By Ashlee Parton, Kimmy McCoy, & Labdhi Shah

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Security Awareness Presenter: Royce Wilkerson.
Cyber X-Force-SMS alert system for threats.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
IT security By Tilly Gerlack.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
 Introduction to Computing  Computer Programming  Terrorisom.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Mobile Device Security Threats Christina Blakley Host Computer Security.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Safe Computing Practices. What is behind a cyber attack? 1.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
By: Micah Stevens Identity Theft in the World Today.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
IT Security  .
A Project on CYBER SECURITY
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Risk of the Internet At Home
Computer Security.
Securing Information Systems
Information Security – Sep 18
Security in mobile technologies
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

By Ashlee Parton, Kimmy McCoy, & Labdhi Shah Cyber Security By Ashlee Parton, Kimmy McCoy, & Labdhi Shah

How Does Hacking Work? Hacking is a waiting game Hackers are like fisherman A source of entry provides opportunity Once a firewall is penetrated, the rest is history

Types of Hacking IP spoofing – using a fabricated IP address to gain entry into a computer system Web spoofing – Use of a false website to lure users in Spamming – unsolicited messages sent to numerous people Skimming - swiping a debit/credit card through a device that transfers the information directly to the attached computer

Types of Hacking Phishing – providing people with enticing information that will aid in the hacker obtaining easy access to valuable information Pharming – A more technologically advanced form of phising. Stolen identity is not always committed by a hacker

The Real Security Threat We are our own worst enemy Not everyone is a target, but everyone is under attack Cyber security is essential and extremely valuable

Prevention Protection methods: Configure privacy and security settings Keep software and operating systems updated Use strong passwords Be cautious of links and attachments

STRONG P@$$\/\/0RD$ Strongest form of protection User authentication Username Password Ex) Pipeline and D2L

Threats to Password Security Weak passwords Vulnerable passwords Heartbleed bug Problems with apps

Strengthen Passwords Avoid recycled passwords Password syntax Password confidentiality Honey words Biometrics

Consequences Target became a prey of security breach in 2013. POS system was infected with malware which was automatically downloaded from hackers computer. Hackers stole personal information from up to 40 million credit and debit cards of shoppers who visited its stores. Customers were angry and furious. Target lost loyal customers.

Conclusion Security breach is one of the fastest growing crime in USA. It is increasing with increasing use of information technology.

On an average 19,000 identities are stolen everyday. Costs $40,000 to $92,000 per victim around the world. In USA, average cost is $10,200/institution and $1,180/ person.

Despite of the rapidly growing crime rate, limited steps are being taken to protect security theft and legitimately protect personal information from being leaked.

Recommendation: Prevention is better than cure. Increase awareness among consumers regarding security breach. Use strong passwords and keep multiple layers of security in your computer. Banking institutions should focus on informing their customers about monitoring accounts for fraudulent activity.