Recommendations on the future of online GyroScope & Databse implementation.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
SECURITY CHECK Protecting Your System and Yourself Source:
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Information Security Phishing Update CTC
AI&SS Administrative Group April, Meal Reimbursements. Invoices, Check Requests Year end deadlines for Accounting De-obligation of Accounts “Phishing”
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 Facebook  Twitter  MySpace  Windows LiveSpace.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Recommendations on the future of online GyroScope & Databse implementation

There have been proponents these past several years who suggest putting everything Gyro on a Social Network application – that soon, we could eliminate the GyroScope, go online with the Database & communicate with unbridled ease!

Putting the Gyro Database on a Social Network … consider …

Should Gyro, as has been suggested, take a modern approach and place the Database on a Social Network such as Facebook & LinkedIn to ease communicating amongst members and attract new members? Facebook … LinkedIn ?

2008 a D-IX Governor found a link to Gyro on Facebook. It was discussed whether exploiting this link would be beneficial to Gyro. The BOG (then) determined the unknown risks were too great! Facebook … LinkedIn ?

Social Networks – Reality Cyberthieves have now shifted their focus to social networks. Instead of attacking firewalls head on, they are breaching sites using social engineering, convincing someone that an is from a friend or colleague.

A Primer on Phishing 101 They rely on Phishing -- an attempt to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

A phisher s a potential victim claiming to be from a familiar source.

The message contains a question or threat and urges the victim to go to the company site.

The victim clicks a link and is taken to a site that looks real – like a bank’s – but it’s a fake.

The victim enters sensitive data such as account numbers and passwords into the site.

The phisher uses the data to access a corporate or bank network for identity theft or to steal money.

Facebook has a bug called Koobface that takes over your account. It is currently accessing or infecting 1,000,000 accounts every day! What’s happening today?

Two groups of bad guys … 1. The “Black-hackers” who after money or information they can sell. 2. The “Hacktivists” who are not thieves, but malicious idealists who cause havoc, just because they can. At this point no one is truly safe. The Perpetrators

Having our own private Database gives us far less exposure. Being a slightly larger entity on a Social Network is a porthole to problems … invites the challenge to “break in.”

Black Hackers are adapting social networks to establish an evil ecosystem while exploiting its vulnerabilities to steal data & money …their toolkit includes social engineering techniques to have you cough up passwords under the guise of friendship..

Protecting yourself … Hacking your password gets much harder if you follow these tips: The longer the password the better. Mix upper & lower case letters. Use numbers and special symbols. i.e. PASSword8!

Social Networks … Are a boon to promote good things: like family photo-albums & family communications. They are a means to promote business networking. Communication among friends.

Social Networks … Unfortunately, they also lend themselves to a middle-school mentality of … bullying, exhibitionism, degradation, threats, and even murder. Not the least, stealing for money, or hacking just for the fun of it!!

What to do? I would urge you to discount any such approach to the future. Be aware that the web not only doubles in speed every 18 months, it is an ever changing monolith, that will not be the same two years hence, & security is losing ground faster!