Cybersecurity Awareness

Slides:



Advertisements
Similar presentations
What is identity theft, and how can you protect yourself from it?
Advertisements

IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
INTRODUCTION & QUESTIONS.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Phishing, identity theft, and more
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Unit 4 IT Security.
Information Security.
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Practice Safe Computing
IT Security awareness Training.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Personal IT Security Cyber Security – Basic Steps
Phishing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Introduction to Computers
Lesson 2: Epic Security Considerations
Keeping your data, money & reputation safe
9 ways to avoid viruses and spyware
Security Hardening through Awareness August 2018
Lesson 2: Epic Security Considerations
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Lesson 2: Epic Security Considerations
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Spear Phishing Awareness
Presentation transcript:

Cybersecurity Awareness What Do we Need to Know IEEE IT Security

Cyber Security Information Security Defense Types Threats - Infrastructure - Applications - IAM - Data Defense - Identify - Protect - Anticipate - Detect - Respond - Recover Threats - Criminals - Hacktivists - Nation States - Corporate espionage - Disgruntled employees Types - DDoS - Ransomware - Malware - Identity theft - Data breach - Physical damage

Security Trends Security Breach - An incident where sensitive, protected or confidential information has potentially been stolen, viewed or accessed by an unauthorized person. Reference: Symantec 2017 Internet Security Threat Report

Security Trends (Continued) Confidential Reference: 2017 Verizon Data Breach Investigations Report

Weakest Link: People People are the weakest link - Things happen intentionally or unintentionally (human errors). People are the first line of defense - we reduce risk by training and creating awareness. IEEE IT Security

People & Social Engineering The attacker manipulate people to gain trust When Trust is achieved, the attacker will use it to gain access to personal or business information Common methods Email Phone Text IEEE IT Security

Social Engineering – Common Methods @ Phishing The attacker uses email, IM or other communication channels Attacker pretends to be a reputable person or organization Variations Spear phishing – targets selected group or individual Whaling – targets executives SMS text IEEE IT Security

Social Engineering – Common Methods Smishing (SMS and Phishing) The attacker uses mobile text messages. The attacker tries to lure the victim into calling back a fraudulent number, access a malicious website or download malicious content. SMS text IEEE IT Security

Social Engineering – Common Methods ViShing (Voice and phishing) The attacker pretends to be a legitimate business Uses telephone conversations to attempt to scam the victim Gain access to information that will be used for identity theft or fraudulent activities IEEE IT Security

Ransomware Type of malware Holds information hostage in an attempt to collect money for its release. Once files are encrypted, in many cases, files cannot be recovered Typically spread through phishing emails containing malicious attachments or links or through software vulnerability. May end up in your computer by visiting infected web sites. IEEE IT Security

Be Attentive, Be Suspicious! In Summary Social engineering attacks manipulate human TRUST to gain access to confidential information for fraudulent or malicious activities Don’t click on links or attachments received from unknown senders Be careful of how much information you share on social media sites Don’t assume a caller is genuine because they know about you or your company - If suspicious, terminate the call Trust your instincts! If an email, web link, or email attachment seems suspicious, don't open it. Be Attentive, Be Suspicious! IEEE IT Security

Take away: Use Strong Passwords Consider making your password a phrase: A phrase can be used to create a strong password. Consider using at least 12 characters. Use phrases that are easy to remember but hard for someone else to guess. Use unique accounts & passwords: Using different passwords for every account helps to thwart attackers. At a minimum, separate your work and personal accounts. Make sure that your critical accounts have the strongest passwords.  Use Strong Passwords   Use combinations of upper and lower case letters, numbers and Symbols Weak: Webster Strong: W3b$t3r IEEE IT Security

Take away: Protect Yourself ??? @ Don’t click on attachments from unknown sources When in doubt, Throw it out! Cybercriminals may send you email that looks like it is coming from legitimate institutions, businesses and individuals you may know. If you are unsure whether an email request is legitimate, consider contacting the institution, business or individual. Use information on an account statement or search for the company online but don’t use the contact information provided in the suspicious email. Be careful of emails asking you to act immediately, especially if something sounds too good to be true. Think before taking any action. IT Security

Take Away: Stop and Think Use a “STOP, THINK before you CLICK” approach STOP Keep in mind that you could compromise your computer system and any personal or business information stored in it THINK Not all websites are safe to use. To avoid potential risks, be cautious and take your time to review the website before taking any action Don’t click on links or attachments received from unknown senders When verifying the sender, do not use the information in the suspicious email Be careful of how much information you share on social media sites Don’t assume a caller is genuine because they know about you or your company - If suspicious, terminate the call   WARNING IEEE IT Security

QUESTIONS? 9/22/2018