Safe Computing Practices. What is behind a cyber attack? 1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Safe Internet Use Mark Wheatley CSI Onsite
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Computer Skills and Applications Computer Security.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
TYLER GROUP
Cyber security. Malicious Code Social Engineering Detect and prevent.
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Cyber Security Awareness Workshop
How to Protect Yourself from ID Theft and Social Engineering
Phishing is a form of social engineering that attempts to steal sensitive information.
Teaching Computing to GCSE
Cybersecurity Awareness
Information Security Session October 24, 2005
Unit 1 Fundamentals of IT
Spear Phishing Awareness
Identity Theft By Omer Ersen.
Presentation transcript:

Safe Computing Practices

What is behind a cyber attack? 1

2

Phishing Example 1 - Red Flags 3

Phishing Example 2 – Spoofed Senders 4 s sent from a account!

Phishing Example 3 – Context and Links 5

Phishing Example 4 - Malicious Attachment 6

Scams – Common Attacks to Watch For Credit Card or Bank Scams: Often mimic common banks and card companies trying to entice a potential card folder to expose their user credentials or account information. PayPal Scams: Have become increasingly prevalent from fake offers of PayPal benefits to scams around account information. The goal of these is always to elicit account credentials. C-Level Scams: Attackers have increased their efforts targeting C-Level or management level individuals. These attacks often are singular in their target (spear phishing) and extremely well crafted. Managers should practice extra caution when exposing their credentials Vacation/Travel or Sales Scams: Traditionally done a spoofs of major travel or retail outlet firms but can be designed to look like any online store or company. These scams have the sole intent of taking the attacker to a fake web site for the harvesting of sensitive information such as credit card information. Tax/IRS Scams: Most common around the New Year and tax season, these scams come in many forms to entice the victim to expose sensitive data such as social security numbers. Phishing: Usually in the form of , a scam defrauding an online user of account, financial, or other sensitive information by posing as a legitimate source. Pharming: The act of redirecting traffic from a web site to a fake site for the purpose of defrauding the site users. 7

Malicious Downloads when-downloading-free-software/

Malicious Add-Ons and Plugins when-downloading-free-software/

Please Don’t Share Passwords 10

There’s no such thing as a free lunch USB storage key 2011: Ponemon Institute and Kingston Digital release a report showing 70% of businesses lost data due to USB sticks and 55% of those were due to malware infections. 2012: Two US Power Plants infected with malware from USB Drives 2014: Nohl & Lell identify a critical flaw in the design behind USB technology that allows for the introduction of malware. 11

Data Classification – What to Collect and How 12 ● ●

Resources on Information Security Policies: Privacy Policy =Confidentiality of Data Network Monitoring Policy = Protection of College Technology Resources Technical Incident Response Policy = Response to Information Security Events Data Classification Policy = Defines Data Types Red Flags Policy = Identity Theft Protection Not presently in hand book PCI Policy = Payment Card Data Handling Web Sites: Middlebury’s Information Security Phishing Information Protect Yourself On-line Parents Resource for Kids On-line Best Practices for Home and Work Best_Practices_Datasheets.pdf

Discussion and Links Please share your thoughts! Information Security Resources: Report Information Security Events To: