Slide # 1 Title Slide Preamble Introduce Participants and roles

Slides:



Advertisements
Similar presentations
Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
Norman SecureSurf Protect your users when surfing the Internet.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Getting A Hook On Phishing Laurie Werner Miami University Chuck Frank Northern Kentucky University.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
IT security By Tilly Gerlack.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Digital Citizen Project Katie Goodall Educational Technology 505.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Protecting Students on the School Computer Network Enfield High School.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Get Safe Online Expert advice for everyone In association with.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
2014 From Phish to Phraud Kat Seymour October 10, 2014 #GHC
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Advancing Workplace Technologies An MCCA Workshop presented by: Ed Weber, President Weber Enterprises, Inc. in association with: East Central College.
IT Security Awareness Day October 19, 2016
October 27, 2016 Main Line Association for Continuing Education
Trend Micro Consumer 2010 Easy. Fast. Smart.
Internet Identity, Safety, & Security
Personal spaces.
Class 2 - Transitional Internet Basics
ISYM 540 Current Topics in Information System Management
Step up your cyber defence
Information Security 101 Richard Davis, Rob Laltrello.
Jim Barton Librarian Glenside Public Library District
Arab Open University (AOU)
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Risk of the Internet At Home
Protecting Your Identity:
Threat landscape financial sector
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

Slide # 1 Title Slide Preamble Introduce Participants and roles Have sign up sheet available for larger groups Acknowledge and review agenda for the meeting Are there any questions or additions to the agenda? Has anything changed since our last meeting? (if applicable) Does anyone have any time constraints? Our presentation will last approximately 15 minutes depending on your questions Feel free to ask any questions as we go along Presentation First of all I would like to thank all of you for attending this meeting. We realize that your time is precious and it will be our objective to make the meeting a valuable use of your time. Bridge If informal “loose” group Who can tell me what WhiteHat stands for? More serious group I would like to begin by sharing the origin of the WhiteHat name with you

Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions Recommendations

This is Me!

This is also Me, well sort of!

This is Where I work

Results 1 - 10 of about 615 for Rosaleen Citron. (0.03 seconds)  Corporate Information at WhiteHat Inc Rosaleen Citron Chief Executive Officer, WhiteHat Inc. Rosaleen Citron is the Chief Executive Officer of WhiteHat Inc., an industry leading Information ... www.whitehatinc.com/corporate/profiles/ - 29k - Cached - Similar pages Media Room at WhiteHat Inc Featured WhiteHat personnel: Rosaleen Citron, CEO and Tom Slodichak, CSO. Inquiries in Remote Access Tools Explode because of SARS Scare ... www.whitehatinc.com/media/tv_and_radio/ - 35k - Cached - Similar pages [ More results from www.whitehatinc.com ] [DOC] Rosaleen Citron File Format: Microsoft Word 2000 - View as HTML Rosaleen Citron is the Chief Executive Officer of WhiteHat Inc., ... Most recently CRN Magazine, names Rosaleen Citron #2 in the 5 Canadian Innovators worth ... www.asisottawa.com/text/citron-bio.doc - Similar pages ASIS International Ottawa Chapter #140 Committee - Meeting EVENT: Rosaleen Citron and Chris Voice - Identity Theft ... Rosaleen Citron is the Chief Executive Officer of WhiteHat Inc., an industry leading Information ... www.asisottawa.com/meeting.html - 17k - Cached - Similar pages Rosaleen Citron -- 2005 e-Financial WorldExpo Rosaleen Citron Chief Executive Officer, Whitehat Inc. ... Rosaleen Citron is the Chief Executive Officer of WhiteHat Inc., an industry leading Information ... e-financial.wowgao.com/presentation_ proposals/pre_show.php?subjectid=389 - 4k - Cached - Similar pages

Phishing Statistics November 05 Highlights • Number of unique phishing reports received in November: 16882 • Number of unique phishing sites received in November: 4630 • Number of brands hijacked by phishing campaigns in November: 93 • Number of brands comprising the top 80% of phishing campaigns in November: 6 • Country hosting the most phishing websites in November: United States • Contain some form of target name in URL: 49 % • No hostname just IP address: 33 % • Percentage of sites not using port 80: 6 % • Average time online for site: 5.5 days • Longest time online for site: 30 days Phishing Targets

Three Pressure Points Home Computer Users E-Commerce Portal Operators Data Aggregators

Spyware Threat Landscape Crimeware Key stroke loggers Redirectors Man in the Middle Phishing (Pharming) Other Typo attacks Search Engine Poisoning

Phishing Tactics

Phishing Email Reports And Phishing Site Trends

More Sophisticated Trojans and Infection Methods

Code discovered in IFRAME

2005 Hall of Shame Card Systems Bank of America Choice Point DSW Shoe Warehouse Federal Deposit Insurance Corp. (FDIC) Lexis-Nexis Polo Ralph Lauren UPS University of Colorado Wachovia

Example of U.S. Programs Stop, Think, Click Cyber Security workshops Cyber Safety Multi Media events Cyber Security Awareness programs Declaring a Cyber Security Awareness month

8 Tips posted on all relevant sites Protect your personal information. It's valuable. Know who you're dealing with online. Use anti-virus software, a firewall, and anti-spyware software to help keep your computer safe and secure. Be sure to set up your operating system and Web browser software properly, and update them regularly. Use strong passwords or strong authentication technology to help protect your personal information. Back up important files. Learn what to do if something goes wrong. Protect your children online.

Web sites for Statistics. www.fraud.org www.staysafeonline.org www.antiphishing.org www.phonebusters.com www.RCMP-grc.gc.ca

Thank You ! Slide # 14 Conclusion Thank you very much for your valuable time. What questions do you have? Next steps?