Cyber security awareness
Upcoming SlideShare
Loading in...5
×
 

Cyber security awareness

on

  • 152 views

 

Statistics

Views

Total Views
152
Views on SlideShare
152
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber security awareness Cyber security awareness Presentation Transcript

  • Cybersecurity Awareness Robin Rafique
  • Cyber security Topics • Cyber and the Internet are critical in helping us day-to-day activities, from communicating via email to gathering information via the Internet • There are four cybersecurity topics that should help you . • Identity Theft • Fraud and Phishing • Cyber Bullying and Ethics • Cyber Predators • Robin Rafique
  • Identity Theft • Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit • Identity theft can happen to anyone in any location across the country – 8.1 million were victims of identity theft in 2010* – Take simple steps to protect your online identity, such as: – Locking and password protecting your computer and cell phone – Not sharing specific personal information online, such as your full name or birthday – Setting proper privacy settings on social networking sites Robin Rafique
  • Crime in the Modern World  Massive amount of data: • 247 billion email per day • 234 million websites • 5 billion mobile-phone users  ICT Infrastructures: • Complex,rapidly growing • Dynamically changing • Hostile,adversary environment  Cyber crime: • One million victims daily • Expected losses 297 • Billion Euro  Ultra‐large Scale Forensic Investgations. • Situation-aware methods • Quanlified,measurable • indicators • Adaptive, self‐organizing models Distributed, cooperative,autonomo us  Rule-of-Law: • Culture,social behaviours • Legal&privacy aspects • Law as framework for ICT • Law as contents of ICT, Automation,programming of legal rules Robin Rafique
  • Fraud and Phishing • Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right • Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently • Fraud and phishing attacks may take the form of an authentic- looking website or a personalized email – In April 2011, a phishing scam targeted the Department of Energy’s Oak Ridge Laboratory facility, shutting down email and Internet access* – Secure yourself from fraud and phishing attacks by: – Working with your peers to identify and deal with phishing attacks – Educating your family and friends about the types of phishing scams and what they can do to protect themselves Robin Rafique
  • Cyber Bullying and Ethics • Cyber bullying is the electronic posting of mean-spirited messages about a person, often done anonymously • Cyber ethics help Internet users understand what type of online behavior is right and wrong • Cyber bullying and poor cyber ethics are threats many teens and young adults face not from strangers, but from their own peers • Whatever anyone posts online about another person can be spread virally, resulting in serious, unwarranted damage to an individual’s reputation or personal well-being • Avoid being a cyber bully and practice good cyber ethics by: – Following the “golden rule” online and in real life – be nice – Not saying or doing anything online that you wouldn’t do in person – Owning what you say and do online Robin Rafique
  • Cyber Predators • Cyber predators are people who search online for other people in order to use, control, or harm them in some way • Cyber predators target teens and young adults – both male and female – on a regular basis, regardless of whether or not the victims are 18 or above • Social networking sites enhance a predator’s ability to target young Americans, especially if they share personal information in your profile – 91% of young adults say they are social networking “friends” with people they don’t know well* – You never know who is behind the screen, so protect yourself and your personal information – If you are being targeted or harassed online, you should notify your family or the proper authorities Robin Rafique
  • Chatting with Kids About Being Online Tips • Have regular conversations about using the Internet. • Talk to kids about online manners. • Ask kids who they are in touch with online and what sites they visit. • Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online. • Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours. Robin Rafique
  • Tips DO • Stop before you post something and think about how you will feel if your family, teachers, neighbors or coaches see it. • Limit your online friends to people you actually know. • Speak up if you feel uncomfortable or threated by something you see online. DON’T • Reply to text, email or pop up messages that ask you for personal information. • Open attachments or click on links that are suspicious or come from strangers. • Stand for bullying – online or off. • Post videos or photos of someone without their approval. Robin Rafique
  • Thank you RobinRafique