Upload
benedictine-university-at-springfield-communication-arts
View
223
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Janis Rose, CACC CISCO Networking Instructor, Cyber Safety Slides
Citation preview
Redirected link Foreign source Poor English Sense of urgency
Recommendation: Don’t Click! Type the URL
E-Card Phishing Example
The Real PayPal Site
Spoofed PayPal Site
47% age 14+ receive sexual solicitation that includes attempt to contact the youth offline.
37% of youth have been solicited for sexual pictures of themselves (may constitute a criminal request to produce child pornography).
28% of the targets for online predators are 10-13 yrs.
Only one third of households filter or block web content to protect children.
“Out of 400,000 registered sex offenders in the US, 100,000 of them are missing. They’re supposed to be registered, but we don’t know where they are.” – Ernie Allen, President of the National Center for Missing and Exploited Children.
80% of children willingly share personal information online about themselves and their family in exchange for goods, services and friendship.
34% experienced unwanted exposure to hard sexual material.
Recommendation: Don’t be tricked. Assume the other person is not who he represents himself to be (even if his name is real).
Who’s checking online?◦Parents researching babysitters◦68% of hiring managers◦80% of college admissions officers◦90% of law & med school admissions◦46% of parents researching boyfriends◦38% of parents regarding roommates
Recommendation: Stop? No. Protect your data
Virus: Spreads from one computer to another via executable code
Trojan: Enters computer in guise of a legitimate application and unleashes malicious behavior
Worm: Self-replicates and consumes bandwidth
Adware: Displays unsolicited advertising
Spyware: Monitors user’s online activity and reports confidential information to hacker
Bot: Creates a program to do repetitive tasks
Session hijacker: Uses unsecured computer to hijack a session to gain unauthorized access
Code injection: Injects malicious code to change a program's function.
Root kit: Uses small programs to gain complete control of a system without being detected
Recommendation: Be smart about the websites you visit - and - keep your malware protection up to date (weekly)
Use strong encryption (WPA2) on your network
Don’t advertise your broadcast signal
Watch for war driving vehicles, paint/chalk marks
Recommendation: Don’t submit passwords or personal/ financial data over an open network