Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
To Fighting Cyber Crime
Education Is The Key
Brought to you by:
Click this icon to tweet information from each slide
Basic Security Terms
Secure Socket Layer (SSL)
This is a secure protocol developed to send information securely
over the I...
What Is Malware?
Malware
Software that is created with the intention
of damaging a computer, mobile device,
computer syste...
Recent Security Attacks
Heartbleed
A vulnerability in the OpenSSL cryptographic software library that could be
exploited t...
Common Security Issues
Phishing
Cyber criminals sending out emails that appear to come from
legitimate websites, but actua...
Best Security Practices
Use strong passwords
and change them regularly
Keep your passwords at least 8
characters long, use...
Proper protection for web
browsing is three layers deep
1. anti-malware (anti-virus)
2. spyware protection
3. URL filterin...
Cyber crime is one of the most popular forms of crime today
Ponemon Institute studies
60 companies in 2013
The report they...
Be careful what you click
Don’t click suspicious links
Never click on links unless you are absolutely certain you know
the...
Brought to you by:
SOURCES:
http://heartbleed.com
http://www.techterms.com
http://www.dhs.gov/cybersecurity-tips
http://di...
Prochain SlideShare
Chargement dans…5
×

Education is the Key to Fighting Cyber Crime

Cyber crime has become one of the most prominent forms of crime throughout the United States, and the world. How can you protect yourself from becoming the latest victim of a cyber attack? Education.

  • Identifiez-vous pour voir les commentaires

Education is the Key to Fighting Cyber Crime

  1. 1. To Fighting Cyber Crime Education Is The Key
  2. 2. Brought to you by:
  3. 3. Click this icon to tweet information from each slide
  4. 4. Basic Security Terms Secure Socket Layer (SSL) This is a secure protocol developed to send information securely over the Internet. Usually used for securing login information. Distributed Denial of Service attack (DDoS) Several systems are coordinated to flood a specific server with a stream of requests at the same time. This can lead to a slow response time on the server, or even no response at all. Botnet Several computers that have been infected with malware and are controlled from a single source, usually without the computer’s owner even realizing it. Botnets can be used to spread viruses, send e-mail spam, crash Web servers with a denial of service attack.
  5. 5. What Is Malware? Malware Software that is created with the intention of damaging a computer, mobile device, computer system, or computer network, or to take partial control over its operation. The name is short for“malicious software.”
  6. 6. Recent Security Attacks Heartbleed A vulnerability in the OpenSSL cryptographic software library that could be exploited to gather login information such as usernames, passwords, account numbers, and other personal and financial information. eBay Hack In May of 2014, eBay revealed that hackers had stolen the personal information of more than 230 million users, including usernames, passwords, phone numbers, and physical addresses. Sony and Target Security Breach The Sony Pictures security breach from late November 2014, and the Target hack from December 2013, are two more high-profile cybercrimes among many others. A study of 60 companies conducted by the Ponemon Institute concluded that the average number of successful attacks experienced by the 60 companies they examined, was two per week, or 104 annually. Cybercrime victims from that report sustained losses averaging $11.6 million. e ay
  7. 7. Common Security Issues Phishing Cyber criminals sending out emails that appear to come from legitimate websites, but actually contain links to false websites designed to steal usernames, passwords, and financial information. Trojan Horse This is a type of program that masquerades as a regular, harmless program; however, if you run these programs, they can do malicious things to your computer, such as write over or delete parts of your hard drive and corrupt your data. Malvertising When attackers embed malicious code into legitimate advertising links, causing those links to then infiltrate malware into the computers of unsuspecting users.
  8. 8. Best Security Practices Use strong passwords and change them regularly Keep your passwords at least 8 characters long, use uppercase and lowercase letters, numbers, and special characters. Install and maintain anti-virus software Never click on suspicious links or URLs
  9. 9. Proper protection for web browsing is three layers deep 1. anti-malware (anti-virus) 2. spyware protection 3. URL filtering (aka web protection — like Blue Coat's K9) Most people only run anti-malware, which isn't enough in today's risk laden web world
  10. 10. Cyber crime is one of the most popular forms of crime today Ponemon Institute studies 60 companies in 2013 The report they published in 2014 revealed an average number of two cyber-attacks per week. That pace amounts to over 100 attacks per year
  11. 11. Be careful what you click Don’t click suspicious links Never click on links unless you are absolutely certain you know their source. Verify that the underlying link to a URL is actually the same as the depicted URL — and that the underlying URL is actually where you want to go on the Web. Beware of phishing emails Phishing emails typically hide the actual URL by displaying a different URL than where the link actually takes you. Avoid unfamiliar senders Don’t click on emails that are from unfamiliar senders, and if a random link arrives from a friend’s email account, verify that they have not been hacked before clicking through it. Mobile devices are especially vulnerable to this because they can't show the underlying URL. Bad Links ?
  12. 12. Brought to you by: SOURCES: http://heartbleed.com http://www.techterms.com http://www.dhs.gov/cybersecurity-tips http://dictionary.reference.com/browse/malware http://www.healthit.gov/providers-professionals/cybersecurity http://www.proofpoint.com/products/targeted-attack-protection/malvertising-protection.php https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888 http://www.forbes.com/sites/jaymcgregor/2014/07/28/the-top-5-most-brutal-cyber-attacks-of-2014-so-far http://www.forbes.com/sites/maggiemcgrath/2014/01/10/taget-data-breach-spilled-info-on-as-many-as-70-million-customers

×