Cyber crime has become one of the most prominent forms of crime throughout the United States, and the world. How can you protect yourself from becoming the latest victim of a cyber attack? Education.
4. Basic Security Terms
Secure Socket Layer (SSL)
This is a secure protocol developed to send information securely
over the Internet. Usually used for securing login information.
Distributed Denial of Service attack (DDoS)
Several systems are coordinated to flood a specific server
with a stream of requests at the same time. This can lead to a
slow response time on the server, or even no response at all.
Botnet
Several computers that have been infected with malware
and are controlled from a single source, usually without the
computer’s owner even realizing it. Botnets can be used to
spread viruses, send e-mail spam, crash Web servers with a
denial of service attack.
5. What Is Malware?
Malware
Software that is created with the intention
of damaging a computer, mobile device,
computer system, or computer network,
or to take partial control over its operation.
The name is short for“malicious software.”
6. Recent Security Attacks
Heartbleed
A vulnerability in the OpenSSL cryptographic software library that could be
exploited to gather login information such as usernames, passwords, account
numbers, and other personal and financial information.
eBay Hack
In May of 2014, eBay revealed that hackers had stolen the personal
information of more than 230 million users, including usernames, passwords,
phone numbers, and physical addresses.
Sony and Target Security Breach
The Sony Pictures security breach from late November 2014, and the Target
hack from December 2013, are two more high-profile cybercrimes among
many others. A study of 60 companies conducted by the Ponemon Institute
concluded that the average number of successful attacks experienced by the
60 companies they examined, was two per week, or 104 annually. Cybercrime
victims from that report sustained losses averaging $11.6 million.
e ay
7. Common Security Issues
Phishing
Cyber criminals sending out emails that appear to come from
legitimate websites, but actually contain links to false websites
designed to steal usernames, passwords, and financial information.
Trojan Horse
This is a type of program that masquerades as a regular,
harmless program; however, if you run these programs, they
can do malicious things to your computer, such as write over
or delete parts of your hard drive and corrupt your data.
Malvertising
When attackers embed malicious code into legitimate
advertising links, causing those links to then infiltrate
malware into the computers of unsuspecting users.
8. Best Security Practices
Use strong passwords
and change them regularly
Keep your passwords at least 8
characters long, use uppercase
and lowercase letters, numbers,
and special characters.
Install and maintain
anti-virus software
Never click on
suspicious links or URLs
9. Proper protection for web
browsing is three layers deep
1. anti-malware (anti-virus)
2. spyware protection
3. URL filtering (aka web protection — like Blue Coat's K9)
Most people only run anti-malware, which
isn't enough in today's risk laden web world
10. Cyber crime is one of the most popular forms of crime today
Ponemon Institute studies
60 companies in 2013
The report they published in 2014
revealed an average number of
two cyber-attacks per week.
That pace amounts to
over 100 attacks per year
11. Be careful what you click
Don’t click suspicious links
Never click on links unless you are absolutely certain you know
their source. Verify that the underlying link to a URL is actually the
same as the depicted URL — and that the underlying URL is
actually where you want to go on the Web.
Beware of phishing emails
Phishing emails typically hide the actual URL by displaying a
different URL than where the link actually takes you.
Avoid unfamiliar senders
Don’t click on emails that are from unfamiliar senders, and if
a random link arrives from a friend’s email account, verify
that they have not been hacked before clicking through it.
Mobile devices are especially vulnerable to this because
they can't show the underlying URL.
Bad Links
?
12. Brought to you by:
SOURCES:
http://heartbleed.com
http://www.techterms.com
http://www.dhs.gov/cybersecurity-tips
http://dictionary.reference.com/browse/malware
http://www.healthit.gov/providers-professionals/cybersecurity
http://www.proofpoint.com/products/targeted-attack-protection/malvertising-protection.php
https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888
http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-cyber-attacks-of-2014-so-far
http://www.forbes.com/sites/maggiemcgrath/2014/01/10/taget-data-breach-spilled-info-on-as-many-as-70-million-customers