Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CCT355H5 F Presentation: Phishing November Jennifer Li.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Jeff loses his identity! Lesson 8: Identity Theft.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Regional Cyber Crime Unit
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Jeff loses his identity! Lesson 5: Identity Theft.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Combating Identity Fraud In A Virtual World
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
IT Security  .
Digital Citizenship Middle School
Protecting Your Identity:
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Information Security Session October 24, 2005
Protecting Your Identity:
Protecting Your Company’s Most Valuable Asset
Information Security – Sep 18
Presentation transcript:

Cyber crime on the rise

Recent cyber attacks

How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses Network attacks Spear phishing Vishing Phishing Watering hole attacks Hacking Social engineering Social media impersonation Spyware Password cracking Ransomware Malware Identity fraud Identity theft

From stolen passwords to reputational disaster FebruaryMarchAprilMayJune eBay customer database breached eBay discovers breach and issues warning to customers December Target breached losing 70 million customer details Cyber criminals steal eBay employee usernames and passwords eBay under investigation Morrisons Data theft eBay attracts extensive media reaction

What are the risks to you as a customer? Identity theft Stealing money from your bank account or shops using your online account Target you with spam and phishing s Spending money using your bank or credit card details A victim can spend anywhere from six months to two years recovering from identity theft CNN Financial

What are the risks to you as a customer? Identity fraud Opening bank accounts Applying for credit cards, loans and state benefits Funding crime Identity fraud continues to rise, with 4 million victims in the UK alone. Yet consumers continue to be complacent with their ID Action Fraud

What could happen to Royal Mail? Reputational risk through losing customer information Loss of business Legal/regulatory fines could be implemented if we are breached Royal Mail could be prevented from taking card payments causing a financial risk Cyber attacks are more sophisticated than ever The Guardian Cybercrime is a serious threat to global business networks ICC Commercial Crime Services

What can you do to help to protect Royal Mail? Never share your username and password Watch for suspicious s Website links File attachments Direct information requests Be wary of suspicious calls and people Be careful what you share on social media 44% of phishing s impersonate the targeted company’s IT department Mandiant

Protecting your identity Watch for attempts to steal information Check messages for the signs of phishing Only click on website links and attachments if you know are genuine Be wary of callers and visitors that ask for valuable information Check bank and credit card statements Monitor your credit report Don’t ‘over-share’ on social media

If you feel information has been compromised Contact your bank or credit card provider for financial concerns Report lost documents to the relevant organisation Call your local police force if advised Call Action Fraud for advice - At home

Contact the IT Helpdesk for IT-related issues Contact Group Security if you receive a suspicious phone call or are asked for valuable information face-to-face Visit myroyalmail.com/thinksecure for contact details and our online reporting form If you feel information has been compromised At work