BREAKING NEWS “Ebay Had 145 Million Personal Record’s Stolen in a Data Breach” “Target Credit Card Breach Affects 110 Million Americans” “Court Ventures.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Biennium Close Awareness Training University of Washington Financial Management March
Parachute Neighborhood Watch Presentation February 9, 2010.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
 Network Hacking Unit 3 Presentation. Introduction to hacking  Definition of a Hacker: “A person who illegally gains access to and sometimes tampers.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
@NEXTXPERT Improvements that Microsoft has made in the Windows platforms have driven BAD GUYS to new tactics.
Securing the Digital Environment Technology Risk Management - A Caribbean Perspective Monday November 10 th 2014 Roshan Mohammed.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
The U.S government should give harder sentences to identity theft convicted criminals. Rodolph Thermitus CIS 1055 Section 007.
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Anderson School of Management University of New Mexico.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Great Depression Journal  During the Great Depression unit, you will be keeping a journal each class period. In your notebook, you will write a journal.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Financial Aid and Billing Presented by Gary West.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Vent! What feelings did you just experience?
SAN DIEGO SUPERCOMPUTER CENTER NATIONAL CENTER FOR SUPERCOMPUTING APPLICATIONS Case 216 The Incident That Brought Us Together December 12, 2005 Jim Barlow,
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Narkeya White. WHAT IS IDENTITY THEFT? Occurs when a person gathers personal information to assume the identity of another person for illicit reasons.
Computer Security By Duncan Hall.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Ads On The Internet Invade People’s Privacy
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Mayor Michael Ruben Bloomberg and stop and frisk Angie Sardo and Eunice Seo 10/2/14 SUPA forensics Period 2.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
2013 Target Data Breach Team 4
Information Security Program
Jan 2016 Solar Lunar Data.
Agenda Equifax data hack Best Buy stops selling Kaspersky
Company Name’s Marketing Strategy
Mammoth Caves National Park, Kentucky
Gantt Chart Enter Year Here Activities Jan Feb Mar Apr May Jun Jul Aug
Biennium Close Awareness Training
Protect Your Ecommerce Site From Hacking and Fraud
TEL031 ODL Analytics Main Activities
Presentation transcript:

BREAKING NEWS “Ebay Had 145 Million Personal Record’s Stolen in a Data Breach” “Target Credit Card Breach Affects 110 Million Americans” “Court Ventures Accidentally Loses 200 Million Personal Records”

From a Breached Credit Card to a Stolen Identity Company Information Security Reza Ameli Independent Research Eric Forte APL/UMBC

Presentation-Overview I will… Explain a data breach Explain the effects of a data breach Present company flaws in protecting consumer information Present consumer flaws in protecting their information Explain what can be done to protect oneself from a data breach

What is a data breach? Literally means to “get into” someone's data Occurs because of flaw in defense Information is copied or stolen

Effects of a Data Breach Causes major problems for consumers Information can be used years after attack occurs Affects consumers trust in a company

Why Companies Get Breached Companies can get breached for many reasons – Not realizing the importance of defending information – Not hiring a cybersecurity director, Target – Losing cybersecurity staff to other companies, JPMorgan Chase – Not getting defense systems because the cost is too great

Consumer Issues in Defending Information One major consumer problem is awareness “I am aware of the recent credit card breaches at Target and Home Depot.”

Another issue with consumers is responsibility “I feel it is the credit card company’s job to defend my private/credit card information.”

What Can You Do? Become educated about data breaches Defend yourself if companies cannot – Change you passwords for credit card accounts regularly – Don’t use the same password for everything – Check you credit card bill, especially after a data breach

Final Product A movie – Help educate young people entering the world of credit cards – Shown in several classes throughout the school – Help to raise awareness of this rising problem

This is Not a Call to Panic This is a Call to Action We are the generation that will have to deal with this issue Do not have to be the most secure person in the world Hackers target the least defended

Works Cited Center for Strategic and International Studies. “The Economic Impact of Cybercrime and Cyberespionage.” July, PDF File. Donohue, Brian. "Cyberattacks Most Imminent Threat to U.S., Economy." Threat Post. Kaspersky Labs, 28 Oct Web. 1 Dec Douglas, Danielle, and Craig Timberg. "Target Breach Could Represent Leading Edge of Wave of Serious Cybercrime." The Washington Post. Washington Post, 9 Feb Web. 7 Oct Gillils. "From Thin Air – Security in Complex Systems." MIT Geospatial Data Center. MIT, 21 Nov Web. 18 Sept Peterson, Andrea, and Craig Timberg. "Stop Worrying about Mastermind Hackers. Start Worrying about the IT Guy." Washington Post [Washington D.C.] 17 Oct. 2014: n. pag. The Washington Post. Web. 19 Oct Robertson, Jordan. "Internet Security." Bloomberg Quicktake. Bloomberg L.P., 28 Aug Web. 8 Dec Roman, Jeffrey. "Chase Ramps Up Security: Is It Enough?" Bank Info Security. Information Security Media Group, 15 Apr Web. 12 Jan Silver-Greenberg, Jessica, Matthew Goldstein, and Nicole Perlroth. "JPMorgan Chase Hacking Affects 76 Million Households." New York Times [New York] 2 Oct. 2014: n. pag. The New York Times. Web. 4 Dec "Target Names Brad Maiorino Senior Vice President, Chief Information Security Officer." Target. Target Brands, 10 June Web. 12 Jan United States. Department of Defense. Defending a New Domain. Washington: GPO. US Department of Defense Web. 2 Oct Vaas, Lisa. "Target CIO Beth Jacob Resigns in Breach Aftermath." Naked Security 6 Mar. 2014: n. pag. Naked Security. Web. 12 Jan