Overview
Cyber Security “Buzz Words”
Digital Crimes
Web Surfing
Identity Theft
Social Networking
Protect your IP
Conclusion
Appendix – List of Handy Sources
Cyber Security “Buzz Words”
Malware: Malicious software designed to secretly access a
computer system without the owner's informed consent,
includes:
◊ Computer viruses
◊ Worms
◊ Trojans
◊ Spyware
◊ Adware
◊ Scareware
◊ Malvertising
◊ Rootkits
Source: Wikipedia
A few more terms…
Social Engineering: is the act of manipulating people into
performing actions or divulging confidential information, rather
than by breaking in or using technical cracking techniques.
Pretexting: is the act of creating and using an invented
scenario (the pretext) to engage a targeted victim in a manner
that increases the chance the victim will divulge information or
perform actions that would be unlikely in ordinary
circumstances.
Phishing: Phishing is a criminal mechanism employing both
social engineering and technical tactic to steal consumers’
personal identity and financial account credentials.
Smishing: a combination of SMS texting and phishing.
Vishing: a combination of voice and phishing (target cell and
land-line phones).
Source: Wikipedia
Digital Crimes
Theft of intellectual property
Fraud
Insider threat
Malware
Remote attacks
Crimes against Children
The Internet Crime Complaint Center (IC3) reported that
there were over 314,000 cyber crimes reported in 2011.
Source – IC3
Web Surfing
The next time you surf the Internet, consider this:
Two-thirds (65 percent) of Internet users globally
have fallen victim to cybercrimes, including online
credit-card fraud, identity theft and computer
viruses.
Buyer beware…safe web browsing is the
responsibility of the user NOT the web site
provider.
Do not fall victim to social engineering, phishing,
vishing and or inadvertent download of malware.
Source - Computer Crime Research Center
Identify Theft
11.1 million adults were victims of identity theft
in 2009
The total fraud amount was $54 billion
The average victim spent 21 hours and $373
out of pocket resolving the crime
4.8% of the population was a victim of identity
fraud in 2009
13% of identity fraud crimes were committed by
someone the victim knew
Source: Javelin Strategy & Research
Social Networking
Are you sharing too much:
42% of the people on Facebook post their full
birth dates
16% post their children's names
63% post photos of themselves
7% reveal their home addresses
The number of U.S. households
that use social networks
has doubled in the past year.
Source: Crime-research.org
Protect Your Intellectual Property
Passwords
◊ Do not use the same password for all accounts
Upgrades & Patching
Anti-Virus, Firewalls & Encryption
Wi-Fi Security
◊ Open networks are unprotected
Email Attachments
Buyer beware…“Free” Downloads
◊ Research a company's reputation before
downloading its software or visiting its website
Source: Crime-research.org
Protect Your Intellectual Property
Do not respond to unsolicited e-mails, text
messages or automated voice messages
When buying online, use a legitimate payment
service
Check each seller’s rating and feedback along with
the dates the feedback was posted.
Do not post information that could put you at risk of
being targeted by cybercriminals
Source: FBI
Conclusion
Awareness is key – security starts with YOU!
Appendix – Handy Sources
Internet Crime Complaint Center:
http://www.ic3.gov/default.aspx
Safety On Line: http://www.staysafeonline.org/
FBI Cyber Crime: http://www.fbi.gov/news/stories/story-
index/cyber-crimes
Home Network Security:
http://www.cert.org/tech_tips/home_networks.html
Freedom of Information Act:
http://www.nsa.gov/public_info/foia/index.shtml
Short film - The Dawn of the Net:
http://www.youtube.com/watch?v=H2GkIrWhZeQ