Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Education is the Key to Fighting Cyber Crime

7,521 views

Published on

Cyber crime has become one of the most prominent forms of crime throughout the United States, and the world. How can you protect yourself from becoming the latest victim of a cyber attack? Education.

Published in: Software
  • Be the first to comment

Education is the Key to Fighting Cyber Crime

  1. 1. To Fighting Cyber Crime Education Is The Key
  2. 2. Brought to you by:
  3. 3. Click this icon to tweet information from each slide
  4. 4. Basic Security Terms Secure Socket Layer (SSL) This is a secure protocol developed to send information securely over the Internet. Usually used for securing login information. Distributed Denial of Service attack (DDoS) Several systems are coordinated to flood a specific server with a stream of requests at the same time. This can lead to a slow response time on the server, or even no response at all. Botnet Several computers that have been infected with malware and are controlled from a single source, usually without the computer’s owner even realizing it. Botnets can be used to spread viruses, send e-mail spam, crash Web servers with a denial of service attack.
  5. 5. What Is Malware? Malware Software that is created with the intention of damaging a computer, mobile device, computer system, or computer network, or to take partial control over its operation. The name is short for“malicious software.”
  6. 6. Recent Security Attacks Heartbleed A vulnerability in the OpenSSL cryptographic software library that could be exploited to gather login information such as usernames, passwords, account numbers, and other personal and financial information. eBay Hack In May of 2014, eBay revealed that hackers had stolen the personal information of more than 230 million users, including usernames, passwords, phone numbers, and physical addresses. Sony and Target Security Breach The Sony Pictures security breach from late November 2014, and the Target hack from December 2013, are two more high-profile cybercrimes among many others. A study of 60 companies conducted by the Ponemon Institute concluded that the average number of successful attacks experienced by the 60 companies they examined, was two per week, or 104 annually. Cybercrime victims from that report sustained losses averaging $11.6 million. e ay
  7. 7. Common Security Issues Phishing Cyber criminals sending out emails that appear to come from legitimate websites, but actually contain links to false websites designed to steal usernames, passwords, and financial information. Trojan Horse This is a type of program that masquerades as a regular, harmless program; however, if you run these programs, they can do malicious things to your computer, such as write over or delete parts of your hard drive and corrupt your data. Malvertising When attackers embed malicious code into legitimate advertising links, causing those links to then infiltrate malware into the computers of unsuspecting users.
  8. 8. Best Security Practices Use strong passwords and change them regularly Keep your passwords at least 8 characters long, use uppercase and lowercase letters, numbers, and special characters. Install and maintain anti-virus software Never click on suspicious links or URLs
  9. 9. Proper protection for web browsing is three layers deep 1. anti-malware (anti-virus) 2. spyware protection 3. URL filtering (aka web protection — like Blue Coat's K9) Most people only run anti-malware, which isn't enough in today's risk laden web world
  10. 10. Cyber crime is one of the most popular forms of crime today Ponemon Institute studies 60 companies in 2013 The report they published in 2014 revealed an average number of two cyber-attacks per week. That pace amounts to over 100 attacks per year
  11. 11. Be careful what you click Don’t click suspicious links Never click on links unless you are absolutely certain you know their source. Verify that the underlying link to a URL is actually the same as the depicted URL — and that the underlying URL is actually where you want to go on the Web. Beware of phishing emails Phishing emails typically hide the actual URL by displaying a different URL than where the link actually takes you. Avoid unfamiliar senders Don’t click on emails that are from unfamiliar senders, and if a random link arrives from a friend’s email account, verify that they have not been hacked before clicking through it. Mobile devices are especially vulnerable to this because they can't show the underlying URL. Bad Links ?
  12. 12. Brought to you by: SOURCES: http://heartbleed.com http://www.techterms.com http://www.dhs.gov/cybersecurity-tips http://dictionary.reference.com/browse/malware http://www.healthit.gov/providers-professionals/cybersecurity http://www.proofpoint.com/products/targeted-attack-protection/malvertising-protection.php https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888 http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-cyber-attacks-of-2014-so-far http://www.forbes.com/sites/maggiemcgrath/2014/01/10/taget-data-breach-spilled-info-on-as-many-as-70-million-customers

×