Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Ashlee Parton, Kimmy McCoy, & Labdhi Shah

Similar presentations


Presentation on theme: "By Ashlee Parton, Kimmy McCoy, & Labdhi Shah"— Presentation transcript:

1 By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Cyber Security By Ashlee Parton, Kimmy McCoy, & Labdhi Shah

2 How Does Hacking Work? Hacking is a waiting game
Hackers are like fisherman A source of entry provides opportunity Once a firewall is penetrated, the rest is history

3 Types of Hacking IP spoofing – using a fabricated IP address to gain entry into a computer system Web spoofing – Use of a false website to lure users in Spamming – unsolicited messages sent to numerous people Skimming - swiping a debit/credit card through a device that transfers the information directly to the attached computer

4 Types of Hacking Phishing – providing people with enticing information that will aid in the hacker obtaining easy access to valuable information Pharming – A more technologically advanced form of phising. Stolen identity is not always committed by a hacker

5 The Real Security Threat
We are our own worst enemy Not everyone is a target, but everyone is under attack Cyber security is essential and extremely valuable

6 Prevention Protection methods: Configure privacy and security settings
Keep software and operating systems updated Use strong passwords Be cautious of links and attachments

7 STRONG P@$$\/\/0RD$ Strongest form of protection User authentication
Username Password Ex) Pipeline and D2L

8 Threats to Password Security
Weak passwords Vulnerable passwords Heartbleed bug Problems with apps

9 Strengthen Passwords Avoid recycled passwords Password syntax
Password confidentiality Honey words Biometrics

10 Consequences Target became a prey of security breach in 2013.
POS system was infected with malware which was automatically downloaded from hackers computer. Hackers stole personal information from up to 40 million credit and debit cards of shoppers who visited its stores. Customers were angry and furious. Target lost loyal customers.

11 Conclusion Security breach is one of the fastest growing crime in USA.
It is increasing with increasing use of information technology.

12 On an average 19,000 identities are stolen everyday.
Costs $40,000 to $92,000 per victim around the world. In USA, average cost is $10,200/institution and $1,180/ person.

13 Despite of the rapidly growing crime rate, limited steps are being taken to protect security theft and legitimately protect personal information from being leaked.

14 Recommendation: Prevention is better than cure.
Increase awareness among consumers regarding security breach. Use strong passwords and keep multiple layers of security in your computer. Banking institutions should focus on informing their customers about monitoring accounts for fraudulent activity.


Download ppt "By Ashlee Parton, Kimmy McCoy, & Labdhi Shah"

Similar presentations


Ads by Google