Presentation is loading. Please wait.

Presentation is loading. Please wait.

Staying Safe in Cyberspace. What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat.

Similar presentations


Presentation on theme: "Staying Safe in Cyberspace. What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat."— Presentation transcript:

1 Staying Safe in Cyberspace

2 What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat Instant messaging/chat Social networking/blogging Social networking/blogging

3 What are the dangers? Malicious attachments Malicious attachments Malicious websites Malicious websites Phishing/fraudulent e-mails Phishing/fraudulent e-mails Merchants with weak security Merchants with weak security Search results (yes, really!) Search results (yes, really!)

4 Now what? Does all this bad stuff mean you should give up on the web? Does all this bad stuff mean you should give up on the web? NO WAY!

5 Get online! Stay connected with family Stay connected with family Communicate with friends Communicate with friends Keep up on current events Keep up on current events Plan vacations Plan vacations What else? What else?

6 E-mail security: Phishing Phishing/vishing messages Phishing/vishing messages –Use scare tactics/threats –May “borrow” graphics to look more real –May use poor English –Ask for info the business already has –May be multi-pronged

7 E-mail security: 419 Scams “I am a descendant of royalty…” “I am a descendant of royalty…” –Most common is “fund transfer” scam –Request bank account numbers –May also request fees to cover transaction –Never, EVER respond!

8 E-mail security: Malicious attachments Bad guys use e-mail to spread malware Bad guys use e-mail to spread malware –Beware of unsolicited attachments –Use an e-mail provider that scans attachments –Keep your antivirus software up to date

9 E-mail security: Malicious links Bad guys know we’re getting wise to attachments–they entice you to click links instead Bad guys know we’re getting wise to attachments–they entice you to click links instead –Adult content –Breaking news –Shocking video

10 E-mail security: Malicious links

11 Instant messaging Do you use chat? Do you use chat? –Only accept chat requests from people you know –Don’t click unsolicited links –Don’t accept unsolicited file transfers

12 Social Networking and Blogging Facebook, MySpace, LinkedIn, etc… Facebook, MySpace, LinkedIn, etc… –Understand and use privacy settings –Only “friend” people you know –Information posted here makes you a more public person!

13 What can I do? Want to know a secret? Want to know a secret? –You don’t need to be a geek to stay safe online!

14 What can I do? Be skeptical and ask questions! Be skeptical and ask questions! –Did I really win a foreign lottery? –Does my bank need to be reminded of my account number? –Will the software in that ad really make my computer faster if I click “OK?”

15 My favorite things… (Just like Oprah, but without the flattering lighting!) Surf Safer—use Firefox! Surf Safer—use Firefox! –Consider moving away from Internet Explorer

16 Surf Safer Use a phishing filter! Use a phishing filter! –McAfee SiteAdvisor (free) –Rates search results –Prevents you from visiting known-bad websites

17 Shop Safer When using a credit card online, always look for: When using a credit card online, always look for: –https:// –Closed padlock Your CC# is encrypted in transit Your CC# is encrypted in transit

18 E-mail Safer Choose a good e-mail provider! Choose a good e-mail provider! –Is your e-mail scanned for viruses? –Will it attempt to alert you about phishing? Ask around—what e-mail providers do trusted friends use? Ask around—what e-mail providers do trusted friends use? –Are they generally happy? –Do they get a lot of spam?

19 E-mail safer No e-mail provider is perfect! No e-mail provider is perfect! –Unfortunately, they all get spam

20 E-mail safer Cast a wary eye upon e-mail messages Cast a wary eye upon e-mail messages –Don’t be afraid to call your bank, ISP, or other businesses about phishing messages

21 Handling phishing messages Don’t: Don’t: –Call any provided number –Reply to them via e-mail –Click any links or fill out any forms

22 Handling phishing messages Do… Do… –Call your bank on a known-good number Known-good: from the back of your card or bank statement Known-good: from the back of your card or bank statement –Report the message to your e-mail provider –Report the message to the FTC Forward to uce@ftc.gov Forward to uce@ftc.gov

23 Other types of fraud… Many types of fraud started offline but found new life on the Internet Many types of fraud started offline but found new life on the Internet –Phone scams –Check scams –Text message scams

24 Phone scams—”vishing” Register with the National Do Not Call registry Register with the National Do Not Call registry –https://www.donotcall.gov/ https://www.donotcall.gov/ –Scammers will not honor this list! –Remain on guard, report scam calls to the FTC: 1-888-FTC-HELP

25 Check scams Arrive in “snail mail,” and may include: Arrive in “snail mail,” and may include: –Foreign business offers –Rental schemes –Overpayments –Sudden riches Get more info on check scams at http://www.fakechecks.org Get more info on check scams at http://www.fakechecks.org

26 Text message scams Do you have a mobile phone? Do you have a mobile phone? Do you use it for text messaging? Do you use it for text messaging? –Even if you don’t, scammers can still send messages to your phone –Disable text service if you don’t use it –NEVER respond to an unsolicited text message

27 In conclusion… It’s not possible or necessary to know about every threat It’s not possible or necessary to know about every threat Remain skeptical Remain skeptical Continue learning Continue learning Ask questions! Ask questions!

28 More information Be SeKUre blog Be SeKUre blog –http://www.besekure.ku.edu http://www.besekure.ku.edu Security workshops Security workshops –http://www2.ku.edu/~workshops http://www2.ku.edu/~workshops Be SeKUre on Twitter Be SeKUre on Twitter –http://twitter.com/beseKUre

29 Contact me! Julie C. Fugett, CISSP, CCE Information Security Analyst The University of Kansas jcf@ku.edu


Download ppt "Staying Safe in Cyberspace. What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat."

Similar presentations


Ads by Google