Your SlideShare is downloading. ×
Cyber security awareness
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber security awareness


Published on

General Overview of cyber security for educational environment

General Overview of cyber security for educational environment

Published in: Education, Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Cyber Security AwarenessJason MurrayTechTalk LiveMay 7, 2013
  • 2. Goals• Promote cyber security awareness• Offer self-protection techniques• Discuss methods to secure personal information• Provide examples of protection software
  • 3.
  • 4. 0%2%4%6%8%10%12%14%Concerns● Symantec blocked 5.5 billion malware attacks last year– 81% increase over the previous year (● Kaspersky detecting 200,000 new/variant malwares per day ( Industry Rate1 Education 146%2 Retail & wholesale 104%3 Health Care 100%4 Banking & Finance 69%5 Food & Beverage 58%6 Government 46%January Malware EncountersSource:CiscoRatesabove100%reflecthigherthanmedianrateofencounterUnited States 11.52%Japan 3.47%Colombia 2.53%Source:FortinetFrance 1.87%Canada 1.74%Received Spam (Top 5 Regions)
  • 5. SC Magazine●● eBook
  • 6. FortiGuard Center●● Live Threat Monitor
  • 7. Valuable Content• Identity• SSN• Demographics• Credit Cards• Bank accounts• Intellectual Property• Business plans• Innovational ideas• Marketing campaigns• Thoughts
  • 8. Vulnerabilities• Computers• Networks• Systems• Game consoles• Phones• Houses• Cars• GPS systems
  • 9. Greatest Threat• Users
  • 10. Security Threats• Social Engineering– Facebook– Twitter– LinkedIn
  • 11. Security Threats• PhishingSource: APWG
  • 12. Security Threats• PhishingFrom: MICHELLE REILLY []Sent: Monday, January 28, 2013 11:21 PMTo: employee-web@webmaster.orgSubject: Important Technical Web Notice!Important Technical Web Notice!Your mailbox has exceeded one or more size limits set by theadministrator. You may not be able to send or receive new messagesuntil the mailbox size is reduced. For more space, please CLICK HERE<> to upgrade your webmail account.The new secure feature upgrades your inbox to a clean, modern lookwhile maintaining your contacts, passwords, aliases and more. Its fast.Its intuitive. Its email at its best.Thank you for your cooperation.Information and Technology DESKTHE MAIL TEAM.
  • 13. Security Threats• Malware– Viruses● Trojans● Worms● rootkits– Spyware● Ransomware● Adware● keyloggers
  • 14. Trojan Horse
  • 15. Security Threats• Man in the Middle Attack• Eavesdropping• Beware of free WiFi• KARMA
  • 16. Security Threats• Computer/Flash drive Theft
  • 17. Security Threats• Script Kiddies– YouTube– Google
  • 18. Passwords•• Avoidance• Personal information• Facebook• 2 step verification• Best Practice
  • 19. Penetration Testing• Blackbuntu• BackTrack• Metasploit
  • 20. Additional Tools• Hiren’s Boot Disk• Nmap & ZenMap• Cain & Abel• Nessus• AirCrack-ng
  • 21. Communication Security• Secure Instant Message• Pidgin• Pidgin OTR Plugin• Prevents eavesdropping
  • 22. Communication Security• Anonymization• Hides the true Internet address• Masks the geographical location• Circumvents online tracking technologies• Software• Tor• Bounces on a network of relays
  • 23. Communication Security• HTTP vs HTTPS• Encryption• HTTPS• Designed to withstand eavesdropping• Subject to decryption by SSL stripping tools• Wireshark with SSL decryption support• HTTPS Everywhere• FireFox plugin• Chrome plugin
  • 24. Website Vulnerabilities• Hacked websites• Hacked advertisements• Cookies• Tracking• Injections• Malware• Redirection
  • 25. Communication Security• CyberGhost VPN• Hotspot Shield• SpotFlux
  • 26. Mobile SecurityAndroid; 69%iOS; 19%Blackberry; 5%Symbian; 3%Windows; 3% Others; 2%Android iOS Blackberry Symbian Windows OthersSource: IDC Worldwide Mobile Phone Tracker, February 14, 2013
  • 27. Mobile Defense• Lock passwords• Device encryption• Tracking software• Disable WiFi & Bluetooth when not in use• Antivirus software• Remote wipe
  • 28. Android• Lookout (tracking)• Prey (tracking)• WhisperCore (disk encryption)• RedPhone (conversation encryption)• TextSecure (text encryption)• Gibberbot (messaging encryption)Source:
  • 29. Summary
  • 30. Resources• NEK Cyber Operations•• IDC World Mobile Phone Tracker• APWG• Wireless Defense• SC magazine• SC education security ebook• Fortiguard