Presentation is loading. Please wait.

Presentation is loading. Please wait.

Philip Nichilo Vincent Carestia

Similar presentations


Presentation on theme: "Philip Nichilo Vincent Carestia"— Presentation transcript:

1 Philip Nichilo Vincent Carestia
Cyber Security Philip Nichilo Vincent Carestia

2 Most Common Types of Cyber Crime
Identity Theft Intrusions Into Government Networks Cyber Stalking Computer Sabotage

3 Identity Theft Todays biggest cyber security concern is cyber identity theft. There are many ways to steal a persons identity online They include Hacking, the use of spyware and phishing Within the past 12 months, 9.3 million americans were victims of identity theft.

4 Hacking And Spyware Hacking is the illegal access by unknown and unauthorized parties to a computer system to destroy or disrupt the system or to use it to carry out illegal activities. More than 50 of reported data breaches in the last year have been attributed to computer hacking. Spyware is a type of malware that is installed on computers and collects information about users without their knowledge. 92 percent of surveyed computer users with spyware reported that they did not know of its presence on their computer.

5 Phishing This is a high tech scam that uses spam or pop-up messages to deceive consumers into disclosing their personal information concerning their back accounts , social security numbers or other crucial information. The average loss per phishing victim jumped from $257 in 2005 to $1,244 in 2006 Roughly 1 in 3 computer users have been a victim of phishing.

6 Intrusion of government networks
Government computer networks are constantly bombarded with probes, viruses, worms and malware access attempts that originate both within network boundaries and from sources around the world. The Department of defense detected 300 million network penetration attempts last year.

7 Cyber Stalking Cyber stalking has been defined as the use of information on and communications technology, particularly the internet, by an individual to harass another individual or organization. More than 1,000,000 women and 370,000 men are stalked annually in the united states.

8 Computer sabotage Computer sabotage is the use of the internet to hinder the normal functioning of a computer system. This includes the use of worms, viruses, or logic bombs. Computer sabotage can be used to gain economic advantage over a competitor, to promote the illegal activities of terrorists, or to steal data programs for other illegal purposes

9 Prevention Methods Firewalls Frequent password changing Safe surfing
Frequent virus checks filters


Download ppt "Philip Nichilo Vincent Carestia"

Similar presentations


Ads by Google