SlideShare a Scribd company logo
CYBER SECURITY
OVERVIEW
• Passwords
• Email hacking
• Web browsing
• Phising
• Social Media
PASSWORDS
• Use a mix of characters and symbols
• Ex: MyP@ssw*rd127
• No personal information!
• Don’t share with others
• Don’t write it down on a sticky note
• One password for one site/device/etc.
Period.
• Change your password for
EVERYTHING regularly
• Security Questions: Don’t have to be
true, just memorable
SO HOW DO I REMEMBER THEM ALL?
• Cell phone apps!
• iPhone: LockBox
• Android: Keeper
2-STEP VERIFICATION WITH GMAIL
• Enter your password to sign in
• Then a code will be sent to your phone via text and you will be
prompted to enter that code
• You can select specific computers to use only your password
• Any unverified computers or devices will need the 2-step
verification
• https://accounts.google.com/SmsAuthConfig
HELP! HOW DO I CHANGE MY GMAIL
PASSWORD?
• Google search “change
gmail password”
• Follow “Go to change
password” link
HELP! HOW DO I CHANGE MY MYKW
PASSWORD?
• Log in on
mykw.kw.com
• Go to the
Technology tab
• Click “Change
Password”
EMAIL HACKING
• 1 out of every 239 emails is hostile
• 1 out of every 299 are phishing attacks
• Malicious attacks are up 81%
• If a link or attachment looks suspicious, DO NOT OPEN IT
• If a link or attachment is unexpected, DO NOT OPEN IT
HELP! MY EMAIL WAS HACKED! WHAT TO
DO
1. Change your password
2. Tell your contacts
3. Scan your computer (put in a help ticket with Reppert Factor)
4. Review your personal settings
1. Make sure there is no sneaky forwarding addresses
2. Check your signature field to make sure no links have been added to it
5. Change passwords for other sites
6. Monitor: bank accounts, credit cards, etc
THE WORLD WIDE WEB
• Sensitive browsing (i.e. banking, shopping) should only be done
on a device that belongs to you.
• The URL, look for:
• https or (indicate a secure website)
• Correct spelling
• Save downloads vs running them
• Gives your system an extra chance to check for viruses
• Avoid illegal downloads
• Update your browser when it prompts you to
• Bookmark important sites
PHISHING – WHAT AND WHY
• The activity of defrauding an online account holder of financial
information by posing as a legitimate company
• Usually in the form of email with links that direct to a spoofed
website
• The goal is to get personal information from you
• Quiz time!
PHISH OR REAL?
PHISH!
PHISH OR REAL?
REAL!
PHISH OR REAL?
PHISH!
PHISH OR REAL?
PHISH!
PHISH OR REAL?
REAL!
SOCIAL MEDIA
• Not all of your “friends” are
friends
• The Do Not Post List
• Where your kids go to school
• A picture with your street name in it
• When you’re going on vacation
• Full birth date
• State you were born in
• Location, location, location – turn
location services off
Cyber security

More Related Content

Viewers also liked

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (9)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Cyber security

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
rmortiz66
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
Andrew Schwabe
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
Bill Chea
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
Moses Ngeth
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
Michael Dessecker
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
Barry Caplin
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
Mike Felch
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
jitiyaashwin
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
Jonathan Bacon
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
Constantinos Loizou (Msc Engineer)
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 

Similar to Cyber security (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Information Security Awareness With Shawn Changes
Information Security Awareness With Shawn ChangesInformation Security Awareness With Shawn Changes
Information Security Awareness With Shawn Changes
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 

More from Jennie Sherkness

New Agent Packet
New Agent PacketNew Agent Packet
New Agent Packet
Jennie Sherkness
 
Mid Semester Review
Mid Semester ReviewMid Semester Review
Mid Semester Review
Jennie Sherkness
 
faces of nicaragua- Felix
faces of nicaragua- Felixfaces of nicaragua- Felix
faces of nicaragua- Felix
Jennie Sherkness
 
The Rich Keep Getting Richer- The Crystallization of American Inequality
The Rich Keep Getting Richer- The Crystallization of American InequalityThe Rich Keep Getting Richer- The Crystallization of American Inequality
The Rich Keep Getting Richer- The Crystallization of American Inequality
Jennie Sherkness
 
Structuration and Ferguson
Structuration and FergusonStructuration and Ferguson
Structuration and Ferguson
Jennie Sherkness
 
Factors Contributing to Social Mobility- Education and Network Ties
Factors Contributing to Social Mobility- Education and Network TiesFactors Contributing to Social Mobility- Education and Network Ties
Factors Contributing to Social Mobility- Education and Network Ties
Jennie Sherkness
 
Script Practice mobile app
Script Practice mobile appScript Practice mobile app
Script Practice mobile app
Jennie Sherkness
 
Kw mobile app powerpoint
Kw mobile app powerpointKw mobile app powerpoint
Kw mobile app powerpoint
Jennie Sherkness
 
Social Media Class
Social Media ClassSocial Media Class
Social Media Class
Jennie Sherkness
 

More from Jennie Sherkness (10)

New Agent Packet
New Agent PacketNew Agent Packet
New Agent Packet
 
4040_001
4040_0014040_001
4040_001
 
Mid Semester Review
Mid Semester ReviewMid Semester Review
Mid Semester Review
 
faces of nicaragua- Felix
faces of nicaragua- Felixfaces of nicaragua- Felix
faces of nicaragua- Felix
 
The Rich Keep Getting Richer- The Crystallization of American Inequality
The Rich Keep Getting Richer- The Crystallization of American InequalityThe Rich Keep Getting Richer- The Crystallization of American Inequality
The Rich Keep Getting Richer- The Crystallization of American Inequality
 
Structuration and Ferguson
Structuration and FergusonStructuration and Ferguson
Structuration and Ferguson
 
Factors Contributing to Social Mobility- Education and Network Ties
Factors Contributing to Social Mobility- Education and Network TiesFactors Contributing to Social Mobility- Education and Network Ties
Factors Contributing to Social Mobility- Education and Network Ties
 
Script Practice mobile app
Script Practice mobile appScript Practice mobile app
Script Practice mobile app
 
Kw mobile app powerpoint
Kw mobile app powerpointKw mobile app powerpoint
Kw mobile app powerpoint
 
Social Media Class
Social Media ClassSocial Media Class
Social Media Class
 

Cyber security

  • 2. OVERVIEW • Passwords • Email hacking • Web browsing • Phising • Social Media
  • 3.
  • 4. PASSWORDS • Use a mix of characters and symbols • Ex: MyP@ssw*rd127 • No personal information! • Don’t share with others • Don’t write it down on a sticky note • One password for one site/device/etc. Period. • Change your password for EVERYTHING regularly • Security Questions: Don’t have to be true, just memorable
  • 5.
  • 6. SO HOW DO I REMEMBER THEM ALL? • Cell phone apps! • iPhone: LockBox • Android: Keeper
  • 7. 2-STEP VERIFICATION WITH GMAIL • Enter your password to sign in • Then a code will be sent to your phone via text and you will be prompted to enter that code • You can select specific computers to use only your password • Any unverified computers or devices will need the 2-step verification • https://accounts.google.com/SmsAuthConfig
  • 8. HELP! HOW DO I CHANGE MY GMAIL PASSWORD? • Google search “change gmail password” • Follow “Go to change password” link
  • 9. HELP! HOW DO I CHANGE MY MYKW PASSWORD? • Log in on mykw.kw.com • Go to the Technology tab • Click “Change Password”
  • 10. EMAIL HACKING • 1 out of every 239 emails is hostile • 1 out of every 299 are phishing attacks • Malicious attacks are up 81% • If a link or attachment looks suspicious, DO NOT OPEN IT • If a link or attachment is unexpected, DO NOT OPEN IT
  • 11. HELP! MY EMAIL WAS HACKED! WHAT TO DO 1. Change your password 2. Tell your contacts 3. Scan your computer (put in a help ticket with Reppert Factor) 4. Review your personal settings 1. Make sure there is no sneaky forwarding addresses 2. Check your signature field to make sure no links have been added to it 5. Change passwords for other sites 6. Monitor: bank accounts, credit cards, etc
  • 12. THE WORLD WIDE WEB • Sensitive browsing (i.e. banking, shopping) should only be done on a device that belongs to you. • The URL, look for: • https or (indicate a secure website) • Correct spelling • Save downloads vs running them • Gives your system an extra chance to check for viruses • Avoid illegal downloads • Update your browser when it prompts you to • Bookmark important sites
  • 13. PHISHING – WHAT AND WHY • The activity of defrauding an online account holder of financial information by posing as a legitimate company • Usually in the form of email with links that direct to a spoofed website • The goal is to get personal information from you • Quiz time!
  • 17. REAL!
  • 23. REAL!
  • 24. SOCIAL MEDIA • Not all of your “friends” are friends • The Do Not Post List • Where your kids go to school • A picture with your street name in it • When you’re going on vacation • Full birth date • State you were born in • Location, location, location – turn location services off