Download presentation
Presentation is loading. Please wait.
Published byLuke Allison Modified over 9 years ago
1
Staying Safe in Cyberspace
2
What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat Instant messaging/chat Social networking/blogging Social networking/blogging
3
What are the dangers? Malicious attachments Malicious attachments Malicious websites Malicious websites Phishing/fraudulent e-mails Phishing/fraudulent e-mails Merchants with weak security Merchants with weak security Search results (yes, really!) Search results (yes, really!)
4
Now what? Does all this bad stuff mean you should give up on the web? Does all this bad stuff mean you should give up on the web? NO WAY!
5
Get online! Stay connected with family Stay connected with family Communicate with friends Communicate with friends Keep up on current events Keep up on current events Plan vacations Plan vacations What else? What else?
6
E-mail security: Phishing Phishing/vishing messages Phishing/vishing messages –Use scare tactics/threats –May “borrow” graphics to look more real –May use poor English –Ask for info the business already has –May be multi-pronged
7
E-mail security: 419 Scams “I am a descendant of royalty…” “I am a descendant of royalty…” –Most common is “fund transfer” scam –Request bank account numbers –May also request fees to cover transaction –Never, EVER respond!
8
E-mail security: Malicious attachments Bad guys use e-mail to spread malware Bad guys use e-mail to spread malware –Beware of unsolicited attachments –Use an e-mail provider that scans attachments –Keep your antivirus software up to date
9
E-mail security: Malicious links Bad guys know we’re getting wise to attachments–they entice you to click links instead Bad guys know we’re getting wise to attachments–they entice you to click links instead –Adult content –Breaking news –Shocking video
10
E-mail security: Malicious links
11
Instant messaging Do you use chat? Do you use chat? –Only accept chat requests from people you know –Don’t click unsolicited links –Don’t accept unsolicited file transfers
12
Social Networking and Blogging Facebook, MySpace, LinkedIn, etc… Facebook, MySpace, LinkedIn, etc… –Understand and use privacy settings –Only “friend” people you know –Information posted here makes you a more public person!
13
What can I do? Want to know a secret? Want to know a secret? –You don’t need to be a geek to stay safe online!
14
What can I do? Be skeptical and ask questions! Be skeptical and ask questions! –Did I really win a foreign lottery? –Does my bank need to be reminded of my account number? –Will the software in that ad really make my computer faster if I click “OK?”
15
My favorite things… (Just like Oprah, but without the flattering lighting!) Surf Safer—use Firefox! Surf Safer—use Firefox! –Consider moving away from Internet Explorer
16
Surf Safer Use a phishing filter! Use a phishing filter! –McAfee SiteAdvisor (free) –Rates search results –Prevents you from visiting known-bad websites
17
Shop Safer When using a credit card online, always look for: When using a credit card online, always look for: –https:// –Closed padlock Your CC# is encrypted in transit Your CC# is encrypted in transit
18
E-mail Safer Choose a good e-mail provider! Choose a good e-mail provider! –Is your e-mail scanned for viruses? –Will it attempt to alert you about phishing? Ask around—what e-mail providers do trusted friends use? Ask around—what e-mail providers do trusted friends use? –Are they generally happy? –Do they get a lot of spam?
19
E-mail safer No e-mail provider is perfect! No e-mail provider is perfect! –Unfortunately, they all get spam
20
E-mail safer Cast a wary eye upon e-mail messages Cast a wary eye upon e-mail messages –Don’t be afraid to call your bank, ISP, or other businesses about phishing messages
21
Handling phishing messages Don’t: Don’t: –Call any provided number –Reply to them via e-mail –Click any links or fill out any forms
22
Handling phishing messages Do… Do… –Call your bank on a known-good number Known-good: from the back of your card or bank statement Known-good: from the back of your card or bank statement –Report the message to your e-mail provider –Report the message to the FTC Forward to uce@ftc.gov Forward to uce@ftc.gov
23
Other types of fraud… Many types of fraud started offline but found new life on the Internet Many types of fraud started offline but found new life on the Internet –Phone scams –Check scams –Text message scams
24
Phone scams—”vishing” Register with the National Do Not Call registry Register with the National Do Not Call registry –https://www.donotcall.gov/ https://www.donotcall.gov/ –Scammers will not honor this list! –Remain on guard, report scam calls to the FTC: 1-888-FTC-HELP
25
Check scams Arrive in “snail mail,” and may include: Arrive in “snail mail,” and may include: –Foreign business offers –Rental schemes –Overpayments –Sudden riches Get more info on check scams at http://www.fakechecks.org Get more info on check scams at http://www.fakechecks.org
26
Text message scams Do you have a mobile phone? Do you have a mobile phone? Do you use it for text messaging? Do you use it for text messaging? –Even if you don’t, scammers can still send messages to your phone –Disable text service if you don’t use it –NEVER respond to an unsolicited text message
27
In conclusion… It’s not possible or necessary to know about every threat It’s not possible or necessary to know about every threat Remain skeptical Remain skeptical Continue learning Continue learning Ask questions! Ask questions!
28
More information Be SeKUre blog Be SeKUre blog –http://www.besekure.ku.edu http://www.besekure.ku.edu Security workshops Security workshops –http://www2.ku.edu/~workshops http://www2.ku.edu/~workshops Be SeKUre on Twitter Be SeKUre on Twitter –http://twitter.com/beseKUre
29
Contact me! Julie C. Fugett, CISSP, CCE Information Security Analyst The University of Kansas jcf@ku.edu
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.