This document outlines Cybersecurity Awareness Month, which takes place annually in October. It aims to raise awareness of cybersecurity across the nation. The document discusses common cybersecurity threats like malware, ransomware, cybercrime, and social engineering. It provides examples and definitions for these threats. The document also offers tips on how individuals can better protect themselves online, such as using strong and unique passwords, enabling multi-factor authentication, and staying up-to-date on software and security updates. The theme for Cybersecurity Awareness Month 2021 is "Do Your Part. #BeCyberSmart".
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "What is Cyber Security" gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attack in today's IT world and how cybersecurity is the solution to these attacks. Below are the topics covered in this tutorial:
1. Why we need Cyber Security?
2. What is Cyber Security?
3. The CIA Triad
4. Vulnerability, Threat and Risk
5. Cognitive Cyber Security
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
** Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training **
This Edureka tutorial on "What is Cyber Security" gives an introduction to the Cyber Security world and talks about its basic concepts. You get to know different kinds of attack in today's IT world and how cybersecurity is the solution to these attacks. Below are the topics covered in this tutorial:
1. Why we need Cyber Security?
2. What is Cyber Security?
3. The CIA Triad
4. Vulnerability, Threat and Risk
5. Cognitive Cyber Security
Cybersecurity Training Playlist: https://bit.ly/2NqcTQV
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
This presentation is about Ransomware. It tells you about how ransomware creates problem and how it can be removed. It also describes different types of Ransomware.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
To guard our digital assets and ourselves from cyber threats, it’s crucial to be vigilant and proactive. Understanding common varieties of threats is essential, but enforcing preventive measures is likewise important. In the present-day virtual age, cybersecurity is a shared obligation. Adopting sturdy password practices, staying vigilant against phishing attempts, and keeping software programs up-to-date can lessen publicity to threats. https://mverve.com/
To know how we can protect the data, firstly we need to know how someone can steal it. And in this blog, we will address the 10 common cyber security threats that are most prevalent and also the preventive measures that we can take to control them.
https://mverve.com/
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
This presentation is about Ransomware. It tells you about how ransomware creates problem and how it can be removed. It also describes different types of Ransomware.
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
To guard our digital assets and ourselves from cyber threats, it’s crucial to be vigilant and proactive. Understanding common varieties of threats is essential, but enforcing preventive measures is likewise important. In the present-day virtual age, cybersecurity is a shared obligation. Adopting sturdy password practices, staying vigilant against phishing attempts, and keeping software programs up-to-date can lessen publicity to threats. https://mverve.com/
To know how we can protect the data, firstly we need to know how someone can steal it. And in this blog, we will address the 10 common cyber security threats that are most prevalent and also the preventive measures that we can take to control them.
https://mverve.com/
Can you tell if your computer has been compromised?
Cyber Security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction
More than 50% of the world's population is actively connected to the internet.
Cyber Security is becoming a fundamental requirement for every business organization worldwide. We are all susceptible to this new frontier of crime and it is our responsibility to be prepared.
Cybersecurity Interview Questions Part -2.pdfInfosec Train
It is a hacking method that makes use of trial and error to
break encryption keys, passwords, and login credentials.
It is a straightforward but effective strategy for
unauthorized access to user accounts, company
systems, and networks.
Type of Security Threats and its Preventionijsrd.com
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
Cybercrime is a criminal activity that involves using technology, such as computers or mobile devices, to commit illegal acts. These criminal activities can range from stealing sensitive information to disrupting critical infrastructure or even extortion. Cybercrime is a growing threat, as more and more aspects of our lives become connected to the internet.
To combat cybercrime, organizations need to prioritize cybersecurity. Cybersecurity involves implementing a range of security measures, such as network segmentation, access control, encryption, threat monitoring, and incident response planning. Security must be built into the design of systems and continuously monitored and updated to keep pace with emerging threats.
Effective cybersecurity also requires employee training and awareness programs to educate staff on the risks and best practices for securing systems. By taking a proactive approach to cybersecurity, organizations can protect their assets and reputation, and prevent financial losses and legal liabilities associated with cybercrime.
___साइबर अपराध एक अपराधिक गतिविधि है जो तकनीक का उपयोग करती है, जैसे कंप्यूटर या मोबाइल डिवाइस, अवैध कृत्य करने के लिए। इन अपराधिक गतिविधियों में संवेदनशील जानकारी चुराना से लेकर आवश्यक ढांचे को अवरुद्ध करने या उत्पादन बिगाड़ने तक की विस्तृत श्रृंखला शामिल हो सकती है। साइबर अपराध एक बढ़ती हुई खतरा है, क्योंकि हमारे जीवन के अधिकांश पहलुओं को इंटरनेट से जोड़ा जाता है।
साइबर अपराध से निपटने के लिए, संगठनों को साइबर सुरक्षा को प्राथमिकता देनी चाहिए। साइबर सुरक्षा में नेटवर्क विभाजन, पहुँच नियंत्रण, एन्क्रिप्शन, खतरा मॉनिटरिंग और घटना प्रतिक्रिया योजना जैसी विभिन्न सुरक्षा उपायों को लागू करना शामिल होता है। सुरक्षा को ढांचे के डिजाइन में बिल्ट करना आवश्यक होता है और नवीनतम खतरों के साथ कदम से कदम मिलाकर मॉनिटर और अपडेट किया जाना चाहिए।
अधिकृत साइबर सुरक्षा अभ्यास और जागरूकता कार्यक्रम भी आवश्यक हैं जो कर्मचारियों को सिस्टम सुरक्षा के जोखिम और सर्वोत्तम अभ्यासों के बारे में शिक्षित करने में मदद करते हैं। साइबर सुरक्षा के लिए एक सक्रिय दृष्टिकोण अपनाकर, संगठन अपनी संपत्ति और प्रतिष्ठा की रक्षा कर सकता है और साइबर अपराध से जुड़ी वित्तीय हानि और कानूनी दायित्वों से बच सकता है।
A Guide to Internet Security For Businesses- Business.comBusiness.com
Recent revelations by National Security Agency (NSA) renegade contractor Edward Snowden have resulted in many businesses paying more attention to how secure their computer systems are. But even the most “cyber-savvy” businesses can have their computer networks hacked and compromised. Use this whitepaper to understand your threats, protective options, and trends in internet security for businesses.
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
What’s next for cybersecurity in 2021? Last year, both the public and the private sector experienced a plethora of breaches and attacks. From regular security lapses to more complicated, and often more expensive, ransomware attacks - 2020 has seen a drastic increase in the volume of breaches that led to the widespread loss of data and valuable information around the world.
ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
Example: when we make a video call, we use internet.
A presentation made during the international Youth Exchange called Digital Danger and financed Erasmus+ Programme through Dům zahraniční spolupráce and the European Union
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
Artificial Intelligence (AI) and Machine Learning (ML) technologies have many positive applications, from helping researchers better understand neural pathways in the brain to assisting law enforcement with identifying suspects in criminal investigations.
They are renowned for the greater good of cybersecurity. However, these technologies also hold the potential to ruin our perfectly running digital world and become a source of power to the dark web users/administrators.
If you’re not familiar with how AI and ML might impact cybersecurity, this blog will discuss both sides of the coin and help you better understand how this technology might affect you one day soon.
Under the right hands, they are a boon to humanity, but they can quickly turn into a bane on the corrupt hands.
As for now, upgrade your security with these technologies to stay in the competition. Connect with a Machine Learning company in India to maximize your cybersecurity.
https://bit.ly/3rrYI3J
#cybersecurity #aiincybersecurity #mlincybersecurity #machinelearningincybersecurity #artificialintelligenceincybersecurity #hireaidevelopers #machinelearningcompaniesinindia #machinelearningdevelopmentcompany #machinelearningdevelopmentservices #topmachinelearningcompanies
Similar to Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf (20)
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
3. Cybersecurity “So What?”
Did You Know?
Antivirus software is available for
mobile devices, which are an easy,
common target for hackers and
other bad actors.
Cybersecurity
Common Sense
Being safe online isn’t so different from
being safe in the physical world!
Keep Calm and Trust Your Gut!
Commonly
Used Terms
Bad Actor
Hacker
Cyber Attack
3
4. There are currently an estimated
5.2 billion internet users or
63% of the world’s population.
Do Your Part.
#BeCyberSmart
Cybersecurity starts with
YOU and is everyone’s
responsibility.
4
5. CYBERCRIME
What is it?
Cybercrime is any crime which is committed
electronically.
This can include…
Theft
Fraud
Sometimes even murder
Why should you care?
Crime is a danger offline and on!
Cyber self-defense basics can go a long way to
keeping you and your data out of the hands of
bad actors.
Examples
Identity theft
Child sexual abuse materials
Financial theft
Intellectual property violations
Malware
Malicious social engineering
5
6. MALWARE
What is it?
Any software intended to…
Damage
Disable
Or give someone unauthorized access to your
computer or other internet-connected device
Why should you care?
Most cybercrime begins with some sort of
malware. You, your family, and your personal
information is almost certainly at risk if malware
finds its way onto your computer or devices.
Examples
Ransomware
Adware
Botnets
Rootkits
Spyware
Viruses
Worms
6
7. RANSOMWARE
What is it?
Malware designed to make data or hardware
inaccessible to the victim until a ransom is paid.
Why should you care?
Often downloaded as malicious email links
Damage to both financial stability and
reputation
No guarantee that you will get your data back,
even if you pay
Often used as a decoy for other malicious
activity
Examples
Cryptolocker
Winlock
Cryptowall
Reveton
Bad rabbit
Crysis
Wannacry
7
8. BOTS
What is it?
Bots are a type of program used for automating
tasks on the internet.
Why should you care?
Malicious bots can:
Gather passwords
Log keystrokes
Obtain financial information
Hijack social media accounts
Use your email to send spam
Open back doors on the infected device
Did You Know?
Not all bots are bad. When you
use a search engine, these results
are made possible by the help of
bots “crawling” the internet and
indexing content. Chatbots like
Siri and Alexa are another
common type of “good” bot.
8
9. PHYSICAL CYBER ATTACKS
What is it?
Physical cyber attacks use hardware, external storage
devices, or other physical attack vectors to infect, damage, or
otherwise compromise digital systems. This can include…
USB storage devices
CD/DVD
Internet of Things (IoT)
Why should you care?
Easy to overlook
Difficult to identify and detect
Extremely difficult to remove
Can do anything from installing ransomware, to sending
copies of or modifying information systems, to
dismantling networks
Did You Know?
Anything connected to the
internet is potentially
vulnerable, from e-
scooters to laptops to
cargo ships.
9
10. SOCIAL ENGINEERING
What is it?
Cybercriminals can take advantage of you by using
information commonly available through…
Social media platforms
Location sharing
In-person conversations
Why should you care?
Your privacy isn’t just a luxury – it’s a security
measure
Attacks can be successful with little to no
programming knowledge or ability
Technological security measures can only protect
you so much – you are your best defense
Examples
Phishing
Pretexting
Baiting
Quid pro quo
Tailgating
Inside job
Swatting
10
11. PHISHING
What is it?
Fake messages from a seemingly trusted or reputable
source designed to convince you to…
Reveal information
Give unauthorized access to a system
Click on a link
Commit to a financial transaction
Why should you care?
Extremely common
Can have severe consequences
Devil‘s in the details
Examples
Emails
Text messages
Phone calls
Social media messages
and posts
Suspicious hyperlinks
11
12. Would This
Email Fool You?
From
Subject
Legitimate-Looking-Source@notquiteyourworkemail.com
Ugent IT Update: Software Vulnerability
Software Update
Good afternoon Tom,
A vulneribility has been identified in “Big Name Software” that allows an attacker to
record calls and videos from your computer without your knowldge. Please install the
attacked update by the end of the day or your workstation will be locked.
We have also created app for all employees to determan if they been affected by this
vulnerability. Click here to run the app.
Sincerely,
BossMann
Your Company IT Department
www.fakewebsite.com/gotcha.exe
Click or tap to follow link.
REPLY
12
13. SWATTING
What is it?
An attack centered around location sharing in which bad actors
call the police claiming the victim has committed a crime…
Bomb Threat
Armed Intruder
Violent Incident
Why should you care?
Physical and immediate consequences
Sometimes was intended merely as a prank
Arrest and serious injury can result
Reduce risk by sharing your location only with trusted
individuals, and share vacation photos only after you’ve
returned safely home
Examples
Your location is embedded
as metadata in every
picture you take with your
phone. Turn location
services off when you aren’t
using them to make it more
difficult for bad actors to
view this information.
13
14. OTHER AVENUES OF ATTACK
What is it?
Internet of everything
Any device connected to your network
Information collection
Remote access
Bluetooth
Open ports
Why should you care?
Your network can be used to attack someone else
Any device that stores information or is connected
to the internet can be a vulnerability
Assume that you are vulnerable, and take measures
to understand and mitigate risk
Don‘t be the “low-hanging fruit”
Examples
Smart devices
Mobile phone
Thermostat
Vehicles
Gaming consoles
Printers
Medical equipment
Industrial systems
14
15. How Can You Better
Protect Yourself Online?
Secure your networks.
Wireless routers are a way for
cybercriminals to access online devices.
If You Connect It, Protect It.
One proven defense against intrusion
is updating to the latest virus
protection software.
Stay up to date.
Keep software updated to the latest
versions and set security software to
run regular scans.
Double your login protection.
Enable multi-factor authentication
(MFA) to ensure that the only person
who has access to your account is you.
15
16. Password Tips
Use different passwords on different
systems and accounts
Use the longest password allowed
Use a mix of uppercase and lowercase
letter, numbers, and symbols
Reset your password every few months
Use a password manager
******
******
******
******
******
Did You Know?
Password or credential stuffing is a
cyberattack that tries “stuffing”
already comprised username and
passwords from one site into
another site in hopes that the user
uses the same login information
across platforms.
16
18. Cybersecurity Awareness Month 2021 Schedule
October 1:
Official Kick-off
WEEK 1:
Week of October 4
Be Cyber Smart.
WEEK 2:
Week of October 11
Fight the Phish!
WEEK 3:
Week of October 18
Explore. Experience.
Share. (Cybersecurity
Career Awareness
Week)
WEEK 4:
Week of October 25
Cybersecurity First
18
23. Raise Awareness
and Get Involved
Become a Cybersecurity Month Champion
Promote Cybersecurity Awareness Month on social
media; use the #BeCyberSmart hashtag
Volunteer to speak at Cybersecurity Awareness
Month Engagements
Pass on cybersecurity tips to your friends, family,
and coworkers
23
24. For more information, contact
CyberAwareness@cisa.dhs.gov
Visit cisa.gov/cybersecurity-awareness-month or
staysafeonline.org/cybersecurity-awareness-month/
for more resources.
24