Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to keep the bad guys out and your data safe

Similar presentations


Presentation on theme: "How to keep the bad guys out and your data safe"— Presentation transcript:

1 How to keep the bad guys out and your data safe
Cyber Security How to keep the bad guys out and your data safe

2 By the end of this presentation, you should be able to:
Name five ways that cyberthieves try to steal your data List five different types of computer viruses List steps you must take to keep your computer safe

3 Cyber Crime is costly Accenture: Cybercrime to cost U.S. companies $5.2 trillion by 2024

4 Five Ways the Bad Guys Try to Steal Your Data
Phishing Malware Malicious Mobile Apps Physical Security Threats Unsecured Networks

5

6 Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an , instant message, or text message.

7

8

9

10 How They Steal Your Data
Links may lead to fake web sites that look legitimate, but aren’t The fake websites ask for information such as username, password, account numbers, etc.

11 How to Stay Safe Look for obvious flaws in the email Typos
Grammatical errors Look at the sender’s Is something just not right….gmall instead of gmail? When is doubt, don’t open it!

12 A True Story

13 Malware

14 What Is Malware? “Malware” is short for “malicious software” -  computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.

15 Types of Malware Virus –
A program capable of infecting a computer environment, disabling its core functionality, making files inaccessible, and replicating itself.

16 Types of Malware Trojan –
Trojan or Trojan horse is a type of computer software that is camouflaged in the form of regular software. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

17 Types of Malware Spyware –
As the name implies, this is software that "spies" on your computer. Spyware can capture information like Web browsing habits, messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

18 Types of Malware Keylogger –
a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

19 Types of Malware Ransomeware –
a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

20 How to Stay Safe Install anti-virus software and keep it up-to- date
Regularly scan your computer for malware Never ever allow someone to install pirated software on your computer Keep your operating system up to date Use “two factor identification” to verify anything sent by

21 Malicious Mobile Apps

22 What Are Malicious Mobile Apps?
They are the same as Malware but for your smartphone. They include: Viruses Trojan Horses Links to Phishing sites Spyware and/or key loggers

23 How to Stay Safe Install anti-virus software on your phone and keep it up-to-date Regularly scan your phone for malware Never ever install pirated software on your phone Never ever install software from third-party app stores Keep your operating system up to date

24 Physical Security Threats

25 What Is Physical Threat?
A physical threat occurs whenever an unauthorized person has access to any of your devices or information left out in the open.

26 How to Stay Safe Physically lock the computer to your desk
Password protect your device Change the password frequently and make it a strong password Never leave confidential information out where it can be seen Always back up your data and test to see that you can retrieve it Enable remote wipe services incase your device is lost or stolen

27 Unsecured Networks

28 What Is an Unsecured Network?
An Unsecured Network is one that uses no encryption to connect to the internet. Unsecured networks provide an opportunity for malware to be placed on your device, or at the least, to have your on-line activities intercepted.

29 DON’T USE PUBLIC WIFI…..EVER!!
How to Stay Safe DON’T USE PUBLIC WIFI…..EVER!! Use tools to create your own “hotspot” to access the internet when a secure network is unavailable Use encryption services like WiFi Protected Accesses 2 (WPA2) and a strong password

30 A Cautionary Tale

31

32 The “NotPetya” Attack of 2017
Originated by an attack of Russian State- Sponsored Hackers attacking computer servers in Ukraine The attack utilized two pieces of stolen software (one developed by the National Security Agency) that exploited a vulnerability in a Windows protocol

33 The “NotPetya” Attack of 2017
The attack spread from Ukraine to computer networks world-wide It mimicked ransomeware but it’s purpose was to encrypt the boot records of computers making it impossible to find their operating system This was an act of cyberwarfare

34 The “NotPetya” Attack of 2017
Maersk Shipping Lines was paralyzed by the attack They operate 76 ports globally They operate 800 sea-going container ships The attack shut down the ports and disrupted supply chains globally

35 The “NotPetya” Attack of 2017
The estimated total damage of the attack $10 Billion Dollars

36 The Lesson to be Learned
We are at war and we are all in the fight.

37 Questions?


Download ppt "How to keep the bad guys out and your data safe"

Similar presentations


Ads by Google