Social media is sharing information with others What if this information ends up in the wrong hands?

Slides:



Advertisements
Similar presentations
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Advertisements

Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Internet Phishing Not the kind of Fishing you are used to.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
LittleOrange Internet Security an Endpoint Security Appliance.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
E-Safety Quiz Keeping safe online! A guide for parents & children.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.

Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Jamie Salazar.
Cybersecurity Test Review Introduction to Digital Technology.
Week 7 - Wednesday.  Web security – user side.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Which is better Avast Free Edition or Avast Pro Version?
Cyber Security and Computer Safety
Internet Safety.
What they are and how to protect against them
3.6 Fundamentals of cyber security
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Teaching Computing to GCSE
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Staying safe on the internet
Cyber Security and Computer Safety
Computer Security.
Cyber security and Computer Misuse
How to Stay Safe Online Rollie Edwards.
What devices use the internet?
Presentation transcript:

Social media is sharing information with others

What if this information ends up in the wrong hands?

Social engineering Manipulating people into giving confidential information or access to a system  Passwords, security questions, bank/credit card info... Developing false trust or distrust Creating stories and scenarios to support the process

”I am a new employee here, and I need access to XXXX for YYYY...” ”Your IP address has just won 1 billion Euros!” ”A fun questionnaire to share with your friends! Get to know them better! 1. Where did you go to primary school? 2. Did you have a pet when you were a kid? If so, what was its name? 3. What was your childhood nickname?”

Phishing – posing as a credible website or an authority to steal personal information

Where to strike? Vulnerabilities in operating system components Core web software (MySQL, Apache...) Browser plugin vulnerabilities (Flash, Java...)  Out of date versions

A few example techniques...

XSS (Cross-Site Scripting) Injecting malicious code into a legitimate website to steal information or modify the appearance/behavior of the site

Donate all your money to the Russian Mafia! Win a free puppy and a trip to the Bahamas! Clickjacking / UI Redressing – Tricking the user into clicking malicious links masked as something else

Malvertising Embedding malicious code in legitimate advertisements on websites to push malware on users' computers  ”Free online virus scans”  Ransomware  Keyloggers  Etc.

1.1 A malicious ad can lead to malware such as ”Poliisivirus” being installed on your computer

Protect yourself NoScript (Mozilla browsers) cript/ ScriptSafe (Chrome/Chromium) riptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf/ details

1. Think twice. Trust shouldn't be the default, but something to be earned. 2. Do your research. 3. Do not share passwords with anyone, even if they claim to be an authority. 4. Be careful with links and downloads. 5. Keep your virus and malware protection up-to-date. 6. Install recommended operating system updates. 7. Update your browser plugins regularly.

Thank you, and please stay safe!

Sources Image 1.1: Found at virus.pnghttp:// virus.png Criddle, L. What is Social Engineering? Found at social-engineeringDownloaded on social-engineering Dinerman, B. Social networking and security risks. GFI White Paper. Found at Downloaded on Hunt, T. Clickjack attack – the hidden threat right in front of you Found at Downloaded on Lemos, R. 10 Web Threats That Could Harm Your Business Found at business/d/d-id/ ?page_number=1Downloaded on business/d/d-id/ ?page_number=1 Scharr, J. Malvertising Is Here: How To Protect Yourself Found at Downloaded on