NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

1 5 steps to enjoying a safer internet experience SID 2013 presentation for adults who work/volunteer with children, young people and vulnerable adults.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Welcome to New Hire Orientation Information Security
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Company LOGO Internet Safety A Community Approach.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Internet safety By Lydia Snowden.
Unit 4 – Impact of the use of IT on Business Systems.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
A First Course in Information Security
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Digital Citizen Project Katie Goodall Educational Technology 505.
Cyber Security & Fraud – The impact on small businesses.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
December 4 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
Digital Citizenship Revision. What makes a website trustworthy?  It has references of the content creator  There is a phone number to contact if there.
Internet Dangers Technology Communication Tools E-Literate.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
January 21 st 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
MIS323 – Business Telecommunications Chapter 10 Security.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
What is: Information & Communications Technology
To Know what Cyber crime is
IT Security  .
Cyber Crime What’s all the fuss about?
A Project on CYBER SECURITY
Teaching Computing to GCSE
Little work is accurate
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
LO1 - Know about aspects of cyber security
West Midlands Police response to Cybercrime:
Thames Valley Chamber / Claire Logic
BullGuard Support. BullGuard- The Virus Protection Software Now a day’s variety of malware and viruses are attacking your systems and ultimately attacking.
Presentation transcript:

NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower (Police Specialist Operations)

NOT PROTECTIVELY MARKED What is Cybercrime? Cybercrime is when a criminal puts software (Malware) on your computer to damage or disable it. Cybercrime is when child abuse images are shared online. Cybercrime is when Payment fraud causes financial loss by diverting electronic payments into criminal accounts. Cybercrime is when Data breaches occur as a result of people being manipulated into performing actions which divulge confidential information.

NOT PROTECTIVELY MARKED Business crime: What is the scale of the problem? Business phishing (3 mins)

NOT PROTECTIVELY MARKED How can I protect myself?

NOT PROTECTIVELY MARKED What else can I do? A nti-malware – set to automatically update. P atching – update software when prompted. A ccess control – regularly review access to prevent unauthorized changes. F irewalls – know what kind of internet files your computer network can access. FAAP PCC video (3mins)

NOT PROTECTIVELY MARKED Anything else? GOV.UK cyber pages The Gov.uk cyber webpage (“Keeping the UK Safe in Cyberspace”) sets out the policy context for UK cyber; provides an overview of the issues; provides links to key policy documents; and sets out what actions have already been taken to achieve the aims of the UK Cyber Security Strategy. cyberspace 10 Steps To Cyber Security The Ten Steps is a Department for Business, Innovation and Skills (BIS) publication which aims to help businesses prevent or deter most cyber-attacks offering guidance for business on how to protect key information assets against cyber threats. The advice sheets provide detailed cyber security information and advice in 10 important technical and process/cultural areas. board-level-responsibility BIS advice for small businesses What small businesses need to know about cyber security explaining the threat to small businesses and how they can ensure that they are protected. businesses-need-to-know

NOT PROTECTIVELY MARKED T/DCI 3205 Tim Bower Europol Internet Organised Threat Assessment assessment-iocta-2015 West Mercia Police & Warwickshire Police #becybersmart