cyber security awareness program

31
Five Top Cyber Security Threats, Tips, Statistics and Cyber Security Academic Programs Cyber Security Awareness 10/20/15 Cyber Security Talk – (at Presented High School) 1 Computer Science Department Iona College Presented by Computer Science Students Advised by Dr. Paolina Centonze

Upload: john-rocco

Post on 26-Jan-2017

181 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Cyber Security Awareness Program

1

Five Top Cyber Security Threats,Tips, Statistics and Cyber Security Academic

Programs

Cyber Security Awareness

10/20/15 Cyber Security Talk – (at Presented High School)

Computer Science Department Iona College

Presented by Computer Science Students Advised by Dr. Paolina Centonze

Page 3: Cyber Security Awareness Program

Cyber Security Panel 3

Page 4: Cyber Security Awareness Program

410/20/15

• Cyber threats are the number one danger to national security

• $9,000 average cost of a cyber attack (in 2014)

Page 5: Cyber Security Awareness Program

5

Page 6: Cyber Security Awareness Program

6

Our Lives Depend on Electronic Devices

What if you swipe your credit card (mobile transaction payment) and a hacker steals your credit card number or even your identity?

What if your personal health information, accessible to your healthcare provider or hospital, becomes also accessible to your employer?

What if your business is brought to a halt because of a Cyber Security attack? In Feb. 2104, President Obama said: “Our critical infrastructure continues to be at risk from

threats in cyberspace, and our economy is harmed by the theft of our intellectual property.”

ValiSoft: Electronic Transaction

Page 7: Cyber Security Awareness Program

7

1. Malware Malware is any computer virus, or

malicious software, that can harm a user’s computer

May include spyware, which allows digital hackers to track and to view the users’ passwords entered on the Internet

Consumers get tricked into downloading malware very easily

Criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites

Siliconangel.com

10/20/15

Page 8: Cyber Security Awareness Program

8

HOW TO PROTECT YOURSELF

Install antivirus and antispyware programs from a trusted source (such as McAfee, Norton)

Use strong password protection Never turn off your firewall Be careful when using flash or

thumb devices Keep of your software updated Beware of suspicious links

even when come from friends Under-linux.com

Malware Protection Tips

10/20/15

Page 9: Cyber Security Awareness Program

9

2. Spam Spam is the email equivalent

of junk mail It can do more than clutter up

a user’s inbox It can contain a link or an

attachment It can be used to defraud

those close to you The CAN-SPAM Act was set

up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation

ESET.com

10/20/15

Page 10: Cyber Security Awareness Program

10

Keep your e-mail private Check out privacy policies

when you submit your personal information to a website

Use an email filter to weed it out

Install an antispam softwareESET.com

HOW TO PROTECT YOURSELF

Spam Protection Tips

10/20/15

Page 11: Cyber Security Awareness Program

11

3. Hacked Accounts Through Fishing

Hackers to gain control of consumers’ personal information is through digital crimes known as “phishing”

Fraudsters create an email that looks like it was issued from a legitimate company

They will ask for a recipient’s personal information (an account number or password)

They use social engineering techniques to gain user’s trust ubergizmo.com

10/20/15

Page 12: Cyber Security Awareness Program

12

Set secure password that don’t use common words, names and personal info

Keep your browser, operating system, and antivirus up to date

Verify that a request for your data comes from a particular company (see padlock URLS)

Don’t publish identify information like your birthday on social networks

ESET.com

HOW TO PROTECT YOURSELF

Hacked Account Protection Tips

ubergizmo.com

10/20/15

Page 13: Cyber Security Awareness Program

13

4. Unsecure Home Wireless Networks We all use home wireless

Internet networks to connect our TVs, smartphones, laptops, computers and tablets

Without certain protections, cyber criminals in the area may be able to Access the Internet through

your network Gain access to your computer

and other devices Mount cyber security attacks

from your home network against remote websites

ubergizmo.com10/20/15

Page 14: Cyber Security Awareness Program

14

Connect a cable or DLS modem to a wireless router securely

Change the preset password Change, and do not publish,

the preset Service Set Identifier (SSID) used to identifier for your network

Choose the highest level security option

Use a computer firewall

HOW TO PROTECT YOURSELF

Unsecure Network Protection Tips

iphonejd.com10/20/15

Page 15: Cyber Security Awareness Program

15

5. Data Gone AWOL Smart devices are very easy to lose and data

can end up in the hands of cybercriminals (if data not encrypted)

45% of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich.

YouSendIt, Dropbox and other Internet (cloud based) of file sharing tools by employees, raise the risk that confidential corporate data will be leaked, according to Ponemon

We may fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café

Apple.com10/20/15

Page 16: Cyber Security Awareness Program

16

Use a virtual private network (VPN) in a public place

Do not conduct financial transactions on unsecured networks

Use one time passwords for accounts like Facebook when using unsecure wireless

HOW TO PROTECT YOURSELF

Data Gone AWOL Protection Tips

avast.com

10/20/15

Page 18: Cyber Security Awareness Program

1810/20/15

Web and Mobile Threats Statistics Report 4th Quarter 2013

200 new threats every minutes

more than 3 every second

Page 19: Cyber Security Awareness Program

Cyber Security Panel 19

Page 20: Cyber Security Awareness Program

Cyber Security Panel 2010/18/14

Page 21: Cyber Security Awareness Program

21

Page 22: Cyber Security Awareness Program

22

Latest Malware Attacks Statistics

Report by AV-TEST 2014-2015

10/20/15

Page 23: Cyber Security Awareness Program

AV-Test Institute: Total Malware

Page 24: Cyber Security Awareness Program

• 12 million fresh strains of malware detected every month

• Analysis reveled that every second four samples are available in the wild

• Total number of threats caught in 2014 – 325 + million pieces were analyzed during the

month of December alone• > 390,000 new malicious programs every day

Malware Statistics2014

Page 25: Cyber Security Awareness Program

25

Stop.Think.Connect a DHS campaign for national cyber security awareness

10/20/15

Page 26: Cyber Security Awareness Program

2610/20/20

visit: https://www.nsa.gov/academia/early_opportunities/index.shtml

Page 27: Cyber Security Awareness Program

BS, BA, MS, and5-year Programs

in Computer Science with Concentration

in Cyber Security

Page 28: Cyber Security Awareness Program

2810/20/15

Page 29: Cyber Security Awareness Program

Cyber Security Panel 2910/18/14

Page 30: Cyber Security Awareness Program

30

Main Courses for Cyber Security • Math

– Calculus– Discrete– Algebra– Mathematical Thinking

• Computer– Operating Systems– Software Development– Computer Architecture– Networking– Distributes Systems

• Security:– Software Design and Development – Cryptography – Networking – Mobile Application Development – Web Application Development

10/20/15

Page 31: Cyber Security Awareness Program

31

Sited Sources

• Microsoft• Department of Homeland Security (DHS)• Federal Trade Commission• National Cyber Security Alliance• McAfee • AV-TEST

10/20/15