SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Cyber Security
Patricia Watson
PatriciaWatson@BoiseInc.com
Digital Forensics Program Manager
March 2013
Overview
 Cyber Security “Buzz Words”
 Digital Crimes
 Web Surfing
 Identity Theft
 Social Networking
 Protect your IP
 Conclusion
 Appendix – List of Handy Sources
Cyber Security “Buzz Words”
 Malware: Malicious software designed to secretly access a
computer system without the owner's informed consent,
includes:
◊ Computer viruses
◊ Worms
◊ Trojans
◊ Spyware
◊ Adware
◊ Scareware
◊ Malvertising
◊ Rootkits
Source: Wikipedia
A few more terms…
 Social Engineering: is the act of manipulating people into
performing actions or divulging confidential information, rather
than by breaking in or using technical cracking techniques.
 Pretexting: is the act of creating and using an invented
scenario (the pretext) to engage a targeted victim in a manner
that increases the chance the victim will divulge information or
perform actions that would be unlikely in ordinary
circumstances.
 Phishing: Phishing is a criminal mechanism employing both
social engineering and technical tactic to steal consumers’
personal identity and financial account credentials.
 Smishing: a combination of SMS texting and phishing.
 Vishing: a combination of voice and phishing (target cell and
land-line phones).
Source: Wikipedia
Digital Crimes
 Theft of intellectual property
 Fraud
 Insider threat
 Malware
 Remote attacks
 Crimes against Children
 The Internet Crime Complaint Center (IC3) reported that
there were over 314,000 cyber crimes reported in 2011.
Source – IC3
Web Surfing
The next time you surf the Internet, consider this:
 Two-thirds (65 percent) of Internet users globally
have fallen victim to cybercrimes, including online
credit-card fraud, identity theft and computer
viruses.
 Buyer beware…safe web browsing is the
responsibility of the user NOT the web site
provider.
 Do not fall victim to social engineering, phishing,
vishing and or inadvertent download of malware.
Source - Computer Crime Research Center
Identify Theft
 11.1 million adults were victims of identity theft
in 2009
 The total fraud amount was $54 billion
 The average victim spent 21 hours and $373
out of pocket resolving the crime
 4.8% of the population was a victim of identity
fraud in 2009
 13% of identity fraud crimes were committed by
someone the victim knew
Source: Javelin Strategy & Research
Social Networking
Are you sharing too much:
 42% of the people on Facebook post their full
birth dates
 16% post their children's names
 63% post photos of themselves
 7% reveal their home addresses
 The number of U.S. households
that use social networks
has doubled in the past year.
Source: Crime-research.org
Protect Your Intellectual Property
 Passwords
◊ Do not use the same password for all accounts
 Upgrades & Patching
 Anti-Virus, Firewalls & Encryption
 Wi-Fi Security
◊ Open networks are unprotected
 Email Attachments
 Buyer beware…“Free” Downloads
◊ Research a company's reputation before
downloading its software or visiting its website
Source: Crime-research.org
Protect Your Intellectual Property
 Do not respond to unsolicited e-mails, text
messages or automated voice messages
 When buying online, use a legitimate payment
service
 Check each seller’s rating and feedback along with
the dates the feedback was posted.
 Do not post information that could put you at risk of
being targeted by cybercriminals
Source: FBI
Conclusion
Awareness is key – security starts with YOU!
Appendix – Handy Sources
 Internet Crime Complaint Center:
http://www.ic3.gov/default.aspx
 Safety On Line: http://www.staysafeonline.org/
 FBI Cyber Crime: http://www.fbi.gov/news/stories/story-
index/cyber-crimes
 Home Network Security:
http://www.cert.org/tech_tips/home_networks.html
 Freedom of Information Act:
http://www.nsa.gov/public_info/foia/index.shtml
 Short film - The Dawn of the Net:
http://www.youtube.com/watch?v=H2GkIrWhZeQ

Mais conteúdo relacionado

Mais procurados

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 

Mais procurados (20)

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 

Destaque

ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
Patricia M Watson
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
Patricia M Watson
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
Patricia M Watson
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
Patricia M Watson
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
Patricia M Watson
 

Destaque (9)

ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013ISACA President Letter | Patricia Watson | 2013
ISACA President Letter | Patricia Watson | 2013
 
Cyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal ControlsCyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal Controls
 
Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004Computer Forensics | Patricia Watson | 2004
Computer Forensics | Patricia Watson | 2004
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
 
IT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | WatsonIT Governance | 2013 Interface Conf | Watson
IT Governance | 2013 Interface Conf | Watson
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 

Semelhante a Cyber Security | Patricia Watson

Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 

Semelhante a Cyber Security | Patricia Watson (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Mobile security
Mobile securityMobile security
Mobile security
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber Security | Patricia Watson

  • 2. Overview  Cyber Security “Buzz Words”  Digital Crimes  Web Surfing  Identity Theft  Social Networking  Protect your IP  Conclusion  Appendix – List of Handy Sources
  • 3. Cyber Security “Buzz Words”  Malware: Malicious software designed to secretly access a computer system without the owner's informed consent, includes: ◊ Computer viruses ◊ Worms ◊ Trojans ◊ Spyware ◊ Adware ◊ Scareware ◊ Malvertising ◊ Rootkits Source: Wikipedia
  • 4. A few more terms…  Social Engineering: is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.  Pretexting: is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.  Phishing: Phishing is a criminal mechanism employing both social engineering and technical tactic to steal consumers’ personal identity and financial account credentials.  Smishing: a combination of SMS texting and phishing.  Vishing: a combination of voice and phishing (target cell and land-line phones). Source: Wikipedia
  • 5. Digital Crimes  Theft of intellectual property  Fraud  Insider threat  Malware  Remote attacks  Crimes against Children  The Internet Crime Complaint Center (IC3) reported that there were over 314,000 cyber crimes reported in 2011. Source – IC3
  • 6. Web Surfing The next time you surf the Internet, consider this:  Two-thirds (65 percent) of Internet users globally have fallen victim to cybercrimes, including online credit-card fraud, identity theft and computer viruses.  Buyer beware…safe web browsing is the responsibility of the user NOT the web site provider.  Do not fall victim to social engineering, phishing, vishing and or inadvertent download of malware. Source - Computer Crime Research Center
  • 7. Identify Theft  11.1 million adults were victims of identity theft in 2009  The total fraud amount was $54 billion  The average victim spent 21 hours and $373 out of pocket resolving the crime  4.8% of the population was a victim of identity fraud in 2009  13% of identity fraud crimes were committed by someone the victim knew Source: Javelin Strategy & Research
  • 8. Social Networking Are you sharing too much:  42% of the people on Facebook post their full birth dates  16% post their children's names  63% post photos of themselves  7% reveal their home addresses  The number of U.S. households that use social networks has doubled in the past year. Source: Crime-research.org
  • 9. Protect Your Intellectual Property  Passwords ◊ Do not use the same password for all accounts  Upgrades & Patching  Anti-Virus, Firewalls & Encryption  Wi-Fi Security ◊ Open networks are unprotected  Email Attachments  Buyer beware…“Free” Downloads ◊ Research a company's reputation before downloading its software or visiting its website Source: Crime-research.org
  • 10. Protect Your Intellectual Property  Do not respond to unsolicited e-mails, text messages or automated voice messages  When buying online, use a legitimate payment service  Check each seller’s rating and feedback along with the dates the feedback was posted.  Do not post information that could put you at risk of being targeted by cybercriminals Source: FBI
  • 11. Conclusion Awareness is key – security starts with YOU!
  • 12. Appendix – Handy Sources  Internet Crime Complaint Center: http://www.ic3.gov/default.aspx  Safety On Line: http://www.staysafeonline.org/  FBI Cyber Crime: http://www.fbi.gov/news/stories/story- index/cyber-crimes  Home Network Security: http://www.cert.org/tech_tips/home_networks.html  Freedom of Information Act: http://www.nsa.gov/public_info/foia/index.shtml  Short film - The Dawn of the Net: http://www.youtube.com/watch?v=H2GkIrWhZeQ