intro to cybersecurity (12july18)longer passwords are more secure; try for 8-12 characters avoid...
TRANSCRIPT
Introduction to Cybersecurity
Agenda
Unit 1 Cybersecurity
Unit 2 Protect your identity and data
Unit 3 Protect your apps
Unit 4 Protect your device
Introduction to Cybersecurity: Course Agenda and Objectives
Unit 1:Cybersecurity
After completing this unit, you should be able to:
• Define cybersecurity• Understand cybercrimes and the different types that are present today• Define phishing, spam, hacking, and identity theft
Cybersecurity
Cybersecurity is protecting yourself from someone stealing your digital information/personal data or from someone pretending to act as you online
Key Terms
o Password – A combination of letters and numbers that is kept secret and used to gain access to a computer, website, etc.
o Phishing – A scam email/website that tricks you into revealing personal information such as username, password, location, etc.
o Spam – Unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful link
o Virus –Harmful “software” that attaches to other programs to hurt or destroy a computer’s ability to function normally
o Hacker – An unauthorized user trying to disrupt or damage a computer or network of computers
*Content was created by the IBM GBS North America Transformation Office
90Passwords
30,000Websites
6 Million Accounts
That means that you could have 90 passwords to keep
track of; it’s important to make sure all of your accounts are
safe
Average number of passwords someone has
Average number of websites hacked per day
This means you must be careful about the websites you visit and that even if you trust them, your
information could be at risk
Number of Instagram accounts in recent hack
Hackers stole over 6 million famous Instagram accounts’
information and are selling their personal information
Cybersecurity is a BIG issue, just a couple of weeks ago Instagram was hacked and over 6 million verified account information was stolen. The hackers went on to try and sell that information for money.
Impact on your future
*Content was created by the IBM GBS North America Transformation Office
Someone logs into your Instagram without YOUknowing
They post and send messages posing as you
Your friends and followers get angry and ask about your posts or unfollow – but you have no idea what happened!
Sound annoying or scary? You can prevent it!
Imagine this…
*Content was created by the IBM GBS North America Transformation Office
Cybercrimes
Cybercrime is carrying out illegal activities by means of using a computer or the internet.
Currently, the cost of cybercrime is $445 Billion per year. That’s more than all the illegal drug trade in the world
*Content was created by the IBM GBS North America Transformation Office
Types of cybercrimes
Phishing Spam Identity theftHacking
There are many different types of cybercrimes, and for this course we will be looking at the following:
Phishing
Phishing /ˈfiSHiNG/
The attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a something trustworthy, like a bank.
*Content was created by the IBM GBS North America Transformation Office
An example of PhishingDear Heather,
Your Apple ID was used to sign in to iCloud on an iPhone.
Time: July 06, 2014Operating System: iOS;6.0.1
If you recently signed in to this device, you can disregard this email. If you have not recently signed in to an iPhone with your Apple ID and believe someone may have accessed your account, please click here to confirm your details and change your password.
Apple Support My Apple ID | Support | Privacy Policy | Copyright © 2014 iTunes
Apple Canada7495 Birchmount RoadMarkham, ON L3R 5G2. All rights reserved.
Go to Apple Canada for more information on our latest new products.
• Looks legitimate• You are an Apple customer• Convincing detail• Convincing epilogue• Increased potential for users to
click links provided without thinking
*Content was created by the IBM GBS North America Transformation Office
Spam
Spam is unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful link
Spamming is the act of sending mail to a large number of e-mail addressees, and is often compared to the term "junk mail" used to describe similar activities performed via postal services.
What can you do when you are spammed?• Move mail to the Junk folder• Block or filter mail from a sender, domain, or subject• Use Spam protection
Hacking
Hacking is when someone gets unauthorized access to your computer/laptop and your personal data. A Hacker is an unauthorized user trying to disrupt or damage a computer or network of computers
How do you know if you’ve been hacked?• Your anti virus program triggers an alert that your system has been infected, especially if it
says that it was unable to remove the virus• Get a pop up message that your computer has been encrypted and you must pay a ransom to
recover it or that your computer is infected and you must call a text support phone number to fix it
• There are new accounts on your computer or device that you did not create or new programs running that you did not install
• Your browser is taking you to unwanted websites and you cannot close them• Your password no longer works when you try to login into your online accounts• Your friends and workers are receiving odd messages from you that you know you never sent
Identity theft
Identity theft is the illegal use of someone else's personal information in order to obtain money or credit.
Did you know?• 18-29 year old's issue the most identity theft complaints.• 31% of all identity theft complaints received by the Federal Trade Commission in 2012 were
filed by young adults.
*Homeland Security Cyber Kit
Presented by
Unit 2:Protect your identity and dataAfter completing this unit, you should be able to:
• Module I: Understanding personal data• Explain what is personal data• Define digital footprint• Explain the role of IP address and cookies
• Module II: How to protect yourself• Understand basic cybersecurity and online hygiene tips
Presented by
Unit 2: Module IUnderstanding personal data
Personal LeisureSchoolName
AddressPhone #
GradesAttendance
AwardsSchedule
FriendsHobbiesInterestsPhotos
Each of these components really marks a part of your online identity
Personal data
*Content was created by the IBM GBS North America Transformation Office
1. Devices are the KeyPhone or desktop, when you use the internet – you’re making a mark.
2. (Un)Conscious When you publish or browse things, you are leaving footprints.
3. How Everyone Sees YouThis is what you are telling to the world about yourself.
Digital Footprint
Every time you surf the Internet, you leave behind bits of information.
You publish some of this data voluntarily –like on Instagram.
Sometimes you aren't aware that data of yours is being gathered and used for other
purposes.
*Content was created by the IBM GBS North America Transformation Office
Social media
• Attackers are using Social Networks to gather information.
• This information has many uses for various illegal activities
Make sure to review your privacy settings!
When you take a quiz, what information about youcan the quiz see?
A. Only my answers to the questions
B. Only info that’s on my profile that’s public
C. Almost everything, regardless of my privacy settings
*Content was created by the IBM GBS North America Transformation Office
Your Name
Your Address
Your Preferences
Payment Info
Your Password
Cookies are bits of text stored on your computer by the sites you visit.
They’re used to let the site know who you are and to store any specific preferences you’ve set.
Unfortunately, they’re also used by ad-trackers to track the sites you visit.
Cookies
*Content was created by the IBM GBS North America Transformation Office
An IP address is the address the computer has when it connects to the internet.
Public IPs will have things like your location stored and your surfing history.
An IP address is assigned to every computer/mobile-phone/ipad which is connected to the Internet. These IP addresses are given to them by the Internet Service Providers (like Safaricom, MTN, Vodafone, etc).
With this information, combined with cookies, a person can find out a lot about who you are, where you’ve been, where you love, and what you like to browse.
IP Address
*Content was created by the IBM GBS North America Transformation Office
Protect your data
Keep personal data to yourself Personal data includes your social security number, biometric records, passport number,
home/cell phone number, passwords, and date of birth. When combined with other personal or identifying information, such as your place of birth or your mother’s maiden name, these details
can result in identity theft or even worse.
Look for the S in httpsThe 'S' at the end of HTTPS stands for 'Secure,' which means that encryption is being used as
you transmit your data across the internet.
*Content was created by the IBM GBS North America Transformation Office
Unit 2: Module IIHow to protect yourself
Cybersecurity tips
Passwords needs to be complicated but something you can remember.
Always keep your personal information private.
Stop, Think, and Connect is a memorable way for you to stop and consider your
actions online
Password Protection Personal Information Stop. Think. Connect.
Avoid simple passwords like password, 123456, qwerty – they’re easy to guess Keep your personal information private Stop before clicking on any links, opening
messages, sending information
Longer passwords are more secure; try for 8-12 characters
Avoid sharing your name, address, phone number, birthday, passwords to anyone
Think about who is on the other side of anything you send and about the information
you’re sending
Make them easy to rememberDon’t talk to strangers or let strangers
friend/follow you
Connect once you stopped and thought about it, decide whether you really want to
connect, send, post
Use a combination of character sets, numbers, and letters (!@#$; 1594)
*Content was created by the IBM GBS North America Transformation Office
The 10 hygiene tips to keep you safe online
Keep private information
PRIVATELook for the “S” in
HTPPSThink before you
clickBe cautious with
emailUpdate software
regularly
Change passwords regularly
Create complex passwords
Be cautious of free WiFi
Log out of all accounts
Spread awareness to other
*Content was created by the IBM GBS North America Transformation Office
Unit 3:Protect Your Apps
After completing this unit, you should be able to:
• Understand what can happen to your apps• Understand the high costs involved in an app security breach• Understand how to protect your apps
Cost of an application security breach?
• Media attention / brand damage• Communication / monitoring service costs• Legal fees (reported $3-4 million)• New security spending• User loss
*Content by the IBM Dev Ex team
Prevent application security breach
Sensitive Data Leakage
(sensitive info about corporates)
Corporates may lose clients, or Business
Partners or Customers
Identity theft(Impersonating a person and
using their name, number, passport etc.)
Brand theft(impersonating a company)
Illegal use of someone else's personal information can be used to obtain money, or for
other serious crimes
Hurts the brand image, misleads
customers
*Content by the IBM Dev Ex team
Prevent application security breach
Encryption of data
(storing data in such a way that only authorized parties
can access it)
Prevents sensitive data
leakage
Strong passwords
(Create password using different characters, and store
them safely)
Digital signatures (the source contains a digital
certificate that authenticates the message)
Preventsidentity theft
Preventsbrand theft
*Content by the IBM Dev Ex team
Unit 4:Protect Your Device
After completing this unit, you should be able to:
• Define what is a personal device• Understand how to protect your computer• Explain how to protect your mobile device
Protect your computer • Be cautious about opening attachments or clicking on links. They may contain viruses or
spyware. • Learn about security software and how your • home computer, the kids’ laptop, and their • computer tablets are protected. Maintain up-to date antivirus software on all your devices that
connect to the Internet to increase your devices’ security. • Remember that, sometimes, free stuff—like games, ring tones, or screen savers—can • hide viruses or spyware. Don’t download unless you trust the source and scan the file with
security software. • Use peer-to-peer (P2P) file-sharing services • with caution. Make sure you install file-sharing software properly, and scan downloaded files
with security software before you open or play them. Otherwise, you could be sharing information your family expects to keep private, like financial records.
*Homeland Security Cyber Kit
Mobile securityIn 2015, mobile technologies and services generated 6.7% of GDP in Africa, a contribution that amounted to around $150 billion of economic value. In the period to 2020 we expect this to increase to more than $210 billion (7.6% of GDP) as countries benefit from the improvements in productivity and efficiency brought about by increased take-up of mobile services - (The Mobile Economy Africa, 2016)
We are increasingly using phones for banking, online shopping, and social media. The more we travel and access the Internet on the go, the more risks we face on our mobile devices.
Tips for Securing Mobile Devices: • Think Before You Connect. Before you connect to any public Wi-Fi hotspot, confirm the name of the network and exact login
procedures to ensure that the network is legitimate. • Guard Your Mobile Device. In order to prevent theft, unauthorized access, and loss of sensitive information, never leave your mobile
devices unattended in a public place. • Keep It Locked. Always lock your device when you are not using it. Use strong PINs and passwords to prevent others from accessing
your device.• Update Your Mobile Software. Keep your operating system software and apps updated, which will improve your device’s ability to
defend against malware.• Know Your Apps. Be sure to thoroughly review the details and specifications of an application before you download it. Delete any apps
that you are not using to increase your security. Double-check how the app will be using your information (Example: does it need access to your pictures or contact list? If so, why?)
• Only Connect to the Internet if Needed. Disconnect your device from the Internet when you aren’t using it and make sure your device isn’t programmed to automatically connect to Wi-Fi.
*Homeland Security Cyber Kit
Thank you.