Teaching Cyber Safety

Preview:

DESCRIPTION

Janis Rose, CACC CISCO Networking Instructor, Cyber Safety Slides

Citation preview

Redirected link Foreign source Poor English Sense of urgency

Recommendation: Don’t Click! Type the URL

E-Card Phishing Example

The Real PayPal Site

Spoofed PayPal Site

47% age 14+ receive sexual solicitation that includes attempt to contact the youth offline.

37% of youth have been solicited for sexual pictures of themselves (may constitute a criminal request to produce child pornography).

28% of the targets for online predators are 10-13 yrs.

Only one third of households filter or block web content to protect children.

“Out of 400,000 registered sex offenders in the US, 100,000 of them are missing. They’re supposed to be registered, but we don’t know where they are.” – Ernie Allen, President of the National Center for Missing and Exploited Children.

80% of children willingly share personal information online about themselves and their family in exchange for goods, services and friendship.

34% experienced unwanted exposure to hard sexual material.

Recommendation: Don’t be tricked. Assume the other person is not who he represents himself to be (even if his name is real).

Who’s checking online?◦Parents researching babysitters◦68% of hiring managers◦80% of college admissions officers◦90% of law & med school admissions◦46% of parents researching boyfriends◦38% of parents regarding roommates

Recommendation: Stop? No. Protect your data

Virus: Spreads from one computer to another via executable code

Trojan: Enters computer in guise of a legitimate application and unleashes malicious behavior

Worm: Self-replicates and consumes bandwidth

Adware: Displays unsolicited advertising

Spyware: Monitors user’s online activity and reports confidential information to hacker

Bot: Creates a program to do repetitive tasks

Session hijacker: Uses unsecured computer to hijack a session to gain unauthorized access

Code injection: Injects malicious code to change a program's function.

Root kit: Uses small programs to gain complete control of a system without being detected

Recommendation: Be smart about the websites you visit - and - keep your malware protection up to date (weekly)

Use strong encryption (WPA2) on your network

Don’t advertise your broadcast signal

Watch for war driving vehicles, paint/chalk marks

Recommendation: Don’t submit passwords or personal/ financial data over an open network