2. Cyber security Topics
• Cyber and the Internet are critical in helping us day-to-day
activities, from communicating via email to gathering information
via the Internet
• There are four cybersecurity topics that should help you .
• Identity Theft
• Fraud and Phishing
• Cyber Bullying and Ethics
• Cyber Predators
•
Robin Rafique
3. Identity Theft
• Identity theft is the illegal use of someone else’s personal
information in order to obtain money or credit
• Identity theft can happen to anyone in any location across the
country
– 8.1 million were victims of identity theft in 2010*
– Take simple steps to protect your online identity, such as:
– Locking and password protecting your computer and cell phone
– Not sharing specific personal information online, such as your
full name or birthday
– Setting proper privacy settings on social networking sites
Robin Rafique
4. Crime in the Modern World
Massive amount of data:
• 247 billion email per day
• 234 million websites
• 5 billion mobile-phone
users
ICT Infrastructures:
• Complex,rapidly growing
• Dynamically changing
• Hostile,adversary environment
Cyber crime:
• One million victims daily
• Expected losses 297
• Billion Euro
Ultra‐large Scale
Forensic
Investgations.
• Situation-aware methods
• Quanlified,measurable
• indicators
• Adaptive, self‐organizing models
Distributed, cooperative,autonomo
us
Rule-of-Law:
• Culture,social behaviours
• Legal&privacy aspects
• Law as framework for ICT
• Law as contents of
ICT, Automation,programming of
legal rules
Robin Rafique
5. Fraud and Phishing
• Fraud is the intentional perversion of truth in order to induce
another to part with something of value or to surrender a legal right
• Phishing is a scam by which an email user is duped into revealing
personal or confidential information that the scammer can use
illicitly or fraudulently
• Fraud and phishing attacks may take the form of an authentic-
looking website or a personalized email
– In April 2011, a phishing scam targeted the Department of
Energy’s Oak Ridge Laboratory facility, shutting down email
and Internet access*
– Secure yourself from fraud and phishing attacks by:
– Working with your peers to identify and deal with phishing
attacks
– Educating your family and friends about the types of phishing
scams and what they can do to protect themselves
Robin Rafique
6. Cyber Bullying and Ethics
• Cyber bullying is the electronic posting of mean-spirited
messages about a person, often done anonymously
• Cyber ethics help Internet users understand what type of online
behavior is right and wrong
• Cyber bullying and poor cyber ethics are threats many teens and
young adults face not from strangers, but from their own peers
• Whatever anyone posts online about another person can be spread
virally, resulting in serious, unwarranted damage to an individual’s
reputation or personal well-being
• Avoid being a cyber bully and practice good cyber ethics by:
– Following the “golden rule” online and in real life – be nice
– Not saying or doing anything online that you wouldn’t do in
person
– Owning what you say and do online
Robin Rafique
7. Cyber Predators
• Cyber predators are people who search online for other people in
order to use, control, or harm them in some way
• Cyber predators target teens and young adults – both male and
female – on a regular basis, regardless of whether or not the victims
are 18 or above
• Social networking sites enhance a predator’s ability to target young
Americans, especially if they share personal information in your
profile
– 91% of young adults say they are social networking “friends”
with people they don’t know well*
– You never know who is behind the screen, so protect yourself
and your personal information
– If you are being targeted or harassed online, you should notify
your family or the proper authorities
Robin Rafique
8. Chatting with Kids About
Being Online Tips
• Have regular conversations about using the Internet.
• Talk to kids about online manners.
• Ask kids who they are in touch with online and what sites they visit.
• Use parental control options that allow you to block and filter
content, filter outgoing content and limit kid’s time online.
• Develop computer and cell phone rules, such as no cell phone use at
the dinner table, during homework or sleeping hours.
Robin Rafique
9. Tips
DO
• Stop before you post
something and think about
how you will feel if your
family, teachers, neighbors or
coaches see it.
• Limit your online friends to
people you actually know.
• Speak up if you feel
uncomfortable or threated by
something you see online.
DON’T
• Reply to text, email or pop up
messages that ask you for
personal information.
• Open attachments or click on
links that are suspicious or
come from strangers.
• Stand for bullying – online or
off.
• Post videos or photos of
someone without their
approval.
Robin Rafique