CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via email.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

You are responsible for security of your internet banking transactions ONLINE.
Introduction and Overview of Digital Crime and Digital Terrorism
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.

CCT355H5 F Presentation: Phishing November Jennifer Li.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Cyber Safety Jamie Salazar.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Cybersecurity Test Review Introduction to Digital Technology.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Internet Safety.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Comprehensive Security and Compliance at an Affordable Price.
Unit 4 IT Security.
Digital Citizenship Middle School
Cyber Security Awareness Workshop
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Partnering to Minimize the Impact of Data Compromises
- St. Clair County Network-
Introduction to Computers
Security Hardening through Awareness August 2018
What is Phishing? Pronounced “Fishing”
Presentation transcript:

CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via  100 Billion spam s / DAY!  40% of attacks are against small business  Professional criminals  Federal Gov’t - $14 billion on Cyber Security  Cyber Attacks are bought and sold too

MORE PEOPLE HAVE HAD THEIR INFORMATION COMPROMISED THAN ACTUALLY LIVE IN THE UNITED STATES.

WHY?  #1 Money!  Credit cards are nice but only worth a buck  Single-Use  Time-limited  Complete identities go for $1,000 or more  Access other financial information  Access accounts  Open new credit facilities  #2 Disruption of Service  Botnets  Attack  spam  #3 Theft of intellectual property or intelligence

WHO ARE THESE PEOPLE?  Eastern European, Russian, Chinese  Organized criminals  Organized espionage (CIA, PLA)  30 criminal groups estimated to have nation- state capabilities  “Hacktivists”  Highly competent technicians

EMERGING TREND  Smaller businesses are being individually targeted  Lack of IT resources  Don’t understand the threats  Think they are too small  Threat is large enough that DHS, FBI and Secret Service are engaged.

THINK ABOUT WHAT IS HERE  Personally identifiable information  Enough to build a complete profile  Customer credit cards  Customer contact information  This Company’s financial / banking information  Trade Secrets  Employee payroll information  Average cost of data breach is $3,800,000

Us PRIMARY ATTACK VECTOR?

KINDS OF ATTACKS  Phishing  Spear Phishing  Denial of Service (DOS)  Drive-by Downloading  Social Engineering  Advanced Persistent Threats 67% of incidents that comprise Cyber- Espionage have featured phishing.

ANATOMY OF AN ATTACK - SPEARPHISHING

SIMPLE GOOGLE SEARCH

SPECIALLY CRAFTED That link doesn’t go where you think it goes…. 11% of users still click on attachments in s they did not expect.

WHAT HAPPENS NOW?  Immediate attack  Cryptolocker / ransomware  Advanced Persistent Threat <- deadliest of all  Installs software silently  Harvests information (bank info, etc.)  Botnet  Control software installed  Phones home for instructions  Used to send spam or attack other networks

SIMPLER ATTACKS  Send out a million s from a randomly named bank  Only have to be right once  Someone is going to click on a link they shouldn’t  It is cheap to send out spam  “Drive by” attack  User is directed to a hijacked website  Web browser is attacked

WHAT TO DO?

GENERAL IT SECURITY  Use common sense. Anyone ever offered to give you $10 million before? (If they have, send them to me!)  Find a random USB drive? Pitch it.  Never do work or banking related things on open Wi-Fi  Do not install software you get from the Internet.  Nobody from “Microsoft Tech support” is calling for your password.  Call Matrix if you are unsure about any request you get via phone or .

SECURITY  Most common attack vector  70% of successful attacks are via  Do not click on links in s  For bank s, go login to your account  Same with FedEx, UPS  Nobody from Nigeria is sending you a million bucks  Seasonal s are very effective (FedEx, UPS during holidays)  Treat every as a threat

WEB SECURITY  Browse only reputable sites  If you get an unexpected pop-up, stop work and call us  Do not install software from the Internet  If browser starts behaving oddly – you end up at websites that you didn’t expect, please open a helpdesk ticket ASAP

PASSWORD SECURITY  Do not give out your password  Use complex passwords  “drowssap” = bad  = Good  Do not use the same password everywhere  Have different work / personal passwords  Change passwords regularly

QUESTIONS?