Internet Security Awareness Presenter: Royce Wilkerson.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

The Internet.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Learn how to protect yourself against common attacks
IT Security  .
Cybersecurity Awareness
Information Security Session October 24, 2005
Presentation transcript:

Internet Security Awareness Presenter: Royce Wilkerson

Summary  Cybercrime and its underground economy  Examples of cybercrime  Why you need to be cautious with the Internet  Techniques used by cybercriminals  How to prevent becoming a victim of cybercrime  Question and answer

Cybercrime in the 80’s and 90’s Kevin Mitnick Steve Wozniak

Cybercrime in the 2000s  Mafia like organizations  Out to steal money, identity, and passwords  Underground Economy - Video Underground Economy - Video

How it Works…

Statistics  6000 New Webpages are infected everyday with viruses and malware 83% are legitimate businesses that are unaware  1/10 websites are booby trapped with malware  11% of computers worldwide are part of a criminal botnet responsible for 85% of all spam  800 Million SPAM s are sent each day  Every second 14 adults are victims of cybercrime  Over the last 12 months people were 3 times more likely to fall victim to cybercrime than physical crime  Cybercrime is now more lucrative to criminals than all of the world’s drug trafficking combined.  Identity theft has grown from 1380 cases in 1999 to 12.2 million in  In the U.S. 100s of millions of Credit Cards have been stolen in the last 3 years.

What is I.T. doing for you?  Network Security  Firewall  Content Filter  Filter  Gateway Anti-Virus  Anti-Virus Applications

Atascadero City, CA  A hacker used a phishing ploy to compromise the computer system of Atascadero, California, and draw $83,000 from city accounts, the San Luis Obispo Tribune reports. According to the Tribune, an Atascadero worker compromised the city's computer security by opening an supposedly from the National Automated Clearing House Association (NACHA) but actually sent by a hacker. On July 1, three transfers totaling $83,000 were sent from the City's account.

City of Nanaimo  An employee clicked on a link to a Drive-by-Downloader site and without knowing downloaded a Qakbot virus. Within seconds it quickly spread to all 500 Workstations and servers on the City network.  IT staff pulled the plug on the City’s Internet connection to prevent data from being stolen it took 6 days to remove infections the cost to the City was expected to be in the tens of thousands. However some monetary costs would be tough to calculate for the lost productivity.

Criminal Techniques  Social Engineering (video)video  Spam  Phishing  Spear Phishing (video)video  Pharming  Online Schemes and Fraud  Drive-by-downloads  Advertisements  Brute Force Attacks  Man-in-the-middle Attacks  Dumpster Diving  Software Vulnerabilities  Website Hacking  Viruses and other Malware

 Passwords  Uppercase, Lowercase, Special Characters, and Numbers  8-10 characters long  Don’t use the same password for all online sites (banking, )  Never let the Internet browser store your password  Change the default password  Set Strong Passwords

 Only purchase from trusted sites that use encryption  Never store credit/debit card information on a website  Never use a debit card  Always check your account for fraudulent charges Online Purchases

Other Items  Don’t Click on Pop-ups  Read them  Ask  Never Download Free Screensavers  Don’t Send Online Greeting Cards to Friends or Co-Workers  Immediately delete s from untrusted sources  Do not use Peer-to-Peer applications of any kind  Stay away from online gaming and gambling sites  And above all, when in doubt don’t click the link

Questions?

References  Cyberpower and National Security, 2009 By Franklin D Kramer, Stuart H Star, Larry Wentz   _by_some_form_of_virus_or_spyware2/  big-is-the-theft  