12
Cyber Security Patricia Watson [email protected] Digital Forensics Program Manager March 2013

Cyber Security | Patricia Watson

Embed Size (px)

Citation preview

Page 1: Cyber Security | Patricia Watson

Cyber Security

Patricia Watson [email protected]

Digital Forensics Program Manager

March 2013

Page 2: Cyber Security | Patricia Watson

Overview

Cyber Security “Buzz Words”

Digital Crimes

Web Surfing

Identity Theft

Social Networking

Protect your IP

Conclusion

Appendix – List of Handy Sources

Page 3: Cyber Security | Patricia Watson

Cyber Security “Buzz Words”

Malware: Malicious software designed to secretly access a

computer system without the owner's informed consent,

includes:

◊ Computer viruses

◊ Worms

◊ Trojans

◊ Spyware

◊ Adware

◊ Scareware

◊ Malvertising

◊ Rootkits

Source: Wikipedia

Page 4: Cyber Security | Patricia Watson

A few more terms…

Social Engineering: is the act of manipulating people into

performing actions or divulging confidential information, rather

than by breaking in or using technical cracking techniques.

Pretexting: is the act of creating and using an invented

scenario (the pretext) to engage a targeted victim in a manner

that increases the chance the victim will divulge information or

perform actions that would be unlikely in ordinary

circumstances.

Phishing: Phishing is a criminal mechanism employing both

social engineering and technical tactic to steal consumers’

personal identity and financial account credentials.

Smishing: a combination of SMS texting and phishing.

Vishing: a combination of voice and phishing (target cell and

land-line phones).

Source: Wikipedia

Page 5: Cyber Security | Patricia Watson

Digital Crimes

Theft of intellectual property

Fraud

Insider threat

Malware

Remote attacks

Crimes against Children

The Internet Crime Complaint Center (IC3) reported that

there were over 314,000 cyber crimes reported in 2011.

Source – IC3

Page 6: Cyber Security | Patricia Watson

Web Surfing

The next time you surf the Internet, consider this:

Two-thirds (65 percent) of Internet users globally

have fallen victim to cybercrimes, including online

credit-card fraud, identity theft and computer

viruses.

Buyer beware…safe web browsing is the

responsibility of the user NOT the web site

provider.

Do not fall victim to social engineering, phishing,

vishing and or inadvertent download of malware.

Source - Computer Crime Research Center

Page 7: Cyber Security | Patricia Watson

Identify Theft

11.1 million adults were victims of identity theft

in 2009

The total fraud amount was $54 billion

The average victim spent 21 hours and $373

out of pocket resolving the crime

4.8% of the population was a victim of identity

fraud in 2009

13% of identity fraud crimes were committed by

someone the victim knew

Source: Javelin Strategy & Research

Page 8: Cyber Security | Patricia Watson

Social Networking

Are you sharing too much:

42% of the people on Facebook post their full

birth dates

16% post their children's names

63% post photos of themselves

7% reveal their home addresses

The number of U.S. households

that use social networks

has doubled in the past year.

Source: Crime-research.org

Page 9: Cyber Security | Patricia Watson

Protect Your Intellectual Property

Passwords

◊ Do not use the same password for all accounts

Upgrades & Patching

Anti-Virus, Firewalls & Encryption

Wi-Fi Security

◊ Open networks are unprotected

Email Attachments

Buyer beware…“Free” Downloads

◊ Research a company's reputation before

downloading its software or visiting its website

Source: Crime-research.org

Page 10: Cyber Security | Patricia Watson

Protect Your Intellectual Property

Do not respond to unsolicited e-mails, text

messages or automated voice messages

When buying online, use a legitimate payment

service

Check each seller’s rating and feedback along with

the dates the feedback was posted.

Do not post information that could put you at risk of

being targeted by cybercriminals

Source: FBI

Page 11: Cyber Security | Patricia Watson

Conclusion

Awareness is key – security starts with YOU!