cyber security awareness program

Post on 26-Jan-2017

184 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Five Top Cyber Security Threats,Tips, Statistics and Cyber Security Academic

Programs

Cyber Security Awareness

10/20/15 Cyber Security Talk – (at Presented High School)

Computer Science Department Iona College

Presented by Computer Science Students Advised by Dr. Paolina Centonze

Cyber Security Panel 3

410/20/15

• Cyber threats are the number one danger to national security

• $9,000 average cost of a cyber attack (in 2014)

5

6

Our Lives Depend on Electronic Devices

What if you swipe your credit card (mobile transaction payment) and a hacker steals your credit card number or even your identity?

What if your personal health information, accessible to your healthcare provider or hospital, becomes also accessible to your employer?

What if your business is brought to a halt because of a Cyber Security attack? In Feb. 2104, President Obama said: “Our critical infrastructure continues to be at risk from

threats in cyberspace, and our economy is harmed by the theft of our intellectual property.”

ValiSoft: Electronic Transaction

7

1. Malware Malware is any computer virus, or

malicious software, that can harm a user’s computer

May include spyware, which allows digital hackers to track and to view the users’ passwords entered on the Internet

Consumers get tricked into downloading malware very easily

Criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites

Siliconangel.com

10/20/15

8

HOW TO PROTECT YOURSELF

Install antivirus and antispyware programs from a trusted source (such as McAfee, Norton)

Use strong password protection Never turn off your firewall Be careful when using flash or

thumb devices Keep of your software updated Beware of suspicious links

even when come from friends Under-linux.com

Malware Protection Tips

10/20/15

9

2. Spam Spam is the email equivalent

of junk mail It can do more than clutter up

a user’s inbox It can contain a link or an

attachment It can be used to defraud

those close to you The CAN-SPAM Act was set

up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation

ESET.com

10/20/15

10

Keep your e-mail private Check out privacy policies

when you submit your personal information to a website

Use an email filter to weed it out

Install an antispam softwareESET.com

HOW TO PROTECT YOURSELF

Spam Protection Tips

10/20/15

11

3. Hacked Accounts Through Fishing

Hackers to gain control of consumers’ personal information is through digital crimes known as “phishing”

Fraudsters create an email that looks like it was issued from a legitimate company

They will ask for a recipient’s personal information (an account number or password)

They use social engineering techniques to gain user’s trust ubergizmo.com

10/20/15

12

Set secure password that don’t use common words, names and personal info

Keep your browser, operating system, and antivirus up to date

Verify that a request for your data comes from a particular company (see padlock URLS)

Don’t publish identify information like your birthday on social networks

ESET.com

HOW TO PROTECT YOURSELF

Hacked Account Protection Tips

ubergizmo.com

10/20/15

13

4. Unsecure Home Wireless Networks We all use home wireless

Internet networks to connect our TVs, smartphones, laptops, computers and tablets

Without certain protections, cyber criminals in the area may be able to Access the Internet through

your network Gain access to your computer

and other devices Mount cyber security attacks

from your home network against remote websites

ubergizmo.com10/20/15

14

Connect a cable or DLS modem to a wireless router securely

Change the preset password Change, and do not publish,

the preset Service Set Identifier (SSID) used to identifier for your network

Choose the highest level security option

Use a computer firewall

HOW TO PROTECT YOURSELF

Unsecure Network Protection Tips

iphonejd.com10/20/15

15

5. Data Gone AWOL Smart devices are very easy to lose and data

can end up in the hands of cybercriminals (if data not encrypted)

45% of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich.

YouSendIt, Dropbox and other Internet (cloud based) of file sharing tools by employees, raise the risk that confidential corporate data will be leaked, according to Ponemon

We may fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café

Apple.com10/20/15

16

Use a virtual private network (VPN) in a public place

Do not conduct financial transactions on unsecured networks

Use one time passwords for accounts like Facebook when using unsecure wireless

HOW TO PROTECT YOURSELF

Data Gone AWOL Protection Tips

avast.com

10/20/15

1810/20/15

Web and Mobile Threats Statistics Report 4th Quarter 2013

200 new threats every minutes

more than 3 every second

Cyber Security Panel 19

Cyber Security Panel 2010/18/14

21

22

Latest Malware Attacks Statistics

Report by AV-TEST 2014-2015

10/20/15

AV-Test Institute: Total Malware

• 12 million fresh strains of malware detected every month

• Analysis reveled that every second four samples are available in the wild

• Total number of threats caught in 2014 – 325 + million pieces were analyzed during the

month of December alone• > 390,000 new malicious programs every day

Malware Statistics2014

25

Stop.Think.Connect a DHS campaign for national cyber security awareness

10/20/15

2610/20/20

visit: https://www.nsa.gov/academia/early_opportunities/index.shtml

BS, BA, MS, and5-year Programs

in Computer Science with Concentration

in Cyber Security

2810/20/15

Cyber Security Panel 2910/18/14

30

Main Courses for Cyber Security • Math

– Calculus– Discrete– Algebra– Mathematical Thinking

• Computer– Operating Systems– Software Development– Computer Architecture– Networking– Distributes Systems

• Security:– Software Design and Development – Cryptography – Networking – Mobile Application Development – Web Application Development

10/20/15

31

Sited Sources

• Microsoft• Department of Homeland Security (DHS)• Federal Trade Commission• National Cyber Security Alliance• McAfee • AV-TEST

10/20/15

top related