National Cyber Security Month

Slides:



Advertisements
Similar presentations
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Advertisements

Internet Phishing Not the kind of Fishing you are used to.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Threats to I.T Internet security By Cameron Mundy.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Internet safety By Suman Nazir
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Cybersecurity Test Review Introduction to Digital Technology.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Important Information Provided by Information Technology Center
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Topic 4: E-safety, Health and Safety
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Cybersecurity.
3.6 Fundamentals of cyber security
Lesson 3 Safe Computing.
Secure Software Confidentiality Integrity Data Security Authentication
I S P S loss Prevention.
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Jason C. Belford Information Security Briefing Staff Senate
Electronic Mail.
Social Engineering Brock’s Cyber Security Awareness Committee
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Cybersecurity.
Malware, Phishing and Network Policies
Electronic Mail.
Electronic Mail Opening Activity: 411 of
Prepared By : Binay Tiwari
Report Phishing Forward phishing s to
Electronic Mail.
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Electronic Mail.
Security Hardening through Awareness August 2018
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Business Compromise and Cyber Threat
Cyber security and Computer Misuse
Information Security – Sep 18
Unit 1 Fundamentals of IT
Information Security.
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Spear Phishing Awareness
Security in mobile technologies
Chapter Goals Discuss the CIA triad
Internet Safety By: Ayana Shiggs.
Privacy, Security, and Ethics
Internet Safety By: Ayana Shiggs.
Donning your Detective Hat: Sniffing Out Payroll Fraud
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Presentation transcript:

National Cyber Security Month

October is National Cyber Security Month Threats Phishing Social Engineering Ransomware Malware

Information Security Awareness Phishing Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Information Security Awareness Social Engineering  The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Information Security Awareness Ransomware A type of malicious software designed to block access to a computer system until a sum of money is paid.

Information Security Awareness Malware Malicious software that can be used to compromise or harm a computer host.

Information Security Awareness Do not divulge personal information, passwords, credit card and banking information Avoid Social Engineering

Information Security Awareness Do not install unlicensed or crack software on enterprise systems. Avoid Litigation

Information Security Awareness Do not write your password on a piece of paper under the keyboard or on a sticky note The best place to store your password is in your head

Information Security Awareness Create complex passwords – Not less than 8 characters Include Uppercase Letter Include special character Not a known word with slight modification Complex passwords are less likely to be compromised

Information Security Awareness Avoid sharing passwords Trust is not when you share your password