Cyber Security | Patricia Watson


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber Security | Patricia Watson

  1. 1. Cyber Security Patricia Watson Digital Forensics Program Manager March 2013
  2. 2. Overview  Cyber Security “Buzz Words”  Digital Crimes  Web Surfing  Identity Theft  Social Networking  Protect your IP  Conclusion  Appendix – List of Handy Sources
  3. 3. Cyber Security “Buzz Words”  Malware: Malicious software designed to secretly access a computer system without the owner's informed consent, includes: ◊ Computer viruses ◊ Worms ◊ Trojans ◊ Spyware ◊ Adware ◊ Scareware ◊ Malvertising ◊ Rootkits Source: Wikipedia
  4. 4. A few more terms…  Social Engineering: is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.  Pretexting: is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.  Phishing: Phishing is a criminal mechanism employing both social engineering and technical tactic to steal consumers’ personal identity and financial account credentials.  Smishing: a combination of SMS texting and phishing.  Vishing: a combination of voice and phishing (target cell and land-line phones). Source: Wikipedia
  5. 5. Digital Crimes  Theft of intellectual property  Fraud  Insider threat  Malware  Remote attacks  Crimes against Children  The Internet Crime Complaint Center (IC3) reported that there were over 314,000 cyber crimes reported in 2011. Source – IC3
  6. 6. Web Surfing The next time you surf the Internet, consider this:  Two-thirds (65 percent) of Internet users globally have fallen victim to cybercrimes, including online credit-card fraud, identity theft and computer viruses.  Buyer beware…safe web browsing is the responsibility of the user NOT the web site provider.  Do not fall victim to social engineering, phishing, vishing and or inadvertent download of malware. Source - Computer Crime Research Center
  7. 7. Identify Theft  11.1 million adults were victims of identity theft in 2009  The total fraud amount was $54 billion  The average victim spent 21 hours and $373 out of pocket resolving the crime  4.8% of the population was a victim of identity fraud in 2009  13% of identity fraud crimes were committed by someone the victim knew Source: Javelin Strategy & Research
  8. 8. Social Networking Are you sharing too much:  42% of the people on Facebook post their full birth dates  16% post their children's names  63% post photos of themselves  7% reveal their home addresses  The number of U.S. households that use social networks has doubled in the past year. Source:
  9. 9. Protect Your Intellectual Property  Passwords ◊ Do not use the same password for all accounts  Upgrades & Patching  Anti-Virus, Firewalls & Encryption  Wi-Fi Security ◊ Open networks are unprotected  Email Attachments  Buyer beware…“Free” Downloads ◊ Research a company's reputation before downloading its software or visiting its website Source:
  10. 10. Protect Your Intellectual Property  Do not respond to unsolicited e-mails, text messages or automated voice messages  When buying online, use a legitimate payment service  Check each seller’s rating and feedback along with the dates the feedback was posted.  Do not post information that could put you at risk of being targeted by cybercriminals Source: FBI
  11. 11. Conclusion Awareness is key – security starts with YOU!
  12. 12. Appendix – Handy Sources  Internet Crime Complaint Center:  Safety On Line:  FBI Cyber Crime: index/cyber-crimes  Home Network Security:  Freedom of Information Act:  Short film - The Dawn of the Net: