By Ashlee Parton, Kimmy McCoy, & Labdhi Shah Cyber Security By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
How Does Hacking Work? Hacking is a waiting game Hackers are like fisherman A source of entry provides opportunity Once a firewall is penetrated, the rest is history
Types of Hacking IP spoofing – using a fabricated IP address to gain entry into a computer system Web spoofing – Use of a false website to lure users in Spamming – unsolicited messages sent to numerous people Skimming - swiping a debit/credit card through a device that transfers the information directly to the attached computer
Types of Hacking Phishing – providing people with enticing information that will aid in the hacker obtaining easy access to valuable information Pharming – A more technologically advanced form of phising. Stolen identity is not always committed by a hacker
The Real Security Threat We are our own worst enemy Not everyone is a target, but everyone is under attack Cyber security is essential and extremely valuable
Prevention Protection methods: Configure privacy and security settings Keep software and operating systems updated Use strong passwords Be cautious of links and attachments
STRONG P@$$\/\/0RD$ Strongest form of protection User authentication Username Password Ex) Pipeline and D2L
Threats to Password Security Weak passwords Vulnerable passwords Heartbleed bug Problems with apps
Strengthen Passwords Avoid recycled passwords Password syntax Password confidentiality Honey words Biometrics
Consequences Target became a prey of security breach in 2013. POS system was infected with malware which was automatically downloaded from hackers computer. Hackers stole personal information from up to 40 million credit and debit cards of shoppers who visited its stores. Customers were angry and furious. Target lost loyal customers.
Conclusion Security breach is one of the fastest growing crime in USA. It is increasing with increasing use of information technology.
On an average 19,000 identities are stolen everyday. Costs $40,000 to $92,000 per victim around the world. In USA, average cost is $10,200/institution and $1,180/ person.
Despite of the rapidly growing crime rate, limited steps are being taken to protect security theft and legitimately protect personal information from being leaked.
Recommendation: Prevention is better than cure. Increase awareness among consumers regarding security breach. Use strong passwords and keep multiple layers of security in your computer. Banking institutions should focus on informing their customers about monitoring accounts for fraudulent activity.