SlideShare une entreprise Scribd logo
1  sur  18
Cyber Security
        By:
     Josh Hall
Security…what is it and why do we
             need it?
• Kizza defines security as “…a means to prevent
  unauthorized access, use, alteration, and theft
  or physical damage to property.” (Kizza, 2010)
• only “6 incidents in 1988” (Kizza, 2010).
• it is estimated that “34,754 incidents’ of
  computer crimes reported between Q1-Q3”
  (Kizza, 2010)
• That’s a 5792 percent increase in 13 years!
Protecting yourself
• Most common types of security:
 – Passwords
 – Anti-virus/spyware/malware
 – Social engineering the new threat!
HATE MALWARE?
• Have you ever encountered viruses, Trojan
  Horses, hacked backgrounds, malware and
  false positives, or scare ware.
• If you haven’t heard of these terms give your
  wallets/purses to a stranger
• Consequences of ignorance:
  – Identity theft
  – Corrupted files
  – Theft of personal data
Is this your password?
• If for any reason you see your   •   Nicole
  password here please change      •   Daniel
  it:                              •   babygirl
• 123456                           •   monkey
• 12345                            •   Jessica
• 123456789                        •   lovely
• password                         •   Michael
• i love you                       •   654321
• princess                         •   Ashley
• rockyou                          •   Qwertz
• 1234567                          •   Source: (Stine1, 2010)
• 12345678,                        •   These are one fifth of all
• abc123,                              passwords in use
Complex passwords: How To
• “An ideal password is long and   • “Complex passwords are
  has letters, punctuation,
  symbols, and numbers.”             safer.
  (Microsoft)                      • Complexpasswordsaresafer.
• “Start with a sentence or two.
• Remove the space between
                                   • ComplekspasswordsRsafer.
  the words in the sentence.       • ComplekspasswordsRsafer2
• Turn words into shorthand or       011.”
  intentionally misspell a word.
• Add length with numbers. Put
  numbers that are meaningful
  to you after the sentence.”
  (Microsoft)
• Personal recommendation add
  special characters: &*%#*
Why do we need Anti-Virus?
• Kizza defines a computer virus as “A computer
  virus, defined as a self-propagating computer
  program designed to alter or destroy a
  computer system resource…” (Kizza, 2010).
• It gets worse according to PRLog “… in 2008, it
  was estimated the number of known
  computer viruses stood at in excess of 1
  million, an increase of 468 per cent on the
  previous year…” (PRLog, 2011)
Why do we need Anti-Virus? (cont.)
• How bad is it really?
• “Figures suggest at least five malware samples
  emerge on the Internet every two minutes
  and 15 to 20 new Trojans are released every
  half an hour.” (PRLog, 2011)
• That’s 3600 new malware samples and 720 to
  960 Trojans in one day!
Financial Help
• Anti-virus is very cheap
• “30-50 dollars (basic) to 60-80 dollars
  (comprehensive)” (CostHelper, 2011)
• Cost effective
• “Virus & Spyware Removal: $199.99” (Geek
  Squad).
• 120 dollar savings
Social Engineering or how to hack a
                human
• “We define it as the act of manipulating a person to
  accomplish goals that may or may not be in the
  “target’s” best interest. This may include obtaining
  information, gaining access, or getting the target to
  take certain action.” (Social Engineer)
• “Virus writers use social engineering tactics to
  persuade people to run malware-laden email
  attachments, phishers use social engineering to
  convince people to divulge sensitive information, and
  scareware vendors use social engineering to frighten
  people into running software that is useless at best and
  dangerous at worst.” (Search Security, 2011)
Social Engineering or how to hack a
              human cont.
• http://www.social-engineer.org/
The myth of cyber security
• "The only thing you can do is build the fence
  higher and higher so that eventually it's not
  worth it to climb over." (Goldman, 2011).
• Basically don’t make it easy the harder a
  target you are the less they’ll want to try
Notable Attacks
• This is not meant to scare you however
• NASDAQ computers have been penetrated
• "So far, [the perpetrators] appear to have just
  been looking around," said one person involved
  in the Nasdaq matter. Another person familiar
  with the case said the incidents were, for a
  computer network, the equivalent of someone
  sneaking into a house and walking around but—
  apparently, so far—not taking or tampering with
  anything.” (Barrett, 2011)
CA Hacking
• A CA (certification authority) was hacked by
  an independent Iranian student loyalist.
• Certification authorities are organizations that
  certify if a site is trustworthy or not so you can
  ensure your data is safe, secure, and
  confidential
Hard to say goodbye
• After such an eventful and exciting
  presentation this report leaves you with one
  last thought
• If we go forth with a vigilant, aware, and
  renewed spirit in security we can hopefully
  one day take back the privacy of our data and
  end this age of fear and uncertainty.
Questions
• Do you feel we will ever be 100% secure?
• Do you think companies are doing enough to
  protect data?
• What security measures/software do you
  employ?
• What do you think of social engineering
Works Cited
•   Barrett, D. (2011, February 5). Hackers Penetrate Nasdaq Computers. Retrieved November 13,
    2011, from WSJ.com:
    http://online.wsj.com/article/SB10001424052748704709304576124502351634690.html
•   Bright, P. (2011, March 28). Independent Iranian Hacker Claims Responsibility for Comodo Hack.
    Retrieved November 13, 2011, from Wired.com:
    http://www.wired.com/threatlevel/2011/03/comodo_hack/
•   CostHelper. (2011, June). Anti-Virus Software Cost. Retrieved November 6, 2011, from CostHelper:
    http://www.costhelper.com/cost/computers/anti-virus-software.html
•   Geek Squad. (n.d.). Virus & Spyware Removal . Retrieved November 6, 2011, from Geek Squad:
    http://www.geeksquad.com/services/computers-networking/virus-and-spyware-removal.aspx
•   Goldman, D. (2011, August 5). Online security doesn't exist . Retrieved November 13, 2011, from
    CNNMoney.com:
    http://money.cnn.com/2011/08/05/technology/cybersecurity_myth/index.htm?source=yahoo_quo
    te
•   Kizza, J. M. (2010). Ethical and Social Issues in the Information Age. London: Springer.
•   Microsoft. (n.d.). Create Strong Passwords. Retrieved November 6, 2011, from Microsoft.com:
    http://www.microsoft.com/security/online-privacy/passwords-create.aspx
Works Cited
• PRLog. (2011, July 24). Number of known computer viruses exceeds
  1 million. Retrieved November 6, 2011, from PRLog:
  http://www.prlog.org/10814398-number-of-known-computer-
  viruses-exceeds-1-million.html
• Search Security. (2011, March). What is Social Engineering.
  Retrieved November 6, 2011, from Search Security:
  http://searchsecurity.techtarget.com/definition/social-engineering
• Social Engineer. (n.d.). The Official Social Engineering Portal.
  Retrieved November 2011, 6, from Social Engineering:
  http://www.social-engineer.org/
• Stine1. (2010, November 3). 20 Worst and Most used Passwords.
  Retrieved November 6th, 2011, from Computer Sight:
  http://computersight.com/communication-networks/security/the-
  20-worst-and-most-used-passwords/

Contenu connexe

Tendances

Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaChandan Singh Ghodela
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trendsYi-Lang Tsai
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of DisinformationSara-Jayne Terp
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 

Tendances (20)

Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Information security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh GhodelaInformation security & data security | Chandan Singh Ghodela
Information security & data security | Chandan Singh Ghodela
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Cybersecurity fundamental
Cybersecurity fundamentalCybersecurity fundamental
Cybersecurity fundamental
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of Disinformation
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 

Similaire à Technology in a global society presentation

Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011Xavier Mertens
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Computer security and awareness
Computer security and awarenessComputer security and awareness
Computer security and awarenessRichard Bartlett
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 

Similaire à Technology in a global society presentation (20)

Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Computer security and awareness
Computer security and awarenessComputer security and awareness
Computer security and awareness
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Plus de delmount

Expanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audioExpanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audiodelmount
 
Expanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audioExpanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audiodelmount
 
Effect of the singularity on social institutions in
Effect of the singularity on social institutions inEffect of the singularity on social institutions in
Effect of the singularity on social institutions indelmount
 
Student symposium jennifer dahlstrom
Student symposium jennifer dahlstromStudent symposium jennifer dahlstrom
Student symposium jennifer dahlstromdelmount
 
Anita sampson's symposium powerpoint
Anita sampson's symposium powerpointAnita sampson's symposium powerpoint
Anita sampson's symposium powerpointdelmount
 
Department webpage design sean hwang
Department webpage design sean hwangDepartment webpage design sean hwang
Department webpage design sean hwangdelmount
 
Vernaz symposium presentation
Vernaz symposium presentationVernaz symposium presentation
Vernaz symposium presentationdelmount
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullyingdelmount
 

Plus de delmount (8)

Expanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audioExpanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audio
 
Expanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audioExpanding residential real estate in ghana and uganda with audio
Expanding residential real estate in ghana and uganda with audio
 
Effect of the singularity on social institutions in
Effect of the singularity on social institutions inEffect of the singularity on social institutions in
Effect of the singularity on social institutions in
 
Student symposium jennifer dahlstrom
Student symposium jennifer dahlstromStudent symposium jennifer dahlstrom
Student symposium jennifer dahlstrom
 
Anita sampson's symposium powerpoint
Anita sampson's symposium powerpointAnita sampson's symposium powerpoint
Anita sampson's symposium powerpoint
 
Department webpage design sean hwang
Department webpage design sean hwangDepartment webpage design sean hwang
Department webpage design sean hwang
 
Vernaz symposium presentation
Vernaz symposium presentationVernaz symposium presentation
Vernaz symposium presentation
 
Facebook and bullying
Facebook and bullyingFacebook and bullying
Facebook and bullying
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Technology in a global society presentation

  • 1. Cyber Security By: Josh Hall
  • 2. Security…what is it and why do we need it? • Kizza defines security as “…a means to prevent unauthorized access, use, alteration, and theft or physical damage to property.” (Kizza, 2010) • only “6 incidents in 1988” (Kizza, 2010). • it is estimated that “34,754 incidents’ of computer crimes reported between Q1-Q3” (Kizza, 2010) • That’s a 5792 percent increase in 13 years!
  • 3. Protecting yourself • Most common types of security: – Passwords – Anti-virus/spyware/malware – Social engineering the new threat!
  • 4. HATE MALWARE? • Have you ever encountered viruses, Trojan Horses, hacked backgrounds, malware and false positives, or scare ware. • If you haven’t heard of these terms give your wallets/purses to a stranger • Consequences of ignorance: – Identity theft – Corrupted files – Theft of personal data
  • 5. Is this your password? • If for any reason you see your • Nicole password here please change • Daniel it: • babygirl • 123456 • monkey • 12345 • Jessica • 123456789 • lovely • password • Michael • i love you • 654321 • princess • Ashley • rockyou • Qwertz • 1234567 • Source: (Stine1, 2010) • 12345678, • These are one fifth of all • abc123, passwords in use
  • 6. Complex passwords: How To • “An ideal password is long and • “Complex passwords are has letters, punctuation, symbols, and numbers.” safer. (Microsoft) • Complexpasswordsaresafer. • “Start with a sentence or two. • Remove the space between • ComplekspasswordsRsafer. the words in the sentence. • ComplekspasswordsRsafer2 • Turn words into shorthand or 011.” intentionally misspell a word. • Add length with numbers. Put numbers that are meaningful to you after the sentence.” (Microsoft) • Personal recommendation add special characters: &*%#*
  • 7. Why do we need Anti-Virus? • Kizza defines a computer virus as “A computer virus, defined as a self-propagating computer program designed to alter or destroy a computer system resource…” (Kizza, 2010). • It gets worse according to PRLog “… in 2008, it was estimated the number of known computer viruses stood at in excess of 1 million, an increase of 468 per cent on the previous year…” (PRLog, 2011)
  • 8. Why do we need Anti-Virus? (cont.) • How bad is it really? • “Figures suggest at least five malware samples emerge on the Internet every two minutes and 15 to 20 new Trojans are released every half an hour.” (PRLog, 2011) • That’s 3600 new malware samples and 720 to 960 Trojans in one day!
  • 9. Financial Help • Anti-virus is very cheap • “30-50 dollars (basic) to 60-80 dollars (comprehensive)” (CostHelper, 2011) • Cost effective • “Virus & Spyware Removal: $199.99” (Geek Squad). • 120 dollar savings
  • 10. Social Engineering or how to hack a human • “We define it as the act of manipulating a person to accomplish goals that may or may not be in the “target’s” best interest. This may include obtaining information, gaining access, or getting the target to take certain action.” (Social Engineer) • “Virus writers use social engineering tactics to persuade people to run malware-laden email attachments, phishers use social engineering to convince people to divulge sensitive information, and scareware vendors use social engineering to frighten people into running software that is useless at best and dangerous at worst.” (Search Security, 2011)
  • 11. Social Engineering or how to hack a human cont. • http://www.social-engineer.org/
  • 12. The myth of cyber security • "The only thing you can do is build the fence higher and higher so that eventually it's not worth it to climb over." (Goldman, 2011). • Basically don’t make it easy the harder a target you are the less they’ll want to try
  • 13. Notable Attacks • This is not meant to scare you however • NASDAQ computers have been penetrated • "So far, [the perpetrators] appear to have just been looking around," said one person involved in the Nasdaq matter. Another person familiar with the case said the incidents were, for a computer network, the equivalent of someone sneaking into a house and walking around but— apparently, so far—not taking or tampering with anything.” (Barrett, 2011)
  • 14. CA Hacking • A CA (certification authority) was hacked by an independent Iranian student loyalist. • Certification authorities are organizations that certify if a site is trustworthy or not so you can ensure your data is safe, secure, and confidential
  • 15. Hard to say goodbye • After such an eventful and exciting presentation this report leaves you with one last thought • If we go forth with a vigilant, aware, and renewed spirit in security we can hopefully one day take back the privacy of our data and end this age of fear and uncertainty.
  • 16. Questions • Do you feel we will ever be 100% secure? • Do you think companies are doing enough to protect data? • What security measures/software do you employ? • What do you think of social engineering
  • 17. Works Cited • Barrett, D. (2011, February 5). Hackers Penetrate Nasdaq Computers. Retrieved November 13, 2011, from WSJ.com: http://online.wsj.com/article/SB10001424052748704709304576124502351634690.html • Bright, P. (2011, March 28). Independent Iranian Hacker Claims Responsibility for Comodo Hack. Retrieved November 13, 2011, from Wired.com: http://www.wired.com/threatlevel/2011/03/comodo_hack/ • CostHelper. (2011, June). Anti-Virus Software Cost. Retrieved November 6, 2011, from CostHelper: http://www.costhelper.com/cost/computers/anti-virus-software.html • Geek Squad. (n.d.). Virus & Spyware Removal . Retrieved November 6, 2011, from Geek Squad: http://www.geeksquad.com/services/computers-networking/virus-and-spyware-removal.aspx • Goldman, D. (2011, August 5). Online security doesn't exist . Retrieved November 13, 2011, from CNNMoney.com: http://money.cnn.com/2011/08/05/technology/cybersecurity_myth/index.htm?source=yahoo_quo te • Kizza, J. M. (2010). Ethical and Social Issues in the Information Age. London: Springer. • Microsoft. (n.d.). Create Strong Passwords. Retrieved November 6, 2011, from Microsoft.com: http://www.microsoft.com/security/online-privacy/passwords-create.aspx
  • 18. Works Cited • PRLog. (2011, July 24). Number of known computer viruses exceeds 1 million. Retrieved November 6, 2011, from PRLog: http://www.prlog.org/10814398-number-of-known-computer- viruses-exceeds-1-million.html • Search Security. (2011, March). What is Social Engineering. Retrieved November 6, 2011, from Search Security: http://searchsecurity.techtarget.com/definition/social-engineering • Social Engineer. (n.d.). The Official Social Engineering Portal. Retrieved November 2011, 6, from Social Engineering: http://www.social-engineer.org/ • Stine1. (2010, November 3). 20 Worst and Most used Passwords. Retrieved November 6th, 2011, from Computer Sight: http://computersight.com/communication-networks/security/the- 20-worst-and-most-used-passwords/