cyber security “lets fight against cyber crime” tanya drummond shamia tooson john fashakin...

26
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Upload: barbara-mills

Post on 04-Jan-2016

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

CYBER SECURITY

“LETS FIGHT AGAINST CYBER CRIME”

Tanya DrummondShamia ToosonJohn Fashakin

Alexander Skiba

Page 2: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

AGENDA Brief overview on cybersecurity and some history Cybercrime and some common types Why is cybersecurity important? Practical personal and business cybersecurity measures

Page 3: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Cyber Security refers to the technologies and processes designed to

protect computers, networks and data from unauthorized access,

vulnerabilities and attacks delivered via the internet by cyber

criminals.

WHAT IS CYBER SECURITY?

Page 4: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Communication security-protecting organization communication technology, media and content.

Network Security- is the protection of networking components, connection and content.

Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information.

OTHER TYPES OF SECURITY INCLUDES…..

Page 5: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

The first recorded cyber crime took place in 1820

The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner

The first Spam email took place in 1978 when it was sent over the Arpanet

HISTORY AND INTERESTING FACTS

Page 6: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50.000 worth of damages

In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars

In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars.

46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $781.84 million.

HISTORY AND INTERESTING FACTS CONTINUED……

Page 7: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime.

The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect.

The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect

Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues

Malicious programs

CYBER CRIME

Page 8: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

HACKING

DENIAL OF SERVICE ATTACK

VIRUS DISSEMINATION

COMPUTER VANDALISM

CYBER TERRORISM

SOFTWARE PIRACY

FRAUD

TYPES OF CYBER CRIMES

Page 9: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Hacking means an illegal intrusion into a computer system and/or network

Also known as CRACKING

Government websites are the hot target of hackers due to the type of press coverage it receives.

Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset

HACKING

Page 10: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

This act is committed by the criminal, who floods the bandwidth of the victims

network or fills ones e-mail box with spam mail depriving an individual of

services they are entitled to access or provide.

DENIAL OF SERVICE ATTACK

Page 11: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Damaging or destroying data rather than stealing or misusing them is called

cyber vandalism.

These are programs that attach themselves to a file and then circulate by some

channel like email.

COMPUTER VANDALISM

Page 12: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Terrorist attacks on the internet is by distributed denial of service attacks, hate

websites and hate emails, attacks on sensitive computer networks. Terrorists

that are extremely technology savvy are using 512-bit encryption which is

impossible to decrypt.

CYBER TERRORISM

Page 13: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Theft of software through the illegal copying of genuine programs or the

counterfeiting and distribution of products intended to pass for the original.

SOFTWARE PIRACY

Page 14: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Malicious software that attaches itself to other software. VIRUS, WORMS,

TROJAN HORSE, WEB JACKING, EMAIL BOMBING ect are all examples.

VIRUS DISSEMINATION

Page 15: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card.

Types of credit card fraud are online credit card fraud, advance payments, stolen card numbers.

The lack of face-to-face or voice interaction on the Internet provides fraudsters anonymity.

Some thieves may go through the trash to find billing statements then use account information to buy things.

Advanced payment is someone using a forged or counterfeit check, then an advance or overpayment is made on a stolen credit card. Because the issuer must credit the payment at the time it is made, there is no time to verify the authenticity of the check.

FRAUD

Page 16: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Internet security is a branch of computer security specifically related to the internet.

Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet.

WHY CYBERSECURITY?

Page 17: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

VIDEO

Page 18: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Defend us from critical attacks

It helps us browse safe websites

Internet security processes all the incoming and outgoing data on our computer

Security will defend us from hacks and viruses

ADVANTAGES OF CYBER SECURITY

Page 19: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Use antivirus software's and keep them up to date!

Insert firewalls

Uninstall unnecessary software

Maintain backup

Check security settings

NEVER give your full name or address to strangers

Learn more about internet privacy

SECURITY

Page 20: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

Keep your operating system up to date with critical security updates and patches

Never open emails or attachments from unknown sources

Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST!

Back up your computer data on disks or cds often

PROTECT WIFI PASSWORD

DON’T share access to your computers with strangers

SECURITY CONTINUED

Page 21: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking

For software: Secure coding practice, code obfuscation, secure design and development, formal methods

For network: Firewall, intrusion prevention and detection, VPN, encryption

SECURITY FOR BUSINESS

Page 22: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME.

So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security.

CONCLUDING REMARKS

Page 23: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO

USE AND CHANGE IT EVERY FEW MONTHS.

LAST WORDS

Page 24: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

REFERENCES"2014 State of Risk Report." Trustwave, 1 Jan. 2014. Web. 6 Apr. 2015.

<https://www2.trustwave.com/rs/trustwave/images/2014_TW_StateofRiskReport.pdf>.

Balan, Lăcrămioara, AND Popescu, Mihai. “Credit card fraud” The USV Annals of Economics and Public Administration [Online], 11 9 Sep 2011.

Conner, Marcia. "Data on Big Data." Marc!a Conner. 18 July 2013. Web. 6 Apr. 2015.

Cybersecurity Basics - Level 3 Whiteboard Video. Level 3 Communications, 2012. Film.

Page 25: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

REFERENCES CONT.Hansen, L. and Nissenbaum, H. (2009), Digital Disaster, Cyber Security, and the

Copenhagen School. International Studies Quarterly, 53: 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x

Jang-Jaccard, Julian, and Surya Nepal. "A Survey Of Emerging Threats In Cybersecurity." Journal Of Computer And System Sciences 5 (2014): 973. Academic OneFile. Web. 14 Apr. 2015.

Roeder, D. Bruce. "Cybersecurity." Military Review 92.3 (2014): 38-42. MasterFILE Elite. Web. 14 Apr. 2015.

Schiff, Jennifer L. "6 Biggest Business Security Risks and How You Can Fight Back." CIO. CIO, 20 Jan. 2015. Web. 6 Apr. 2015.

Superior Ecommerce Analytics. Digital image. Evermerchant. 1 Jan. 2015. Web.

Page 26: CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba

REFERENCES CONT.Walters, Riley. "Cyber Attacks on U.S. Companies in 2014." The Heritage

Foundation. The Heritage Foundation, 27 Oct. 2014. Web. 2 Apr. 2015.