Time to Open our Eyes! Markus Jakobsson

Slides:



Advertisements
Similar presentations
Help, yes or no ?. Traffic accidents, as one of the important social problems, have always been paid great concern. In most of the big cities, every day,
Advertisements

Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Good Morning! Today is ____________________.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Charity Fraud Has anyone ever asked you to donate to charity?
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
You have two choices. Jerry is the manager of a restaurant. He is always in a good mood.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
UNIT spelling SOFT C – HARD C.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Information on Information. Overview Awareness  Social Networks  How information that is displayed or given can affect you  Predators and how to keep.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
ACTIVE LISTENING Barbara Roche.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Bullying. Bullying snowball Bullying: The Definition 3  Bullying is verbal, physical or psychological abuse or teasing accompanied by real or perceived.
Ever wondered what you can do in Paris well I am going to show you.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
E-commerce Fraud: The New Reality Thomas Chim Raj Nair Chris Geegan Mike Grimsley.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
You have two choices.
Scams & Schemes Common Sense Media.
Your Social Transformation A step by step plan to generate prosperity in your life from Social Media and Your Real Estate Business.
Intro: U TUBE VIDEO  “What to do when you’re bullied”
Speech and Language Therapy Consent for Assessment being able to understand information. I am a Speech and Language Therapist. I help people with their.
Cyber Bullying & How to Safeguard Yourself. What is Cyber Bullying? Cyber bullying is the use of the Internet and other related technologies to harm other.
Messaging Anti-Abuse Working Group MAAWG | maawg.org | San Francisco, CA 2011 WHY WE MUST ASK WHY Markus Jakobsson, Principal Scientist, PayPal Keynote,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied.Have any and all of their financial.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
MS. REYNOLDS, 7 TH AND 8 TH GRADE SCHOOL COUNSELOR BULLYING.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Now you will enter a magic world…. In a moment… … you will witness something very special!!!
Interview with a Top Producing Real Estate Agent.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
MXit is a mobile application that allows people to chat to their friends at a much cheaper rate than normal text messages. You can contact anyone anywhere.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
1. Mastering the Art of the Difficult Conversation Marilyn Bushey, Coach to Leaders PowerPAC, Inc.
Business Math 3-3 Online banking. Goal Calculate account balance needed to make online payments.
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
Bullying. What are the statistics? By Erin lambert.
Unit 8: Assignment 1 – Task
CJ210: Interrogation: Purpose, Guidelines, Procedures, and the Miranda Ruling Unit 6 Seminar: Miranda, Interrogation, Interviews, and other.
Mrs.kimball 6 th period 1.  To prepare for the interview: › Do your homework. › Get organized. › Plan to make a good first impression. › Anticipate questions.
About Me Bag. ◎ ◎ Time is the ultimate resource ◎ Save energy ◎ Never stop learning.
By: Micah Stevens Identity Theft in the World Today.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Checklist for writing letters of advice.. Tell them how you know about the problem. I got your message telling me about your problems with… Your cousin,
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Fraud Protection.
Fraud protection.
Report Phishing Forward phishing s to
Phishing.
Report Phishing Forward phishing s to
Communicating in the IT Industry
Social Media: Sharing Images
Presentation transcript:

Time to Open our Eyes! Markus Jakobsson

We measure so we can react! 1.Measure need for education (and normalize based on your losses) 2.Measure perceived need for education (hard educate when no perceived need) 3.Measure awareness of problems (awareness campaigns cheaper than education) 4.Consider cost/benefit of campaigns (this maximizes impact - but requires insight!)

Know whom to ask! Are you concerned about lottery fraud? –Typical victim: “little-old-lady” Are you concerned about a criminal getting access to your friend’s myspace account and then sending you a message “I am in London, and got robbed. Can you wire me $100 today?” –Typical victim: 20-something

Know how to ask! Online crime is rampant. Based on your own experience with online fraud, do you think that users like you might lose money to online criminals? –9.2% say “Yes, as recent as in the past year” Have you been a victim of online fraud? –2.1% say “Yes, I was tricked last year.”

Know whether to ask! “Would you have fallen for this?” … does not work! Sting experiment (example: “Social Phishing” by Jakobsson and others) will tell the truth!

Educational strategies Old-school: Observe incidents. Show users screen shots of attacks. Needed approach: 1.Develop hypotheses. 2.Measure problem (the right way) 3.Select messaging approach wisely. Questions?