Presentation is loading. Please wait.

Presentation is loading. Please wait.

Spam, Scam, and Slam Ira Goldstein –

Similar presentations


Presentation on theme: "Spam, Scam, and Slam Ira Goldstein –"— Presentation transcript:

1 Spam, Scam, and Slam Ira Goldstein – igoldstein@siena.edu
Department of Computer Science Siena College

2 Agenda Defining Terms Malware Personal Information Questions

3 Who? Image by Vincent Diamante Some rights reserved

4 Sockpuppet An online identity created and used for purposes of deception.

5 What Is… SPAM

6 Spam, Scam, and Slam Unsolicited Commercial E-Mail Defraud Malware
Nigerian (419) Stock “Great” Deals Lottery Phishing Malware

7

8 © 2010

9 RECEIVED A DIFFERENT ACCOUNT FROM YOUR NEXT OF KIN to claim your fund valued $10.7 millions dollars

10

11

12

13 Do Not Feed The Trolls Some rights reserved by tripu © 2010

14 Social Engineering Goal: Your Information Phone Call Physical Access
Phishing Spear Phishing

15 Phishing E-Mail or Instant Message Cast A Wide Net “Remember Me?”
Verify or Update Information A Problem With Your Account/Computer

16 Spear Phishing Your Name Local News Your School
Image CCSA by Michel van Eupen © 2010

17 What Is… Malware

18 What Is Malware? Malicious software  malware
Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations

19 What Does Malware Rely Upon?
User Rights File Attributes Bugs, vulnerabilities Zero Day Escalation of Rights End User Behavior

20 Types of Malware Vector Computer virus Computer worm Trojan horse
Activity Bot Mass Mailing Remote Attack (DDoS) Cryptocurrency Mining Spyware Rootkit Backdoor

21 Computer Viruses Self-replicating program
Attaches itself to a legitimate file Exchange infected files CDs or Flash Drives attachments

22 Computer Worms Self-replicating program Self-distributing program
Mass-mailing worm Internet worm

23 Trojan Horse Malware disguised as legitimate software
Usually tricked by some form of social engineering to install Not able to self-replicate

24 Some Malware Symptoms Performance Problems/Crashes
Unexplained Computer Behavior Antivirus or firewall protection is unexpectedly disabled Home Page Hijacking Search Engine Hijacking Pop up Advertisements Scareware

25 Passwords

26 Password Something that enables one to pass or gain admission: as
a spoken word or phrase required to pass by a guard a sequence of characters required for access to a computer system - Merriam-Webster On-Line a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource One Factor

27 Password Do’s UPPER And lower Case Digits Special Characters
Passphrase Wwtg2Dn! Longer Can Help Periodically Change

28 Password Don’ts Share Reuse Write Down Store Easily Guessed Dictionary
Names Mascot/Pet

29 Passwords in the News More than 70% of people would reveal their computer password in exchange for a bar of chocolate Most Common 4%: password 2nd Most Common (1.5%): 20% of Users: One of 5,000 Passwords

30 Personal Information

31 Data Privacy Data Leakage Protect Confidential Data
Personally Identifiable Information Financial Data Trade Secrets

32 Location Data Cell Towers SSID GPS

33 Google Dashboard https://www.google.com/settings/dashboard
Manage Google Data Location Data

34 SSID Database wigle.net

35 Tips Keep Your Operating System Updated Use Anti-Virus Software
Keep it up to date! Regular Scans Use a Firewall

36 Questions

37


Download ppt "Spam, Scam, and Slam Ira Goldstein –"

Similar presentations


Ads by Google