cyber security awareness program
TRANSCRIPT
1
Five Top Cyber Security Threats,Tips, Statistics and Cyber Security Academic
Programs
Cyber Security Awareness
10/20/15 Cyber Security Talk – (at Presented High School)
Computer Science Department Iona College
Presented by Computer Science Students Advised by Dr. Paolina Centonze
2Live Cyber Attacks click here: threatmap.fortiguard.com
Cyber Security Panel 3
410/20/15
• Cyber threats are the number one danger to national security
• $9,000 average cost of a cyber attack (in 2014)
5
6
Our Lives Depend on Electronic Devices
What if you swipe your credit card (mobile transaction payment) and a hacker steals your credit card number or even your identity?
What if your personal health information, accessible to your healthcare provider or hospital, becomes also accessible to your employer?
What if your business is brought to a halt because of a Cyber Security attack? In Feb. 2104, President Obama said: “Our critical infrastructure continues to be at risk from
threats in cyberspace, and our economy is harmed by the theft of our intellectual property.”
ValiSoft: Electronic Transaction
7
1. Malware Malware is any computer virus, or
malicious software, that can harm a user’s computer
May include spyware, which allows digital hackers to track and to view the users’ passwords entered on the Internet
Consumers get tricked into downloading malware very easily
Criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites
Siliconangel.com
10/20/15
8
HOW TO PROTECT YOURSELF
Install antivirus and antispyware programs from a trusted source (such as McAfee, Norton)
Use strong password protection Never turn off your firewall Be careful when using flash or
thumb devices Keep of your software updated Beware of suspicious links
even when come from friends Under-linux.com
Malware Protection Tips
10/20/15
9
2. Spam Spam is the email equivalent
of junk mail It can do more than clutter up
a user’s inbox It can contain a link or an
attachment It can be used to defraud
those close to you The CAN-SPAM Act was set
up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation
ESET.com
10/20/15
10
Keep your e-mail private Check out privacy policies
when you submit your personal information to a website
Use an email filter to weed it out
Install an antispam softwareESET.com
HOW TO PROTECT YOURSELF
Spam Protection Tips
10/20/15
11
3. Hacked Accounts Through Fishing
Hackers to gain control of consumers’ personal information is through digital crimes known as “phishing”
Fraudsters create an email that looks like it was issued from a legitimate company
They will ask for a recipient’s personal information (an account number or password)
They use social engineering techniques to gain user’s trust ubergizmo.com
10/20/15
12
Set secure password that don’t use common words, names and personal info
Keep your browser, operating system, and antivirus up to date
Verify that a request for your data comes from a particular company (see padlock URLS)
Don’t publish identify information like your birthday on social networks
ESET.com
HOW TO PROTECT YOURSELF
Hacked Account Protection Tips
ubergizmo.com
10/20/15
13
4. Unsecure Home Wireless Networks We all use home wireless
Internet networks to connect our TVs, smartphones, laptops, computers and tablets
Without certain protections, cyber criminals in the area may be able to Access the Internet through
your network Gain access to your computer
and other devices Mount cyber security attacks
from your home network against remote websites
ubergizmo.com10/20/15
14
Connect a cable or DLS modem to a wireless router securely
Change the preset password Change, and do not publish,
the preset Service Set Identifier (SSID) used to identifier for your network
Choose the highest level security option
Use a computer firewall
HOW TO PROTECT YOURSELF
Unsecure Network Protection Tips
iphonejd.com10/20/15
15
5. Data Gone AWOL Smart devices are very easy to lose and data
can end up in the hands of cybercriminals (if data not encrypted)
45% of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich.
YouSendIt, Dropbox and other Internet (cloud based) of file sharing tools by employees, raise the risk that confidential corporate data will be leaked, according to Ponemon
We may fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café
Apple.com10/20/15
16
Use a virtual private network (VPN) in a public place
Do not conduct financial transactions on unsecured networks
Use one time passwords for accounts like Facebook when using unsecure wireless
HOW TO PROTECT YOURSELF
Data Gone AWOL Protection Tips
avast.com
10/20/15
17live demo: click here
1810/20/15
Web and Mobile Threats Statistics Report 4th Quarter 2013
200 new threats every minutes
more than 3 every second
Cyber Security Panel 19
Cyber Security Panel 2010/18/14
21
22
Latest Malware Attacks Statistics
Report by AV-TEST 2014-2015
10/20/15
AV-Test Institute: Total Malware
• 12 million fresh strains of malware detected every month
• Analysis reveled that every second four samples are available in the wild
• Total number of threats caught in 2014 – 325 + million pieces were analyzed during the
month of December alone• > 390,000 new malicious programs every day
Malware Statistics2014
25
Stop.Think.Connect a DHS campaign for national cyber security awareness
10/20/15
2610/20/20
visit: https://www.nsa.gov/academia/early_opportunities/index.shtml
BS, BA, MS, and5-year Programs
in Computer Science with Concentration
in Cyber Security
2810/20/15
Cyber Security Panel 2910/18/14
30
Main Courses for Cyber Security • Math
– Calculus– Discrete– Algebra– Mathematical Thinking
• Computer– Operating Systems– Software Development– Computer Architecture– Networking– Distributes Systems
• Security:– Software Design and Development – Cryptography – Networking – Mobile Application Development – Web Application Development
10/20/15
31
Sited Sources
• Microsoft• Department of Homeland Security (DHS)• Federal Trade Commission• National Cyber Security Alliance• McAfee • AV-TEST
10/20/15