How to Know if you Have Been Hacked
|
44
|
Incident Response and Recovery
|
45
|
Offline Threats
|
46
|
Surveillance
|
47
|
Top 10 Cyber Threats and Their Prevention
|
48
|
Recently discovered Vulnerabilities and Threats
|
49
|
Instagram
|
50
|
TOR Networks
|
51
|
Bring your own device(BYOD)
|