How to keep the bad guys out and your data safe

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
SECURITY CHECK Protecting Your System and Yourself Source:
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Topic 5: Basic Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cyber Security and Computer Safety
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
Malware and Computer Maintenance
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Computer Technology Notes 5
Networks (Public v Private) and Internet Security
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
Cyber Security and Computer Safety
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Top Ten Cyber Security Hygiene Tips
Computer Security.
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

How to keep the bad guys out and your data safe Cyber Security How to keep the bad guys out and your data safe

By the end of this presentation, you should be able to: Name five ways that cyberthieves try to steal your data List five different types of computer viruses List steps you must take to keep your computer safe

Cyber Crime is costly Accenture: Cybercrime to cost U.S. companies $5.2 trillion by 2024

Five Ways the Bad Guys Try to Steal Your Data Phishing Malware Malicious Mobile Apps Physical Security Threats Unsecured Networks

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

How They Steal Your Data Links may lead to fake web sites that look legitimate, but aren’t The fake websites ask for information such as username, password, account numbers, etc.

How to Stay Safe Look for obvious flaws in the email Typos Grammatical errors Look at the sender’s email Is something just not right….gmall instead of gmail? When is doubt, don’t open it!

A True Story

Malware

What Is Malware? “Malware” is short for “malicious software” -  computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.

Types of Malware Virus – A program capable of infecting a computer environment, disabling its core functionality, making files inaccessible, and replicating itself.

Types of Malware Trojan – Trojan or Trojan horse is a type of computer software that is camouflaged in the form of regular software. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

Types of Malware Spyware – As the name implies, this is software that "spies" on your computer. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

Types of Malware Keylogger – a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

Types of Malware Ransomeware – a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

How to Stay Safe Install anti-virus software and keep it up-to- date Regularly scan your computer for malware Never ever allow someone to install pirated software on your computer Keep your operating system up to date Use “two factor identification” to verify anything sent by email

Malicious Mobile Apps

What Are Malicious Mobile Apps? They are the same as Malware but for your smartphone. They include: Viruses Trojan Horses Links to Phishing sites Spyware and/or key loggers

How to Stay Safe Install anti-virus software on your phone and keep it up-to-date Regularly scan your phone for malware Never ever install pirated software on your phone Never ever install software from third-party app stores Keep your operating system up to date

Physical Security Threats

What Is Physical Threat? A physical threat occurs whenever an unauthorized person has access to any of your devices or information left out in the open.

How to Stay Safe Physically lock the computer to your desk Password protect your device Change the password frequently and make it a strong password Never leave confidential information out where it can be seen Always back up your data and test to see that you can retrieve it Enable remote wipe services incase your device is lost or stolen

Unsecured Networks

What Is an Unsecured Network? An Unsecured Network is one that uses no encryption to connect to the internet. Unsecured networks provide an opportunity for malware to be placed on your device, or at the least, to have your on-line activities intercepted.

DON’T USE PUBLIC WIFI…..EVER!! How to Stay Safe DON’T USE PUBLIC WIFI…..EVER!! Use tools to create your own “hotspot” to access the internet when a secure network is unavailable Use encryption services like WiFi Protected Accesses 2 (WPA2) and a strong password

A Cautionary Tale

The “NotPetya” Attack of 2017 Originated by an attack of Russian State- Sponsored Hackers attacking computer servers in Ukraine The attack utilized two pieces of stolen software (one developed by the National Security Agency) that exploited a vulnerability in a Windows protocol

The “NotPetya” Attack of 2017 The attack spread from Ukraine to computer networks world-wide It mimicked ransomeware but it’s purpose was to encrypt the boot records of computers making it impossible to find their operating system This was an act of cyberwarfare

The “NotPetya” Attack of 2017 Maersk Shipping Lines was paralyzed by the attack They operate 76 ports globally They operate 800 sea-going container ships The attack shut down the ports and disrupted supply chains globally

The “NotPetya” Attack of 2017 The estimated total damage of the attack $10 Billion Dollars

The Lesson to be Learned We are at war and we are all in the fight.

Questions?