Cyber Security and Computer Safety

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Internet Security and Your Computer Welcome to Boot Camp.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Cyber Safety Jamie Salazar.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Cyber Security and Computer Safety
Internet Safety.
Safety.
INTERNET SAFETY FOR EVERYONE
Cyber Info Gathering Techniques
Viruses & Destructive Programs
Creating your online identity
Social Engineering: The Human Element of Computer Security
What they are and how to protect against them
3.6 Fundamentals of cyber security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Risk of the Internet At Home
Internet Safety for Everyone
What you can do to support people to be safe online
Staying safe on the internet
Lesson 2: Epic Security Considerations
Internet Safety for Everyone
King Saud University- College OF Applied Studies
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Computer Security By: Muhammed Anwar.
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Week 7 - Wednesday CS363.
Introduction-Cyber Safety
Presentation transcript:

Cyber Security and Computer Safety UT Wing Civil Air Patrol

Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social Engineering

Social Media Do you know how much information an individual can collect about you? You are probably already sharing more data than you think Tagged pictures can show famous landmarks helping to identify hometown You might already be sharing hometown, job, school with everyone

Info Gleaned from Facebook Job listed School listed Residence listed Family info listed Hometown listed What can someone do with that info?

Modern Concern for Members Bad guys are looking for Military members and their families, be aware of how to post pictures.

Metadata Data on data Can have GPS coordinates imbedded in the image: Remember: It is easy to do a reverse lookup of someone’s name online to find an address if I can already narrow the search down to a City or State 34 pictures in SLC, UT. Hmmm, probably lives there…

Social Media Solution: Lock down privacy settings to only share with friends Be careful on how you affiliate yourself with different entities; if someone doesn’t like that group you may become a target

Man in the Middle Attacks: MITM A hacker can intercept data going from your computer to the router You do not have security on an unsecure network! Unsecure networks include Coffe Shops, Hotels, Airports Your passwords and usernames can be seen by a hacker, even if using HTTPS when on an unsecure network Always do online banking, and sensitive web use on a secure network that is trusted WEP encryption does not make your network very secure, may be time to upgrade to WPA2 Disable WPS is on your router, this can be brute-forced and compromise your network

Malware Hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs 30% of households in the U.S. are infected with Malware SLC ranks 5th in the U.S. for most computer infections A hacker can gain access to your computer to steal passwords, steal documents, use your webcam or microphone, or use your computer to attack another Most malware is installed by opening email attachments.

Malware Continued Phishing is done by either attaching a bad file that you have to open, and in SOME cases install Could be opened by having a URL link that takes you to a site that looks like the expected site but the URL name is wrong. Anti-virus use will NOT stop you from installing malware or a virus! The computer usually asks YOUR permission to install a piece of software that you have to agree to –unknowingly. NEVER download anything unless you know exactly what it is! Never go to a webpage unless you know exactly what it is!

Social Engineering A hacker will have full access to your computer if the can have physical access Never use a USB thumb drive, disc, or open an attachment from anyone you don’t trust. Never download anything unless you know exactly what it is If a bad person can have a few minutes alone with your computer, they can easily get full access A bad person will try to trick you (socially engineer you) and get you to use a thumbdrive, disc, or file that is corrupted