Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
What is identity theft, and how can you protect yourself from it?
Recommendations on the future of online GyroScope & Databse implementation.
Social media threats. Warning! May contain mild peril.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Internet Security Awareness Presenter: Royce Wilkerson.
Security, Privacy, and Ethics Online Computer Crimes.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Scams & Schemes Common Sense Media.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Cyber Security Nevada Businesses Overview June, 2014.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Safe Computing Practices. What is behind a cyber attack? 1.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Edexcel GCSE Cyber security threats Computer Science 1CP1
System Access Authentication
Overview 1. Phishing Scams
Cyber Security Awareness Workshop
Cybersecurity Awareness
Information Security – Sep 18
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Presentation transcript:

Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal

What is Cyber Security? Understanding the threats associated with using the Internet. The two greatest risks to the University and to individuals are from Phishing and poorly protected Web applications. Learning how to keep safe and protected.

Target Data Breach Cost for Banks Tops $200M The theft of more than 100 million customer records

Organized Crime To call Target’s data breach the tip of the iceberg doesn’t begin to capture the magnitude of the threat companies and individuals face today from cyber criminals. A more fitting metaphor is that we are in the midst of the largest, but largely unnoticed, world-wide epidemic, infecting computers and communications systems, and spreading at a dangerous pace. After Target data theft, hackers’ next target is you Stuart Madnick is the John Norris Maguire professor of information technology at the Sloan School of Management and professor of engineering systems at MIT School of Engineering.

Cyber Crime “Criminal gangs now find that transnational and cyber crime are far more rewarding and profitable than other, riskier forms of making money,” says Interpol “Experts have warned that the cost of cyber crime is larger than the combined costs of cocaine, marijuana and heroin trafficking. In Europe, the cost of cybercrime has apparently reached €750 billion euros ($964 billion) a year,” says Interpol

Too close to home! University of Utah's $3.3M data breach Computerworld - University of Utah officials this week acknowledged that a metal box of backup tapes containing billing records of some 2.2 million patients was stolen…University of Utah

Identity theft Number of US 2011 victims: 279,000. Number of US 2013 victims: 11,571,900. Average financial loss per incident: $4,930 Total financial loss attributed to identity theft in 2013: $21 billion 85% of theft incidents involved the fraudulent use of existing accounts, rather than the use of somebody's name to open a new account. Source: U.S. Department of Justice, Javelin Strategy & Research

Credentials

Phishing threat “Spear phishing is a much more precise method. They’ll take your name, look you up on Facebook, and do research to find out where you live. They’ll used LinkedIn to see what your job is, who your friends are,” explains Jonathan Maurer, information security officer at Rochester Institute of Technology. “They’ll try to craft a communication that looks so legitimate that you’ll actually fall for it and you’ll click on a link or download an attachment, and before you know it, your computer is compromised.”

Resources , network use, disk space, Web pages, etc,. Higher education is particularly vulnerable because—in contrast to hacking targets like banks—college and university computer networks have historically been as open and inviting as their campuses, says Fred Cate, director of the Indiana University Center

We can protect our selves Stronger passwords – 15 char passphrases are the best. Use many levels of passwords – Keep a password vault. Msecure, Keepass2, etc,. Multifactor authentication - sensitive parts of an institution’s network should require “multifactor authentication.” A user might have to enter a password, answer a separate question, and verify fingerprints or pass a retinal scan. Users also could be required to have a “token,” such as a USB key or card with a magnetic strip, says Fred Cate, director of the Indiana University Center for Applied Cybersecurity Research.

Keeping Safe If in doubt, don’t click it. There is no free lunch! Keep antivirus and other applications up-to- date with the latest versions. Secunia PSI. Monitor your statements. Use monitoring services. Be informed! Cryptolocker. – Sans ISC StormCast.

Protect your Web applications OIT Security Services Server vulnerability assessments. Penetration testing. Security consulting. OIT Security Services offers Web Application Scanning. First actual case of bug being found