WHY DO WE NEED CYBER SECURITY?

9/27/2016 1 2 WHY DO WE NEED CYBER SECURITY?  IDENTITY THEFT  PERSONAL SECURITY FROM THREATS OR DANGER  PROTECTION FOR OUR FAMILY AND LOVED ONES ...
Author: Brent Lawrence
3 downloads 0 Views 94KB Size
9/27/2016

1 2

WHY DO WE NEED CYBER SECURITY?  IDENTITY THEFT  PERSONAL SECURITY FROM THREATS OR DANGER  PROTECTION FOR OUR FAMILY AND LOVED ONES FROM DANGER OR THREATS  LOSS OF OUR HARD EARNED MONEY  LOSS OF PERSONAL PRIVACY

3

TYPES OF ONLINE THREATS  SPYWARE Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key loggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

4

TYPES OF ONLINE THREATS  PHISHING Phishing is a type of online identity theft which uses e-mail and fraudulent websites that are designed to steal your personal data or information such as your access id, password or credit card number.

5

TYPES OF ONLINE THREATS  PHARMING Pharming is a scam practice in which unauthorized software is installed on a computer or server, misdirecting users to fraudulent web sites without their knowledge.

6

TYPES OF ONLINE THREATS  SPOOFING Spoofing is a type of identity theft where emails that look like they are from a legitimate source are sent with a link to a phony website. The customers are asked to enter personal information.

7

TYPES OF ONLINE THREATS  TROJAN HORSE VIRUS A Trojan horse virus is designed to allow a hacker remote access to your computer.

8

TYPES OF ONLINE THREATS  RANSOMWARE A virus which encrypts your files and notifies you that a “ransom” must be paid to unlock the files.

9

INTERNET DANGERS FOR CHILDREN CHILD PREDATORS CYBERBULLYING CYBERSTALKING MALICIOUS CODE INTELLECTUAL PROPERTY CRIME

10

CHILD PREDATORS

1

9/27/2016

 According to the National Center for Missing and Exploited Children (NCMEC) there are an estimated 50,000 child sexual predators online at any given time.  1 in 7 children received a sexual solicitation online.  Over half (56%) of kids sexually solicited online were asked to send a picture; 27% of the pictures were sexually-oriented in nature. 11

CHILD PREDATORS  In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes.  65% of online sex offenders used the victim's social networking site to gain home and school information about the victim

12

CYBERBULLYING  Cyberbullying is when children (and sometimes, adults) attack children using digital means such as the Internet, Texting, Gaming, etc... Cyberbullying is most commonly done by posting harassing, embarrassing or threatening comments about the victim using internet and social media sites such as Facebook, MySpace, Twitter, etc...

13

CYBERSTALKING  Cyberstalking is when someone uses the Internet or other electronic means such as databases, etc... to stalk their victim. Stalkers can be anywhere in the world and can stalk a victim without them even knowing about it.

14

MALICIOUS CODE  Trojans, malware and other malicious code can be introduced to your computer through many sites used by children. Social Media sites, Peer to Peer programs, shared files, etc.  Children tend to be less aware of the need for security and do not always practice Internet safety.

15

INTELLECTUAL PROPERTY CRIMES  Intellectual property is anything that is copyrighted.  Movies, music, software, books, etc... are all forms of intellectual property.  Many teens today utilize Peer to Peer (P2P) software such as Frostwire, Ares, Kazaa, etc... to download music, videos, and software.

16

INTELLECTUAL PROPERTY CRIMES  Sharing of copyrighted material is illegal  Can be sued for loss of income  Can be arrested for criminal violations  Sharing files from unknown sources like from a P2P network can introduce virus’ and malware to your computer

17

WEBSITES AND SMART PHONE APPS  Chat Roulette  KIK  SnapChat  Free2Text (and other variations)  Peer to Peer file sharing programs such as ARES, Emule, Frostwire, Utorrent, Edonkey

18

SO WHAT CAN I DO TO PROTECT MYSELF AND MY FAMILY? 19

PROTECTING YOURSELF

2

9/27/2016

HAVE AN ANTIVIRUS PROGRAM INSTALLED AND KEEP IT UPDATED!!!!! 20

PROTECTING YOURSELF Licensed Antivirus software  More Robust  Definitions are added more quickly  Typically comes with Customer Support  Real time monitoring

21

PROTECTING YOURSELF FREE ANTIVIRUS AND ANTI-MALWARE SOFTWARE  Passive monitoring- User must initiate scans  Definitions can be from 6 to 8 weeks old  Customer Support is a paid option  Not as invasive as purchased Antivirus software  May have ads associated with use 

22

PROTECTING YOURSELF PASSWORDS  Change your password every 30 to 60 days.  Make all passwords at least 8 characters in length.  Use a combination of letters and numbers and make at least one character either upper case or a special character (!,@,#,$, etc)  Never use the same password for your email accounts, financial sites or social media.

23

PROTECTING YOURSELF SMART PHONES  Turn off GPS tagging in photos  Turn off location services (use only when necessary)  Have all phones on one account (i.e. iTunes, Google Play)  Routinely check your children’s phone for history, photos, apps that have been installed, etc.

24

PROTECTING YOURSELF WIFI  If you use WIFI, or Wireless Internet, in your home, make sure to lock it down. Use a password following the guidelines mentioned a moment ago.  For best security, you can turn ‘BROADCASTING’ off. This means when a device connects to your WIFI, it has to know the name of your network or router.

25

PROTECTING YOURSELF  Be cautious when using the Internet. Do not trust anyone or anything.  Beware suspicious emails. Delete without opening them.  Do not send personal information via email or Instant Messenger unless you are absolutely positive it is secure.

26

PROTECTING YOURSELF  Always log off websites which require a username and password. Then close your web browser. Do not just go to a different website or browse the Internet without starting a

3

9/27/2016

new session.  Beware of hyperlinks sent via email or Instant Messenger. Never use the link.  Open a different browser section and manually type in the address 27

PROTECTING YOURSELF  If you receive an email or text from a source claiming to be a bank or business you do business with and it contains a link for you go to, DO NOT USE THE LINK!!!!  Manually type in the web address you know for the business in the address bar and go to the site yourself.  If it was legitimate, the business will have a notification for you in your account.  If you are still suspicious, call the company yourself.

28

PROTECTING YOURSELF  If you receive an email with an offer that seems too good to be true, it probably is!!!  Call the company to verify the email’s legitimacy.  NEVER REPLY TO A SUSPICIOUS EMAIL!

29

PROTECTING YOUR CHILDREN  Teach them how to use the Internet responsibly and to apply the methods just covered.  Do not allow children to have unsupervised access to a computer with an Internet connection. Do not let them have a computer alone in their room.  Routinely check their computers for browser history. Check what sites they are going to.

30

PROTECTING YOUR CHILDREN  If any Instant Messaging programs are installed on the computer, enable logging. This will allow you to see what is being said and sent to your child.  Always know the username and password for any site, social media or messaging program your child uses.  Do not allow the use of Peer to Peer programs or file sharing.

31

PROTECTING YOUR CHILDREN  If your child has a social media profile, such as Facebook, Instagram or Google +, make sure you have one too and are friends with them.  Make sure their profile is set to friend’s only. You may want to set it to not searchable.  Check what they post (photos, status’, etc) to make sure there is no personal info being posted.  Check their friends lists and make sure YOU know who they are.

32

PROTECTING YOUR CHILDREN  Do not let children have their own Apple store or Google play account.  All app purchases, whether free or paid, should be through your account.  Know your child’s PIN code or Swipe code to access their phone.  Know what apps they are using and routinely check what is in the app.

33

PROTECTING YOUR CHILDREN Talk with your children and let them know they can tell you if something happens.

34

RESOURCES  National Center for Missing and Exploited Children (NCMEC)  www.ncmec.org

4

9/27/2016

 RESOURCES  NETSMARTZ  www.netsmartz.org

35

36 1

2

RESOURCES  Google .com   http://safety.yahoo.com   www.staysafeonline.org

37

QUESTIONS???? 38

5