Cyber Security Awareness Workshop

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Internet Security Awareness Presenter: Royce Wilkerson.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
How It Applies In A Virtual World
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Scams & Schemes Common Sense Media.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cyber Safety Jamie Salazar.
BBB IDENTITY THEFT By Blake Bowland Computers III.
INTRODUCTION & QUESTIONS.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Safe Computing Practices. What is behind a cyber attack? 1.
Cyber security. Malicious Code Social Engineering Detect and prevent.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
National Cyber Security Month
Cyber Crime & What It Means For Your Business
cybercrime Presented to you by : NAMES MATRIC NO
Phishing is a form of social engineering that attempts to steal sensitive information.
Christopher romano & Courtney Sullivan 18 September 2017 Ia445
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Phishing.
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Faculty of Science IT Department By Raz Dara MA.
Security Hardening through Awareness August 2018
Business Compromise and Cyber Threat
Computer Security By: Muhammed Anwar.
Social Engineering Humans are often the weakest point in security
Information Security – Sep 18
Unit 1 Fundamentals of IT
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
What is Phishing? Pronounced “Fishing”
Communicating in the IT Industry
Privacy, Security, and Ethics
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Cyber Security Awareness Workshop You are the Target Before you click

Cyber Hackers Techniques 1. Social Engineering Phishing Spear Phishing 2. Tricking you by installing malicious software

Brock Cyber Facts Last week we were phished! These compromised accounts were mostly the result of members of the Brock University community falling victim to phishing scams Cyber Criminals know who we are , what we do, who we report to and how to use our logos to fool us into giving them our Campus ID and password

What Cyber Hackers Can Access Create new identities Access your email Access your bank account Access your credit cards

What can you do to protect yourself? itsecurity@brocku.ca

Questions?