intro to cybersecurity (12july18)longer passwords are more secure; try for 8-12 characters avoid...

32
Introduction to Cybersecurity

Upload: others

Post on 29-May-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Introduction to Cybersecurity

Page 2: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Agenda

Unit 1 Cybersecurity

Unit 2 Protect your identity and data

Unit 3 Protect your apps

Unit 4 Protect your device

Introduction to Cybersecurity: Course Agenda and Objectives

Page 3: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Unit 1:Cybersecurity

After completing this unit, you should be able to:

• Define cybersecurity• Understand cybercrimes and the different types that are present today• Define phishing, spam, hacking, and identity theft

Page 4: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Cybersecurity

Cybersecurity is protecting yourself from someone stealing your digital information/personal data or from someone pretending to act as you online

Key Terms

o Password – A combination of letters and numbers that is kept secret and used to gain access to a computer, website, etc.

o Phishing – A scam email/website that tricks you into revealing personal information such as username, password, location, etc.

o Spam – Unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful link

o Virus –Harmful “software” that attaches to other programs to hurt or destroy a computer’s ability to function normally

o Hacker – An unauthorized user trying to disrupt or damage a computer or network of computers

*Content was created by the IBM GBS North America Transformation Office

Page 5: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

90Passwords

30,000Websites

6 Million Accounts

That means that you could have 90 passwords to keep

track of; it’s important to make sure all of your accounts are

safe

Average number of passwords someone has

Average number of websites hacked per day

This means you must be careful about the websites you visit and that even if you trust them, your

information could be at risk

Number of Instagram accounts in recent hack

Hackers stole over 6 million famous Instagram accounts’

information and are selling their personal information

Cybersecurity is a BIG issue, just a couple of weeks ago Instagram was hacked and over 6 million verified account information was stolen. The hackers went on to try and sell that information for money.

Impact on your future

*Content was created by the IBM GBS North America Transformation Office

Page 6: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Someone logs into your Instagram without YOUknowing

They post and send messages posing as you

Your friends and followers get angry and ask about your posts or unfollow – but you have no idea what happened!

Sound annoying or scary? You can prevent it!

Imagine this…

*Content was created by the IBM GBS North America Transformation Office

Page 7: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Cybercrimes

Cybercrime is carrying out illegal activities by means of using a computer or the internet.

Currently, the cost of cybercrime is $445 Billion per year. That’s more than all the illegal drug trade in the world

*Content was created by the IBM GBS North America Transformation Office

Page 8: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Types of cybercrimes

Phishing Spam Identity theftHacking

There are many different types of cybercrimes, and for this course we will be looking at the following:

Page 9: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Phishing

Phishing /ˈfiSHiNG/

The attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a something trustworthy, like a bank.

*Content was created by the IBM GBS North America Transformation Office

Page 10: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

An example of PhishingDear Heather,

Your Apple ID was used to sign in to iCloud on an iPhone.

Time: July 06, 2014Operating System: iOS;6.0.1

If you recently signed in to this device, you can disregard this email. If you have not recently signed in to an iPhone with your Apple ID and believe someone may have accessed your account, please click here to confirm your details and change your password.

Apple Support My Apple ID | Support | Privacy Policy | Copyright © 2014 iTunes

Apple Canada7495 Birchmount RoadMarkham, ON L3R 5G2. All rights reserved.

Go to Apple Canada for more information on our latest new products.

• Looks legitimate• You are an Apple customer• Convincing detail• Convincing epilogue• Increased potential for users to

click links provided without thinking

*Content was created by the IBM GBS North America Transformation Office

Page 11: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Spam

Spam is unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful link

Spamming is the act of sending mail to a large number of e-mail addressees, and is often compared to the term "junk mail" used to describe similar activities performed via postal services.

What can you do when you are spammed?• Move mail to the Junk folder• Block or filter mail from a sender, domain, or subject• Use Spam protection

Page 12: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Hacking

Hacking is when someone gets unauthorized access to your computer/laptop and your personal data. A Hacker is an unauthorized user trying to disrupt or damage a computer or network of computers

How do you know if you’ve been hacked?• Your anti virus program triggers an alert that your system has been infected, especially if it

says that it was unable to remove the virus• Get a pop up message that your computer has been encrypted and you must pay a ransom to

recover it or that your computer is infected and you must call a text support phone number to fix it

• There are new accounts on your computer or device that you did not create or new programs running that you did not install

• Your browser is taking you to unwanted websites and you cannot close them• Your password no longer works when you try to login into your online accounts• Your friends and workers are receiving odd messages from you that you know you never sent

Page 13: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Identity theft

Identity theft is the illegal use of someone else's personal information in order to obtain money or credit.

Did you know?• 18-29 year old's issue the most identity theft complaints.• 31% of all identity theft complaints received by the Federal Trade Commission in 2012 were

filed by young adults.

*Homeland Security Cyber Kit

Page 14: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Presented by

Unit 2:Protect your identity and dataAfter completing this unit, you should be able to:

• Module I: Understanding personal data• Explain what is personal data• Define digital footprint• Explain the role of IP address and cookies

• Module II: How to protect yourself• Understand basic cybersecurity and online hygiene tips

Page 15: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Presented by

Unit 2: Module IUnderstanding personal data

Page 16: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Personal LeisureSchoolName

AddressPhone #

Email

GradesAttendance

AwardsSchedule

FriendsHobbiesInterestsPhotos

Each of these components really marks a part of your online identity

Personal data

*Content was created by the IBM GBS North America Transformation Office

Page 17: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

1. Devices are the KeyPhone or desktop, when you use the internet – you’re making a mark.

2. (Un)Conscious When you publish or browse things, you are leaving footprints.

3. How Everyone Sees YouThis is what you are telling to the world about yourself.

Digital Footprint

Every time you surf the Internet, you leave behind bits of information.

You publish some of this data voluntarily –like on Instagram.

Sometimes you aren't aware that data of yours is being gathered and used for other

purposes.

*Content was created by the IBM GBS North America Transformation Office

Page 18: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Social media

• Attackers are using Social Networks to gather information.

• This information has many uses for various illegal activities

Make sure to review your privacy settings!

When you take a quiz, what information about youcan the quiz see?

A. Only my answers to the questions

B. Only info that’s on my profile that’s public

C. Almost everything, regardless of my privacy settings

*Content was created by the IBM GBS North America Transformation Office

Page 19: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Your Name

Your Address

Your Preferences

Payment Info

Your Password

Cookies are bits of text stored on your computer by the sites you visit.

They’re used to let the site know who you are and to store any specific preferences you’ve set.

Unfortunately, they’re also used by ad-trackers to track the sites you visit.

Cookies

*Content was created by the IBM GBS North America Transformation Office

Page 20: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

An IP address is the address the computer has when it connects to the internet.

Public IPs will have things like your location stored and your surfing history.

An IP address is assigned to every computer/mobile-phone/ipad which is connected to the Internet. These IP addresses are given to them by the Internet Service Providers (like Safaricom, MTN, Vodafone, etc).

With this information, combined with cookies, a person can find out a lot about who you are, where you’ve been, where you love, and what you like to browse.

IP Address

*Content was created by the IBM GBS North America Transformation Office

Page 21: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Protect your data

Keep personal data to yourself Personal data includes your social security number, biometric records, passport number,

home/cell phone number, passwords, and date of birth. When combined with other personal or identifying information, such as your place of birth or your mother’s maiden name, these details

can result in identity theft or even worse.

Look for the S in httpsThe 'S' at the end of HTTPS stands for 'Secure,' which means that encryption is being used as

you transmit your data across the internet.

*Content was created by the IBM GBS North America Transformation Office

Page 22: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Unit 2: Module IIHow to protect yourself

Page 23: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Cybersecurity tips

Passwords needs to be complicated but something you can remember.

Always keep your personal information private.

Stop, Think, and Connect is a memorable way for you to stop and consider your

actions online

Password Protection Personal Information Stop. Think. Connect.

Avoid simple passwords like password, 123456, qwerty – they’re easy to guess Keep your personal information private Stop before clicking on any links, opening

messages, sending information

Longer passwords are more secure; try for 8-12 characters

Avoid sharing your name, address, phone number, birthday, passwords to anyone

Think about who is on the other side of anything you send and about the information

you’re sending

Make them easy to rememberDon’t talk to strangers or let strangers

friend/follow you

Connect once you stopped and thought about it, decide whether you really want to

connect, send, post

Use a combination of character sets, numbers, and letters (!@#$; 1594)

*Content was created by the IBM GBS North America Transformation Office

Page 24: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

The 10 hygiene tips to keep you safe online

Keep private information

PRIVATELook for the “S” in

HTPPSThink before you

clickBe cautious with

emailUpdate software

regularly

Change passwords regularly

Create complex passwords

Be cautious of free WiFi

Log out of all accounts

Spread awareness to other

*Content was created by the IBM GBS North America Transformation Office

Page 25: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Unit 3:Protect Your Apps

After completing this unit, you should be able to:

• Understand what can happen to your apps• Understand the high costs involved in an app security breach• Understand how to protect your apps

Page 26: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Cost of an application security breach?

• Media attention / brand damage• Communication / monitoring service costs• Legal fees (reported $3-4 million)• New security spending• User loss

*Content by the IBM Dev Ex team

Page 27: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Prevent application security breach

Sensitive Data Leakage

(sensitive info about corporates)

Corporates may lose clients, or Business

Partners or Customers

Identity theft(Impersonating a person and

using their name, number, passport etc.)

Brand theft(impersonating a company)

Illegal use of someone else's personal information can be used to obtain money, or for

other serious crimes

Hurts the brand image, misleads

customers

*Content by the IBM Dev Ex team

Page 28: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Prevent application security breach

Encryption of data

(storing data in such a way that only authorized parties

can access it)

Prevents sensitive data

leakage

Strong passwords

(Create password using different characters, and store

them safely)

Digital signatures (the source contains a digital

certificate that authenticates the message)

Preventsidentity theft

Preventsbrand theft

*Content by the IBM Dev Ex team

Page 29: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Unit 4:Protect Your Device

After completing this unit, you should be able to:

• Define what is a personal device• Understand how to protect your computer• Explain how to protect your mobile device

Page 30: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Protect your computer • Be cautious about opening attachments or clicking on links. They may contain viruses or

spyware. • Learn about security software and how your • home computer, the kids’ laptop, and their • computer tablets are protected. Maintain up-to date antivirus software on all your devices that

connect to the Internet to increase your devices’ security. • Remember that, sometimes, free stuff—like games, ring tones, or screen savers—can • hide viruses or spyware. Don’t download unless you trust the source and scan the file with

security software. • Use peer-to-peer (P2P) file-sharing services • with caution. Make sure you install file-sharing software properly, and scan downloaded files

with security software before you open or play them. Otherwise, you could be sharing information your family expects to keep private, like financial records.

*Homeland Security Cyber Kit

Page 31: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Mobile securityIn 2015, mobile technologies and services generated 6.7% of GDP in Africa, a contribution that amounted to around $150 billion of economic value. In the period to 2020 we expect this to increase to more than $210 billion (7.6% of GDP) as countries benefit from the improvements in productivity and efficiency brought about by increased take-up of mobile services - (The Mobile Economy Africa, 2016)

We are increasingly using phones for banking, online shopping, and social media. The more we travel and access the Internet on the go, the more risks we face on our mobile devices.

Tips for Securing Mobile Devices: • Think Before You Connect. Before you connect to any public Wi-Fi hotspot, confirm the name of the network and exact login

procedures to ensure that the network is legitimate. • Guard Your Mobile Device. In order to prevent theft, unauthorized access, and loss of sensitive information, never leave your mobile

devices unattended in a public place. • Keep It Locked. Always lock your device when you are not using it. Use strong PINs and passwords to prevent others from accessing

your device.• Update Your Mobile Software. Keep your operating system software and apps updated, which will improve your device’s ability to

defend against malware.• Know Your Apps. Be sure to thoroughly review the details and specifications of an application before you download it. Delete any apps

that you are not using to increase your security. Double-check how the app will be using your information (Example: does it need access to your pictures or contact list? If so, why?)

• Only Connect to the Internet if Needed. Disconnect your device from the Internet when you aren’t using it and make sure your device isn’t programmed to automatically connect to Wi-Fi.

*Homeland Security Cyber Kit

Page 32: Intro to cybersecurity (12July18)Longer passwords are more secure; try for 8-12 characters Avoid sharing your name, address, phone number, birthday, passwords to anyone Think about

Thank you.