Spam, Scam, and Slam Ira Goldstein –

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 6 Digital Literacy Study S3 Obj 2-2
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Viruses & Destructive Programs
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Topic 5: Basic Security.
What is Spam? d min.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
MALWARE Autumn Mattis.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
CYBER SECURITY...
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
COMPUTER VIRUSES Computer Technology.
Computer Security Std XI– Chapter 8.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Malicious Software There are various sources via whom a malicious software can enter a system most common of which is through internet sites not only this.
Lesson 2- Protecting Yourself Online
Computer Technology Notes 5
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Viruses and Virus Protection
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Ch9 E-commerce Security
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Spam, Scam, and Slam Ira Goldstein – igoldstein@siena.edu Department of Computer Science Siena College

Agenda Defining Terms Malware Personal Information Questions

Who? Image by Vincent Diamante https://www.flickr.com/photos/70857039@N00/2255718951 Some rights reserved

Sockpuppet An online identity created and used for purposes of deception.

What Is… SPAM

Spam, Scam, and Slam Unsolicited Commercial E-Mail Defraud Malware Nigerian (419) Stock “Great” Deals Lottery Phishing Malware

© 2010

RECEIVED A DIFFERENT ACCOUNT FROM YOUR NEXT OF KIN to claim your fund valued $10.7 millions dollars

Do Not Feed The Trolls Some rights reserved by tripu www.flickr.com/photos/tripu © 2010

Social Engineering Goal: Your Information Phone Call Physical Access Phishing Spear Phishing

Phishing E-Mail or Instant Message Cast A Wide Net “Remember Me?” Verify or Update Information A Problem With Your Account/Computer

Spear Phishing Your Name Local News Your School Image CCSA by Michel van Eupen http://commons.wikimedia.org/wiki/File:Bushcraft_speervissen.jpg © 2010

What Is… Malware

What Is Malware? Malicious software  malware Any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations

What Does Malware Rely Upon? User Rights File Attributes Bugs, vulnerabilities Zero Day Escalation of Rights End User Behavior

Types of Malware Vector Computer virus Computer worm Trojan horse Activity Bot Mass Mailing Remote Attack (DDoS) Cryptocurrency Mining Spyware Rootkit Backdoor

Computer Viruses Self-replicating program Attaches itself to a legitimate file Exchange infected files CDs or Flash Drives Email attachments

Computer Worms Self-replicating program Self-distributing program Mass-mailing worm Internet worm

Trojan Horse Malware disguised as legitimate software Usually tricked by some form of social engineering to install Not able to self-replicate

Some Malware Symptoms Performance Problems/Crashes Unexplained Computer Behavior Antivirus or firewall protection is unexpectedly disabled Home Page Hijacking Search Engine Hijacking Pop up Advertisements Scareware

Passwords

Password Something that enables one to pass or gain admission: as a spoken word or phrase required to pass by a guard a sequence of characters required for access to a computer system - Merriam-Webster On-Line a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource One Factor

Password Do’s UPPER And lower Case Digits Special Characters Passphrase Wwtg2Dn! Longer Can Help Periodically Change

Password Don’ts Share Reuse Write Down Store Easily Guessed Dictionary Names Mascot/Pet

Passwords in the News More than 70% of people would reveal their computer password in exchange for a bar of chocolate Most Common 4%: password 2nd Most Common (1.5%): 123456 20% of Users: One of 5,000 Passwords

Personal Information

Data Privacy Data Leakage Protect Confidential Data Personally Identifiable Information Financial Data Trade Secrets

Location Data Cell Towers SSID GPS

Google Dashboard https://www.google.com/settings/dashboard Manage Google Data Location Data

SSID Database wigle.net

Tips Keep Your Operating System Updated Use Anti-Virus Software Keep it up to date! Regular Scans Use a Firewall

Questions