Personal IT Security Cyber Security – Basic Steps

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
To:Employee From: impersonated official company Message: Give us personal information here.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Topic 5: Basic Security.
A Matter of Your Personal Security Phishing Revised 11/30/15.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Cyber security. Malicious Code Social Engineering Detect and prevent.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Technical Implementation: Security Risks
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Done by… Hanoof Al-Khaldi Information Assurance
CYBER SECURITY PANDEMIC
Learn how to protect yourself against common attacks
Social Engineering Charniece Craven COSC 316.
Information Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
I S P S loss Prevention.
How to Protect Yourself from ID Theft and Social Engineering
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
Information Security Session October 24, 2005
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Jeff loses his identity!
Phishing.
Lesson 2: Epic Security Considerations
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Lesson 2: Epic Security Considerations
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Phishing 101.
Unit 1.6 Systems security Lesson 1
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Personal IT Security Cyber Security – Basic Steps What is Social Engineering? Phishing – Be Aware Common Types of Attacks

Some Basic Steps towards Personal Cyber Security Use Strong Passwords (alphanumeric at least 6 characters long) and ones that are not easy to guess. Do NOT share your passwords. Home and Mobile Working – Use Vmware Horizon Client to access your College work securely. When at home ensure you update the device you use to access the internet as recommended with the latest patches. Keep your Anti-Virus and Malware Protection updated regularly. Use a personal firewall on any device used to access the internet from home.

Social Engineering the manipulation of situations and people that result in the targeted individuals divulging confidential Social engineering is one of the most prolific and effective means of gaining access to secure systems and obtaining sensitive information, yet requires minimal technical knowledge. You are your biggest weakness when it comes to cyber security.

Examples of Social Engineering Vishing Supplying details to a fraudster who has phoned you claiming to be from your bank or credit card provider, or from the police and telling you there is a problem. They ask you to confirm confidential information in order to solve the problem. this is known as vishing. they may even despatch a courier to collect payment cards or other records from you, known as courier fraud. Smishing Text messaging scams called smishing – short for sms phishing – are very similar to traditional phishing except they happen via text message versus email. In a typical scam, you would receive a text message that appears to be from your financial institution, asking you to confirm or supply account information. This is especially dangerous since some of us are used to receiving official text messages from our banks

How to avoid Social Engineering Attacks Never reveal personal or financial data including usernames, passwords, pins, or id numbers. Be very careful that people or organisations to whom you are supplying payment card information are genuine, and then never reveal passwords. Remember that a bank or other reputable organisation will never ask you for your password, pins or authentication codes via email, phone call or SMS Do not open email attachments from unknown sources Do not readily click on links in emails from unknown sources. Instead, roll your mouse pointer over the link to reveal its true destination, displayed in the bottom left corner of your screen. Beware if this is different from what is displayed in the text of the link from the email. Remember that a bank or other reputable organisation will never ask you for your password or pin via email or phone call. If you think someone knows your password or pin change it immediately.

Phishing Email – What to look for – Report any suspicious emails Sender - were you expecting this email? Not recognising the sender isn’t necessarily cause for concern but look carefully at the sender’s name – does it sound legitimate, or is it trying to mimic something you are familiar with? Subject line - often alarmist, hoping to scare the reader into an action without much thought. May use excessive punctuation. Logo - the logo may be of a low quality if the attacker has simply cut and pasted from a website. Is it even a genuine company? Dear You - be wary of emails that refer to you by generic names, or in a way you find unusual, such as the first part of your email address. don’t forget though, your actual name may be inferred by your email address. The body - look out for bad grammar or spelling errors but bear in mind modern phishing looks a lot better than it used to. Many phishing campaigns originate from non-English speaking countries but are written in english in order to target a wider global audience, so word choice may be odd or sound disjointed. The hyperlink⁄attachment - the whole email is designed to impress on you the importance of clicking this link or attachment. Even if the link looks genuine, hover the mouse over it to reveal the true link, it may provide a clue that this is not a genuine email. If you are still unsure, do not click the link – just open a webpage and log onto your account via the normal method. If it appears to be from a trusted source, consider phoning the company’s customer service, but never follow the email’s instructions. Be aware that most companies operate policies stating they will never include links in emails and will never ask for personal information. Do not open attachments. Signature Block - the signature block may be a generic design or a copy from the real company.

Common Types of Attack Man in the Middle Attack The attacker intercepts the network and watches the transactions between the two parties and steals sensitive information. Consider your security when connecting to public Wi-Fi. Also for large money transactions, transfer only £1 and then verify by telephone the intended person/company has received the £1. When confirmed, transfer the outstanding amount. Brute force attack Continuously attempting to crack your password. Make sure you have a strong password policy. Use a combination of alpha numeric and special characters. Avoid dictionary words due to password crackers, don’t use common passwords, i.e. password or 123456, do not store passwords in clear text, different passwords between personal and business. If one password is known and there are similar passwords in other systems, change them. Invoice fraud Claiming that you need to change your payment destination or a demand for payment via phone, fax and email.