Cyber security awareness
Upcoming SlideShare
Loading in...5

Cyber security awareness






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Cyber security awareness Cyber security awareness Presentation Transcript

  • Cybersecurity Awareness Robin Rafique
  • Cyber security Topics • Cyber and the Internet are critical in helping us day-to-day activities, from communicating via email to gathering information via the Internet • There are four cybersecurity topics that should help you . • Identity Theft • Fraud and Phishing • Cyber Bullying and Ethics • Cyber Predators • Robin Rafique
  • Identity Theft • Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit • Identity theft can happen to anyone in any location across the country – 8.1 million were victims of identity theft in 2010* – Take simple steps to protect your online identity, such as: – Locking and password protecting your computer and cell phone – Not sharing specific personal information online, such as your full name or birthday – Setting proper privacy settings on social networking sites Robin Rafique
  • Crime in the Modern World  Massive amount of data: • 247 billion email per day • 234 million websites • 5 billion mobile-phone users  ICT Infrastructures: • Complex,rapidly growing • Dynamically changing • Hostile,adversary environment  Cyber crime: • One million victims daily • Expected losses 297 • Billion Euro  Ultra‐large Scale Forensic Investgations. • Situation-aware methods • Quanlified,measurable • indicators • Adaptive, self‐organizing models Distributed, cooperative,autonomo us  Rule-of-Law: • Culture,social behaviours • Legal&privacy aspects • Law as framework for ICT • Law as contents of ICT, Automation,programming of legal rules Robin Rafique
  • Fraud and Phishing • Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right • Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently • Fraud and phishing attacks may take the form of an authentic- looking website or a personalized email – In April 2011, a phishing scam targeted the Department of Energy’s Oak Ridge Laboratory facility, shutting down email and Internet access* – Secure yourself from fraud and phishing attacks by: – Working with your peers to identify and deal with phishing attacks – Educating your family and friends about the types of phishing scams and what they can do to protect themselves Robin Rafique
  • Cyber Bullying and Ethics • Cyber bullying is the electronic posting of mean-spirited messages about a person, often done anonymously • Cyber ethics help Internet users understand what type of online behavior is right and wrong • Cyber bullying and poor cyber ethics are threats many teens and young adults face not from strangers, but from their own peers • Whatever anyone posts online about another person can be spread virally, resulting in serious, unwarranted damage to an individual’s reputation or personal well-being • Avoid being a cyber bully and practice good cyber ethics by: – Following the “golden rule” online and in real life – be nice – Not saying or doing anything online that you wouldn’t do in person – Owning what you say and do online Robin Rafique
  • Cyber Predators • Cyber predators are people who search online for other people in order to use, control, or harm them in some way • Cyber predators target teens and young adults – both male and female – on a regular basis, regardless of whether or not the victims are 18 or above • Social networking sites enhance a predator’s ability to target young Americans, especially if they share personal information in your profile – 91% of young adults say they are social networking “friends” with people they don’t know well* – You never know who is behind the screen, so protect yourself and your personal information – If you are being targeted or harassed online, you should notify your family or the proper authorities Robin Rafique
  • Chatting with Kids About Being Online Tips • Have regular conversations about using the Internet. • Talk to kids about online manners. • Ask kids who they are in touch with online and what sites they visit. • Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online. • Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours. Robin Rafique
  • Tips DO • Stop before you post something and think about how you will feel if your family, teachers, neighbors or coaches see it. • Limit your online friends to people you actually know. • Speak up if you feel uncomfortable or threated by something you see online. DON’T • Reply to text, email or pop up messages that ask you for personal information. • Open attachments or click on links that are suspicious or come from strangers. • Stand for bullying – online or off. • Post videos or photos of someone without their approval. Robin Rafique
  • Thank you RobinRafique