The vulnerability of the modern society

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

You are responsible for security of your internet banking transactions ONLINE.
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Ethical Hacking by Shivam.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Quiz Review.
Social impacts of the use of it By: Mohamed Abdalla.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
What is Cloud Computing?
Debra Mann Reference Librarian Innisfil Public Library
Securing Information Systems
Network security Vlasov Illia
Cyber Info Gathering Techniques
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
Scams & Schemes Common Sense Media.
Social Media Attacks.
To Know what Cyber crime is
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Ways to protect yourself against hackers
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Virtual Private Networks
How And The Internet Work
Chapter 11 crime and security in the networked economy
FJUHSD Teacher Librarian
Social Media Cybersafety.
The Best Way To Secure U R Self
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Risk of the Internet At Home
A Service Disabled Veteran Owned Small Business Company
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
IGraphic Social impacts of IT
Computer Security By: Muhammed Anwar.
Wireless Spoofing Attacks on Mobile Devices
Marcial Quinones-Cardona
What is keystroke logging?
Mass Media – the Internet
Communicating in the IT Industry
Introduction-Cyber Safety
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

The vulnerability of the modern society Spying The vulnerability of the modern society Minas Cholevas Nick Strongylos Slide 1 of 10

Chapters Slide 1-2: What is cyber spying?/examples Slide 3: How did it start? Slide 4: Forms of cyber spying Slide 6-7: How is it done? Slide 8: How can I avoid it? Slide 2 of 10

What is cyber spying? Cyber spying typically involves the use of computers in order to access information or take control of individual computers and whole networks for a strategic advantage or psychological, political, physical subversion activities and sabotage. Cyber spying involves analysis of public activity on social networking sites like Facebook and Twitter. Slide 3 of 10

Examples 2009 A group of chinese hackers disable hundreds of US computers from accessing Twitter. 2014 Lizard Squad performs DDoS attacks on PSN and Xbox Live. 2017 Facebook sells 52 million contacts to the company responsible for the election of Donald J Trump. Slide 4 of 10

How did it start? The US government, with assistance from major telecommunications carriers including AT&T, has engaged in massive, illegal dragnet surveillance of the domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution. Slide 5 of 10

Forms of cyber spying MOST COMMON: 1. Keylogger 2. Denial of Service (DoS\DDoS) 3. Fake WAP 4. Phishing Slide 6 of 10

How is it done? 1. Keylogger 2. Denial of Service (DoS\DDoS). A software that records the key sequence and strokes of your keyboard These might even contain your personal email IDs and passwords. One of the main reasons why online banking sites let you use their virtual keyboards 2. Denial of Service (DoS\DDoS). Most commonly used to take down web servers. A hacker will flood a server with commands and traffic ,the server will not be able to process it all and will finally crash down. Extremely hard to defend against. Although dangerous,it will not grant the hacker access to the computer. Slide 7 of 10

3. Fake WAP A hacker can use a special software to fake a wireless access point. Once you get connected the fake WAP, a hacker can access the sent and received online data of the connected device. It’s one of the easier hacks to accomplish and one just needs a simple software and wireless network. Anyone can name their WAP as some legit name and start spying on you. 4. Phishing traps the victim by sending that spoofed link. Deadliest attack vector. The attack route taken by hackers who targeted numerous Hollywood female celebrities. Slide 8 of 10

How can I avoid it? Whenever you’re operating a computer in public setting, try to take extra caution. Don’t mess with DDoS. Buy a certified Antivirus . Always read the Terms & Conditions of use. (EA) Download a free VPN on your browser. Don’t click on suspicious stuff . Slide 9 of 10

Thank you for your attention! The Internet is the biggest marvel of the modern world, use it wisely! :) Slide 10 of 10