12
Redirected link Foreign source Poor English Sense of urgency Recommendation: Don’t Click! Type the URL

Teaching Cyber Safety

Embed Size (px)

DESCRIPTION

Janis Rose, CACC CISCO Networking Instructor, Cyber Safety Slides

Citation preview

Page 1: Teaching Cyber Safety

Redirected link Foreign source Poor English Sense of urgency

Recommendation: Don’t Click! Type the URL

Page 2: Teaching Cyber Safety

E-Card Phishing Example

Page 3: Teaching Cyber Safety

The Real PayPal Site

Page 4: Teaching Cyber Safety

Spoofed PayPal Site

Page 5: Teaching Cyber Safety

47% age 14+ receive sexual solicitation that includes attempt to contact the youth offline.

37% of youth have been solicited for sexual pictures of themselves (may constitute a criminal request to produce child pornography).

Page 6: Teaching Cyber Safety

28% of the targets for online predators are 10-13 yrs.

Only one third of households filter or block web content to protect children.

“Out of 400,000 registered sex offenders in the US, 100,000 of them are missing. They’re supposed to be registered, but we don’t know where they are.” – Ernie Allen, President of the National Center for Missing and Exploited Children.

Page 7: Teaching Cyber Safety

80% of children willingly share personal information online about themselves and their family in exchange for goods, services and friendship.

34% experienced unwanted exposure to hard sexual material.

Recommendation: Don’t be tricked. Assume the other person is not who he represents himself to be (even if his name is real).

Page 8: Teaching Cyber Safety

Who’s checking online?◦Parents researching babysitters◦68% of hiring managers◦80% of college admissions officers◦90% of law & med school admissions◦46% of parents researching boyfriends◦38% of parents regarding roommates

Recommendation: Stop? No. Protect your data

Page 9: Teaching Cyber Safety

Virus: Spreads from one computer to another via executable code

Trojan: Enters computer in guise of a legitimate application and unleashes malicious behavior

Worm: Self-replicates and consumes bandwidth

Adware: Displays unsolicited advertising

Page 10: Teaching Cyber Safety

Spyware: Monitors user’s online activity and reports confidential information to hacker

Bot: Creates a program to do repetitive tasks

Session hijacker: Uses unsecured computer to hijack a session to gain unauthorized access

Code injection: Injects malicious code to change a program's function.

Page 11: Teaching Cyber Safety

Root kit: Uses small programs to gain complete control of a system without being detected

Recommendation: Be smart about the websites you visit - and - keep your malware protection up to date (weekly)

Page 12: Teaching Cyber Safety

Use strong encryption (WPA2) on your network

Don’t advertise your broadcast signal

Watch for war driving vehicles, paint/chalk marks

Recommendation: Don’t submit passwords or personal/ financial data over an open network