1 / 37

Cyber Security

Cyber Security. How to keep the bad guys out and your data safe. By the end of this presentation, you should be able to:. Name five ways that cyberthieves try to steal your data List five different types of computer viruses List steps you must take to keep your computer safe.

lewiss
Download Presentation

Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security How to keep the bad guys out and your data safe

  2. By the end of this presentation, you should be able to: • Name five ways that cyberthieves try to steal your data • List five different types of computer viruses • List steps you must take to keep your computer safe

  3. Cyber Crime is costly Accenture: Cybercrime to cost U.S. companies $5.2 trillion by 2024

  4. Five Ways the Bad Guys Try to Steal Your Data • Phishing • Malware • Malicious Mobile Apps • Physical Security Threats • Unsecured Networks

  5. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

  6. How They Steal Your Data • Links may lead to fake web sites that look legitimate, but aren’t • The fake websites ask for information such as username, password, account numbers, etc.

  7. How to Stay Safe • Look for obvious flaws in the email • Typos • Grammatical errors • Look at the sender’s email • Is something just not right….gmall instead of gmail? • When is doubt, don’t open it!

  8. A True Story

  9. Malware

  10. What Is Malware? “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.

  11. Types of Malware Virus – A program capable of infecting a computer environment, disabling its core functionality, making files inaccessible, and replicating itself.

  12. Types of Malware Trojan – Trojan or Trojan horse is a type of computer software that is camouflaged in the form of regular software. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

  13. Types of Malware Spyware – As the name implies, this is software that "spies" on your computer. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

  14. Types of Malware Keylogger – a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

  15. Types of Malware Ransomeware – a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

  16. How to Stay Safe • Install anti-virus software and keep it up-to-date • Regularly scan your computer for malware • Neverever allow someone to install pirated software on your computer • Keep your operating system up to date • Use “two factor identification” to verify anything sent by email

  17. Malicious Mobile Apps

  18. What Are Malicious Mobile Apps? They are the same as Malware but for your smartphone. They include: • Viruses • Trojan Horses • Links to Phishing sites • Spyware and/or key loggers

  19. How to Stay Safe • Install anti-virus software on your phone and keep it up-to-date • Regularly scan your phone for malware • Neverever install pirated software on your phone • Neverever install software from third-party app stores • Keep your operating system up to date

  20. Physical Security Threats

  21. What Is Physical Threat? A physical threat occurs whenever an unauthorized person has access to any of your devices or information left out in the open.

  22. How to Stay Safe • Physically lock the computer to your desk • Password protect your device • Change the password frequently and make it a strong password • Never leave confidential information out where it can be seen • Always back up your data and test to see that you can retrieve it • Enable remote wipe services incase your device is lost or stolen

  23. Unsecured Networks

  24. What Is an Unsecured Network? An Unsecured Network is one that uses no encryption to connect to the internet. Unsecured networks provide an opportunity for malware to be placed on your device, or at the least, to have your on-line activities intercepted.

  25. How to Stay Safe • DON’T USE PUBLIC WIFI…..EVER!! • Use tools to create your own “hotspot” to access the internet when a secure network is unavailable • Use encryption services like WiFi Protected Accesses 2 (WPA2) and a strong password

  26. A Cautionary Tale

  27. The “NotPetya” Attack of 2017 • Originated by an attack of Russian State-Sponsored Hackers attacking computer servers in Ukraine • The attack utilized two pieces of stolen software (one developed by the National Security Agency) that exploited a vulnerability in a Windows protocol

  28. The “NotPetya” Attack of 2017 • The attack spread from Ukraine to computer networks world-wide • It mimicked ransomeware but it’s purpose was to encrypt the boot records of computers making it impossible to find their operating system • This was an act of cyberwarfare

  29. The “NotPetya” Attack of 2017 • Maersk Shipping Lines was paralyzed by the attack • They operate 76 ports globally • They operate 800 sea-going container ships • The attack shut down the ports and disrupted supply chains globally

  30. The “NotPetya” Attack of 2017 The estimated total damage of the attack $10 Billion Dollars

  31. The Lesson to be Learned We are at war and we are all in the fight.

  32. Questions?

More Related