SlideShare a Scribd company logo
1 of 23
By Margaret Kidd and Mary Rayme
IS 585, Fall 2013
1
What is
Cybercrime?
Crime committed by use of a computer.
2
• cyberbullying
• cyberstalking
• cyberwarfare
• child pornography
• extortion
• fraud
• hacking
What is Cybercrime?
3
What is Cybercrime?
• identity theft
• phishing
• phreaking
• ransomware
• spam
• theft and embezzlement
• viruses
4
What are the most
prevalent cybercrimes
in an information
environment?
5
Published child pornography arrests
in US libraries, 2011-2013
Alaska, Anchorage Loussac Public Library
California, Auburn Library
California, Foothill Ranch Public Library
California, Fresno County Public Library
California, Main Street Library, Santa Monica
Florida, Florida Atlantic University Library
Florida, Harrell Memorial Library
Florida, South East Wimberly Library
Illinois, Bloomingdale Public Library
Illinois, Orland Park Public Library
Illinois, Southwest Illinois College Library
Indiana, Lawrenceburg Library
Kentucky, Louisville Free Public Library
Maryland, Queen Anne Public Library
Michigan, Kent District Library
Missouri, Jefferson College Library
Missouri, Metropolitan Community College Library
Nevada, Western Nevada College
New Jersey, North Plainfield Library
New Jersey, Plainsboro Township Public Library
Oregon, Monroe County Public Library
South Carolina, Oconee County Library
South Dakota, Rapid City Public Library
Tennessee, First Regional Library
Tennessee, Nashville Public Library
Tulsa City-County Library, Oklahoma
West Virginia, Clay County Public Library
West Virginia, Randolph County Public Library
West Virginia, Parkersburg-Wood County Public Library
6
Other Top Cybercrimes in an
Information Environment
• stolen data/altering data
• identity theft
• info stolen over wifi
• pirated music, audiobooks, ebooks
• malware, viruses
7
Who polices cybercrime?
8
The Secret Service was the first law enforcement entity to
police cybercrime. Since then the responsibility has spread
to include:
• FBI
• CIA
• Department of Homeland Security
A Brief History of
9
1986, The Cuckoo’s Egg
1988, The Morris Worm
1994, Citibank
1998, Back Orifice
1999, The Melissa Virus
2000, Web Denied
2003, Blaster Worm & Blackout
2007, Pentagon
2007, Israel Air Defense Kill Switch
2007, Zeus Botnet
2009, China Attacks Google
2010, Stuxnet
2012, Unlimited Operation
2013, Bitcoin
2014, ?
Cybercrime Timeline
10
11
Who are cybercriminals?
1. US
2. Russia
3. Germany
4. Romania
5. Ukraine
6. Thailand
7. Vietnam
8. Netherlands
9. Lithuania
10. Ireland
From “Top 50 Bad Hosts and Networks”, HostExploits’s Worldwide Cybercrime
Series. Second Quarter, 2012 – Report.
12
Can Prevent Cybercrime!
http://en.wikipedia.org/wiki/File:Smokey3.jpg
Cyber Security Tips
for Library Staff and Users
13
• Our library users expect to have a safe
computing environment.
• To provide this we must
 Be knowledgeable about cybercrime
 Educate users
14
Some steps that libraries can
take to prevent cybercrime:
• Perform regular anti-virus and
anti-malware scans
• Use firewalls
• Block users from downloading
programs onto public computers
• Routinely evaluate and update
security measures as needed
15
• Secure browsing: Does not save browser
history, search history, download history, or
temporary internet files.
• Examples: Firefox Private Browsing & Chrome
Incognito Browsing
• Caution: Files that are downloaded and
bookmarks saved will be kept. The ISP and
employer can still track the pages you visit.
15
16
Protect and strengthen
passwords:
• Never share your passwords with
anyone.
• Have patrons use passwords to login
• Use guest passwords that are
frequently changed.
16
17
https://www.microsoft.com/security/pc-security/password-checker.aspx
• Use a password generator for strong passwords
• Example: LastPass a product to generate and manage
passwords.
• Use a password checker to evaluate password
strength.
18
Two part authentication:
 Additional layer of security using password &
verification code
 Even if password is cracked the account still cannot
be accessed without the code
19
• Modify behavior: Be careful about
information that you post on social media
as such information could be used to
hack your account by guessing
passwords or challenge questions.
• Click with caution: Do not click on links
or open emails that you are unfamiliar
with. They could potentially be source of
malware. Be aware of phishing scams;
do not provide sensitive information.
20
 Public Wifi
 Use caution on a public wifi network.
 Do not use unsecured wifi for financial or
sensitive transactions
 Check the network name
 Turn off sharing
 Turn off wifi capability when not in use
 Use a virtual private network.
• Clean up
Consolidate or close old accounts that could
be used by someone to gain access.
21
The Future of Cybercrime and
Cybercrime Prevention
• Cyber criminals are continually finding new ways to exploit
weaknesses.
• Per Project 2020 report: Cyber crimes in 2020 will be
adaptations of existing crimes to the technological
developments of the next seven to eight years.
• New challenges will also emerge such as threats to critical
infrastructure and human implants. These will increasingly blur
the distinction between cyber and physical attack.
https://www.europol.europa.eu/sites/default/files/publications/2020_white_paper.pdf
21
22
What does this mean
for libraries?
• Be aware of how cybercriminals are
evolving and keep up with the latest
trends in cyber security.
• Part of our mission as information
professionals is to educate people.
• Be more proactive in educating our users
on how to protect their information.
2323
Any questions?
All vintage mag covers from: http://www.coverbrowser.com

More Related Content

What's hot (20)

Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 

Viewers also liked (11)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 

Similar to Preventing Cybercrime in Libraries

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the webViral Parmar
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an OxymoronMax Nokhrin
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsInvincea, Inc.
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxACAD1ITG
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kkajairo
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 

Similar to Preventing Cybercrime in Libraries (20)

Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by DownloadsStop Watering Holes, Spear-Phishing and Drive-by Downloads
Stop Watering Holes, Spear-Phishing and Drive-by Downloads
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 

More from Mary Rayme

Wv corporate sponsorship
Wv corporate sponsorshipWv corporate sponsorship
Wv corporate sponsorshipMary Rayme
 
Bhc object aquisition presentation
Bhc object aquisition presentationBhc object aquisition presentation
Bhc object aquisition presentationMary Rayme
 
How do you library
How do you libraryHow do you library
How do you libraryMary Rayme
 
Alt rev streams present
Alt rev streams presentAlt rev streams present
Alt rev streams presentMary Rayme
 
510 group project presentation
510 group project presentation510 group project presentation
510 group project presentationMary Rayme
 
Happy Birthday 2 Steve From Mary
Happy Birthday 2 Steve From MaryHappy Birthday 2 Steve From Mary
Happy Birthday 2 Steve From MaryMary Rayme
 
Turnpike and civil war
Turnpike and civil warTurnpike and civil war
Turnpike and civil warMary Rayme
 

More from Mary Rayme (7)

Wv corporate sponsorship
Wv corporate sponsorshipWv corporate sponsorship
Wv corporate sponsorship
 
Bhc object aquisition presentation
Bhc object aquisition presentationBhc object aquisition presentation
Bhc object aquisition presentation
 
How do you library
How do you libraryHow do you library
How do you library
 
Alt rev streams present
Alt rev streams presentAlt rev streams present
Alt rev streams present
 
510 group project presentation
510 group project presentation510 group project presentation
510 group project presentation
 
Happy Birthday 2 Steve From Mary
Happy Birthday 2 Steve From MaryHappy Birthday 2 Steve From Mary
Happy Birthday 2 Steve From Mary
 
Turnpike and civil war
Turnpike and civil warTurnpike and civil war
Turnpike and civil war
 

Recently uploaded

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 

Recently uploaded (17)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 

Preventing Cybercrime in Libraries

  • 1. By Margaret Kidd and Mary Rayme IS 585, Fall 2013 1
  • 2. What is Cybercrime? Crime committed by use of a computer. 2
  • 3. • cyberbullying • cyberstalking • cyberwarfare • child pornography • extortion • fraud • hacking What is Cybercrime? 3
  • 4. What is Cybercrime? • identity theft • phishing • phreaking • ransomware • spam • theft and embezzlement • viruses 4
  • 5. What are the most prevalent cybercrimes in an information environment? 5
  • 6. Published child pornography arrests in US libraries, 2011-2013 Alaska, Anchorage Loussac Public Library California, Auburn Library California, Foothill Ranch Public Library California, Fresno County Public Library California, Main Street Library, Santa Monica Florida, Florida Atlantic University Library Florida, Harrell Memorial Library Florida, South East Wimberly Library Illinois, Bloomingdale Public Library Illinois, Orland Park Public Library Illinois, Southwest Illinois College Library Indiana, Lawrenceburg Library Kentucky, Louisville Free Public Library Maryland, Queen Anne Public Library Michigan, Kent District Library Missouri, Jefferson College Library Missouri, Metropolitan Community College Library Nevada, Western Nevada College New Jersey, North Plainfield Library New Jersey, Plainsboro Township Public Library Oregon, Monroe County Public Library South Carolina, Oconee County Library South Dakota, Rapid City Public Library Tennessee, First Regional Library Tennessee, Nashville Public Library Tulsa City-County Library, Oklahoma West Virginia, Clay County Public Library West Virginia, Randolph County Public Library West Virginia, Parkersburg-Wood County Public Library 6
  • 7. Other Top Cybercrimes in an Information Environment • stolen data/altering data • identity theft • info stolen over wifi • pirated music, audiobooks, ebooks • malware, viruses 7
  • 8. Who polices cybercrime? 8 The Secret Service was the first law enforcement entity to police cybercrime. Since then the responsibility has spread to include: • FBI • CIA • Department of Homeland Security
  • 10. 1986, The Cuckoo’s Egg 1988, The Morris Worm 1994, Citibank 1998, Back Orifice 1999, The Melissa Virus 2000, Web Denied 2003, Blaster Worm & Blackout 2007, Pentagon 2007, Israel Air Defense Kill Switch 2007, Zeus Botnet 2009, China Attacks Google 2010, Stuxnet 2012, Unlimited Operation 2013, Bitcoin 2014, ? Cybercrime Timeline 10
  • 11. 11 Who are cybercriminals? 1. US 2. Russia 3. Germany 4. Romania 5. Ukraine 6. Thailand 7. Vietnam 8. Netherlands 9. Lithuania 10. Ireland From “Top 50 Bad Hosts and Networks”, HostExploits’s Worldwide Cybercrime Series. Second Quarter, 2012 – Report.
  • 13. 13 • Our library users expect to have a safe computing environment. • To provide this we must  Be knowledgeable about cybercrime  Educate users
  • 14. 14 Some steps that libraries can take to prevent cybercrime: • Perform regular anti-virus and anti-malware scans • Use firewalls • Block users from downloading programs onto public computers • Routinely evaluate and update security measures as needed
  • 15. 15 • Secure browsing: Does not save browser history, search history, download history, or temporary internet files. • Examples: Firefox Private Browsing & Chrome Incognito Browsing • Caution: Files that are downloaded and bookmarks saved will be kept. The ISP and employer can still track the pages you visit. 15
  • 16. 16 Protect and strengthen passwords: • Never share your passwords with anyone. • Have patrons use passwords to login • Use guest passwords that are frequently changed. 16
  • 17. 17 https://www.microsoft.com/security/pc-security/password-checker.aspx • Use a password generator for strong passwords • Example: LastPass a product to generate and manage passwords. • Use a password checker to evaluate password strength.
  • 18. 18 Two part authentication:  Additional layer of security using password & verification code  Even if password is cracked the account still cannot be accessed without the code
  • 19. 19 • Modify behavior: Be careful about information that you post on social media as such information could be used to hack your account by guessing passwords or challenge questions. • Click with caution: Do not click on links or open emails that you are unfamiliar with. They could potentially be source of malware. Be aware of phishing scams; do not provide sensitive information.
  • 20. 20  Public Wifi  Use caution on a public wifi network.  Do not use unsecured wifi for financial or sensitive transactions  Check the network name  Turn off sharing  Turn off wifi capability when not in use  Use a virtual private network. • Clean up Consolidate or close old accounts that could be used by someone to gain access.
  • 21. 21 The Future of Cybercrime and Cybercrime Prevention • Cyber criminals are continually finding new ways to exploit weaknesses. • Per Project 2020 report: Cyber crimes in 2020 will be adaptations of existing crimes to the technological developments of the next seven to eight years. • New challenges will also emerge such as threats to critical infrastructure and human implants. These will increasingly blur the distinction between cyber and physical attack. https://www.europol.europa.eu/sites/default/files/publications/2020_white_paper.pdf 21
  • 22. 22 What does this mean for libraries? • Be aware of how cybercriminals are evolving and keep up with the latest trends in cyber security. • Part of our mission as information professionals is to educate people. • Be more proactive in educating our users on how to protect their information.
  • 23. 2323 Any questions? All vintage mag covers from: http://www.coverbrowser.com