By: Travis Holm.  Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Chapter 4 Personal Security
Chapter 1 Introduction to Security
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Chapter 2 Desktop Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Internet Safety Dr. Steve Broskoske Misericordia University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Identity Theft.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Technical Implementation: Security Risks
IDENTITY THEFT.
Network Security Fundamentals
IT Security  .
Presentation transcript:

By: Travis Holm

 Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially information assets of that organization

 Personal/Identity Security  Information Security

IDENTITY THEFT

 Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes  It can destroy your credit and your good name

 The FTC estimates that as many as 9 million Americans have their identities stolen each year. (2009) In fact, you or someone you know may have experienced some form of identity theft

 This crime takes many forms:  Credit Card Fraud  Phone or Utilities Fraud  Bank/Finance Fraud  Obtain Government Documents  Other Fraud

 For identity thieves, your personal information is as good as gold!!  Thieves use a variety of methods to get hold of your personal information, including:

 Dumpster Diving - They rummage through trash looking for bills  Skimming - They steal credit/debit card numbers by using a special storage device  Phishing - They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information

 Changing Your Address - They divert your billing statements to another location by completing a change of address form  Old-Fashioned Stealing - They physically steal wallets/purses & postal mail; steal personnel records, or bribe employees who have access

Credit Card Fraud: - They may open new credit card accounts in your name - They may change the billing address on your credit card

Phone or Utilities Fraud: - They may open a new phone or wireless account in your name - They may use your name to get utility services like electricity, heating, or cable TV

Bank/Finance Fraud: - They may create counterfeit checks - May open a bank account in your name - Clone your ATM card - Take out a loan

Government Documents Fraud: - They may get a drivers license - Use your name and SS # to get government benefits - File a fraudulent tax return

Other Fraud: - Apply for and get a job - Rent a house/apartment - Receive medical services - Give out your personal information during an arrest

 Monitor your accounts and bank statements each month  Check your credit report on a regular basis

 Check your credit reports  Notify creditors immediately  Dispute any unauthorized transactions  Last, but not least, file a police report

 Be aware how information is stolen  Educate your family, friends, and others  Basic awareness and common sense  Treat your trash and mail carefully

 Describes the tasks of guarding information that is in a digital format Integrity Confidentiality Availability

 Asset  Something that has value  Threat  An event or object that may defeat the security measures in place  Threat Agent  Person or thing that has the power to carry out a threat

 Vulnerability  Weakness that allows a threat agent to bypass security  Exploiting  To take advantage of a vulnerability  Risk  Likelihood that a threat agent will exploit a vulnerability

Hackers  Identifies anyone who illegally breaks into or attempts to break into a computer system  A Person who uses his or her advanced computer skills to attack computers only to expose security flaws

Crackers  Refers to a person who violates system security with malicious intent

Script Kiddies  Unskilled Users  They download automated hacking software

Spies  A person who has been hired to break into a computer and steal information

Thieves  Search for any unprotected computer *From July through December of 2004, 54 percent of the top 50 malicious Internet programs were designed to steal confidential financial information*

Employees  Yes, your own employees!!

Cyberterrorists  Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens and wreak havoc with vital information systems  Such people may attack because of their ideology/beliefs

Malware (Malicious Software)  Used to describe computer programs designed to break into and create havoc  Most common types of malware are:

Viruses  A program that secretly attaches itself to a document or another program and executes when that document or program is opened

Worms  Similar to viruses, but does not attach to a document to spread, but can travel by itself  A worm does not always require action by the computer user to begin its execution

Logic Bombs  A computer program that lies dormant until it is triggered by a specific logical event

Spyware  General term used for describing software that violates a users personal security  Approximately 116,386 Web pages distributed spyware during April 2005

Adware  Software that delivers advertising content in a manner this is unexpected and unwanted by the end user

Phishing  Involves sending an or displaying web announcements that falsely claims to be from a legitimate enterprise

Keyloggers (Keystroke Logger)  Either a hardware device or a small software program that monitors keystrokes  May observe the program running in: MS Windows, Windows Task Manager

Social Engineering  Social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target; to steal money, information, or other valuables – basically a con man/woman

Password Guessing  Brute Force – systematically changing one character at a time  Dictionary Attack – takes each word from a dictionary and encodes it the same way the computer encodes a user’s password for protection

Physical Theft  February 2005 – The Bank of America said that it lost computer backup tapes containing personal information on about 1.2 million charge card users  May 2005 – Time Warner, Inc. reported that information on 600,000 current and former employees was missing

Improperly Recycled Computers  Many people give them to schools, charities, or sell them online  To erase the data completely use a DOD Wipe program

Patch Software  Describes software security updates that vendors provide for their programs and operating systems Windows/Microsoft Update

Firewalls  Designed to prevent malicious packets from entering the network or computers  Software or Hardware based  Some routers have built in NAT

Strong Passwords (Basic Rules)  Have at least 8 characters  Combination of letters, numbers, and special characters  Replace every 30 days  Do not reuse for 12 months Example:

Antivirus Software  Software scans a computer for infections and isolates any file that contains a virus

Antispyware Software  Helps prevent computers from becoming infected by different type of spyware  Basically like antivirus software

How to Prepare  ALWAYS back-up your files that cannot be easily or quickly recreated!!!  Portable USB hard drives  Network attached storage device  Internet/Online back-up  Tape back-up  CD/DVD ROM  USB Flash Drive