K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Social media threats. Warning! May contain mild peril.
Internet Security Awareness Presenter: Royce Wilkerson.
Cyber X-Force-SMS alert system for threats.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
1 Kids on the Web. Child’s play? September, 2008.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Topic 5: Basic Security.
What is Spam? d min.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Information Security: Current Threats Marc Scarborough Information Security Officer
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
Information Systems Design and Development Security Risks Computing Science.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Big Picture Consider this How many online threats might you be faced with a day?
Lesson 3 Safe Computing.
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Report Phishing Forward phishing s to
Faculty of Science IT Department By Raz Dara MA.
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Communicating in the IT Industry
Cybersecurity Simplified: Phishing
Presentation transcript:

K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer

The Risks Computer infected with malicious software (malware) Stolen, altered, and/or deleted K-State or personal information (do you have SSNs on your computer?) Identity theft Financial fraud – stolen credit card and/or bank account information Your computer is used to send spam Your computer stops working because of damage done by the malware Your computer is used to infect other computers Your computer is used to attack other sites Your computer’s network access is blocked by the security team to prevent further damage 2

What’s the big deal? In November 2009, 130+ K-State computers were infected when people opened malicious attachments – the same s that hit campus four months earlier and infected 100+ computers 296 spear phishing scams at K-State in 2009 resulting in 431 giving away their eID password to criminals; 377 of those stolen accounts were used to send spam from K-State’s Webmail Hasn’t slowed down in 2010: 305 phishing scams and 313 compromised eIDs through end of September These forms of “social engineering” are currently one of the most effective ways to compromise a computer and steal financial or personal identity information They involve tricking the user into clicking on a link, replying to an , or opening an attachment. Tactics constantly changing so technology can’t prevent it all - you, the users, are critically important in our security defenses 3

It doesn’t just affect you When stolen K-State accounts are used to send spam, K- State is seen as a spam source and sometimes ends up on spam block lists such that ALL from K-State to those providers is blocked (examples include Hotmail, Gmail, Comcast, AT&T, Road Runner…) – a huge headache for faculty-student communication Compromised computers become part of a “botnet” used for illegal purposes (one at K-State used this summer to make purchases with credit card info stolen from an Emporia State U. student) A recent compromised K-State computer became a “botnet controller” that controlled 12,000 other compromised computers around the world Another one used last month in a “distributed denial of service attack” on a computer in the Ukraine Compromised computers are used to send spam, host scam web sites, spread malware, steal data, launch denial of service attack, etc. (don’t worry if you don’t know what these mean – just know they’re all bad!) One careless mouse click can affect thousands of other people, not just yourself 4

YOU are important!! Recent estimate – a new piece of malware is created every 1.5 seconds. TrendLabs (Trend Micro’s research group) reports seeing 250,000 malware samples PER DAY! Same report says “recent estimates place the number of unique new malware samples introduced in a single day at greater than 60,000.” Antivirus software can’t keep up. Technology can’t stop it all. We must rely on a trained, knowledgeable user community to help defend against the constantly evolving threats. Online security training available soon 5

Logistics Breakout sessions for next two hours Go to any session Enjoy refreshments between sessions Return to Big 12 room at 11:10 a.m. for wrap- up session Powerpoint slides will be available on the event web site this week 6