ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Data Security at Albemarle County: Keeping You and Your Computer Safe.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Preventing Mail Theft Presented by American Crime Prevention Institute.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Privacy at Home: Protecting Your Family’s Identity & Safety For Your Children Dara G. Murray Chief Information Security Officer Program Support Center.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
How To Protect Your Privacy and Avoid Identity Theft Online.
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Be Cautious of Identity Theft By: Sydney Langley.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Information Security.
Ways to protect yourself against hackers
Protecting Your Identity:
#1 Consumer Fraud Complaint – 5th straight year!
How to build a good reputation online
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

ARE YOU A CYBER SECURITY RISK?

Pass the Hat Al QaedaFARCHezbollahIRAHAMAS

Script Kiddies No More Organized Crime Terrorist Foreign Powers

Efforts to Promote Cyber Safety National Effort Commonwealth Effort Community Effort University Effort

The Vectors of Attack Web Pages Phishing s Hacked databases Unpatched computers Social Engineering Lack of Physical Security Bad passwords Public Wireless ID Theft

Web Security How to know if a website is secure

Dear Bank of America Cardholder, This is your official notification from Bank of America. Your online account has expired. If you want to continue using our service you have to renew your online account. If not, your online account will be deactivated and deleted. To continue click here, complete the renew form with your current information. Many Thanks and Kind Regards, Bank of America Update Departmentclick here Dear Bank of America Cardholder, This is your official notification from Bank of America. Your online account has expired. If you want to continue using our service you have to renew your online account. If not, your online account will be deactivated and deleted. To continue click here, complete the renew form with your current information. Many Thanks and Kind Regards, Bank of America Update Departmentclick here Recognize phishing s Security

Common Types: Financial/Retail Social/Personal Technical/Educational Medical Religious Red Flags to Watch for: False sense of urgency Claims of retribution if you don’t act Links that don’t match up Common Targets: PayPal eBay Craigslist Facebook & MySpace Banks Phishing– The Tactics

Pot of Gold – the unprotected database Oracle Student Information System The data bases are secure, the machines that use them and the users are not.

Social Engineering The Art of the Con Combined with other attacks Free Pizza Anyone?

Unpatched Computers Set your operating system to update automatically. Update your applications. Update your browser plugins. How to check? Secunia Personal Software Inspector

Lack of Physical Security The best firewall does not protect against an unlocked door. A patched system is just as vulnerable to theft as a patched one. A lack of physical security undercuts all other security measures.

Easy to Get Passwords 01b7f167c52e8334bbe19cbf3cee9ecd Write them down and leave them in the open. Tell a friend or spouse or girl/boyfriend. Use the same password for every account. Use a public wireless network and send them in the clear.

Any Wireless is Good Wireless Nearly every public place has wireless. Do you know what you are using? Evil Twin WarDriving

ID theft not just a cybercrime; occurs in the real world Physical Security & ID Theft Mail Stealing from mailbox, change of address forms Theft Wallet/purse stolen, Home/car break-ins “Dumpster diving” at homes and businesses Cell Phone Cameras Sneaky photos taken of your private info

Be aware of how physical security can prevent it How to Prevent ID Theft Secure your trash Think before you toss; buy & use a shredder Secure your mailbox Stop mail and newspapers when out of town Mail letters from P.O. or dropboxes Note anything unusual Monitor your credit Opt out of pre-approved offers Check your statements & credit reports

What can I do?! Never, ever patch your computer. Never, ever shred a document that contains yours personal info. Use easy to guess passwords. Never use a password protected screensaver. Never destroy the hard drive of your old computer. Never visit annualcreditreport.com Share your password with someone. Click on a link in an .

On the lighter side YouTube – ID Theft