CYBER SECURITY PANDEMIC

Slides:



Advertisements
Similar presentations
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Important Information Provided by Information Technology Center
Proactive Incident Response
Spear Phishing Common cause of data breaches Targeted s
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Phishing Don’t take the bait! Dave Beauvais Andrew Sloan
2016 Data Breach Investigations Report
System Access Authentication
Do you know who your employees are sharing their credentials with
CYBERSECURITY By Salomon Frangieh CISBC.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Network security threats
Information Security 101 Richard Davis, Rob Laltrello.
King Phisher Diy phishing security
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
Presented by: Brendan Walsh Manager, Security and Access Management
Cybersecurity Awareness
Cyber Security in the Mortgage Industry
Spear Phishing Ways to Minimize its Risks
Information Security Session October 24, 2005
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Personal IT Security Cyber Security – Basic Steps
smartmail & smartportal: Introducing Two-Factor Authentication
David J. Carter, CISO Commonwealth Office of Technology
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
Teaching you NOT to fall for Phish
Faculty of Science IT Department By Raz Dara MA.
Practical tips to defend your business from cyber attacks
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Information Protection
Security in mobile technologies
Introduction to Symantec Security Service
Securing and Protecting Citizens' Data
Information Protection
Cybersecurity Simplified: Phishing
Cybersecurity Simplified: Ransomware
Presentation transcript:

CYBER SECURITY PANDEMIC PHISHING: CYBER SECURITY PANDEMIC MAY, 2016

By the numbers… On average we daily perform: 400,000 reputation-based blocks 170,000 signature-based blocks 4,000 ad hoc customized blocks We block billions of additional system connection (break-in) attempts via our firewalls   Month Total Denies Average/day February 2,261,922,743 77,997,336 March 2,368,550,968 76,404,870 April 2,723,784,512 90,792,817 May (not complete) 1,307,614,803 56,852,818   Feb. through April 7,354,258,223 81,713,980

What is phishing ? Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.

What is spear phishing ? Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

Receive 8.2 million messages each day Block 7.7 million messages each day (93%) Deliver 511,000 messages each day (7%)

Many at UNC-CH are careful, so thank you! Between March 16 and May 4 there were 4,459 phish reports to the ITS Service Desk.  There seems to be plenty of awareness and cooperation from our community.  So there is a lot of vigilance! Yet bad actors are still using phishing effectively. 

Odd opening sentence and phrasing, as well as poor capitalization Odd opening sentence and phrasing, as well as poor capitalization. ConnectCarolina should be one word! Suspicious URL – two many non-UNC extensions. All caps message to create a false sense of urgency and fear. More poor phrasing. UNC Admin Verification Services does not exist.

UNC-CH organization will EVER ask you for your Onyen and password. No authorized UNC-CH organization will EVER ask you for your Onyen and password. EVER.

What can we do about Phishing? Understand what a phish looks like & be cautious Report the phish: phish@unc.edu Hover to discover the real URL destination

Hover to discover… Hovering your mouse over a link shows the target URL destination

Additional protections Physical security in data centers and network wiring closets Encrypt data at rest Encrypt data in transit Standards based authentication Anti – virus Application firewalls Outreach programs Two-factor Microsoft Advanced Threat Detection