Names and Numbers. Computer & Internet Forensic #2 อ.รว ท ต ภ หลำ

Size: px
Start display at page:

Download "Names and Numbers. Computer & Internet Forensic #2 อ.รว ท ต ภ หลำ"

Transcription

1 Computer & Internet Forensic #2 Names and Numbers อ.รว ท ต ภ หลำ SIGMA Research Laboratory & Department of Computing Faculty of Science, Silpakorn University

2 Contents Computer & Internet Forensics Addresses on the Internet IP address, Domain names, Tools Scam, Spam, Phishing, etc. 7 Laws of Identity

3 Computer Forensics

4 Definitions Forensics: Application of scientific methods in criminal investigations. Unique field of study. Draws from all areas of science. From entomology to genetics, from geology to mathematics. With a single goal of solving a mystery.

5 Definitions Forensics: Application of scientific methods in criminal investigations. Unique field of study. Draws from all areas of science. From entomology to genetics, from geology to mathematics. With a single goal of solving a mystery.

6 Definitions Computer Forensics: How computers are involved in the commission of crimes. Ranging from accounting fraud, blackmail, identity theft, to child pornography. The content of hard drive can contain critical evidence of crime. The analysis of disks and tracking of s have become commonplace tools for law enforcement.

7 Definitions Computer Forensics: How computers are involved in the commission of crimes. Ranging from accounting fraud, blackmail, identity theft, to child pornography. The content of hard drive can contain critical evidence of crime. The analysis of disks and tracking of s have become commonplace tools for law enforcement.

8 Definitions Internet Forensics: Shifts computer forensic focus from individual machine to the Internet. With a single massive network that spans the globe, the challenge of identifying criminal activity and people behind it becomes immense.

9 Definitions Internet Forensics: Shifts computer forensic focus from individual machine to the Internet. With a single massive network that spans the globe, the challenge of identifying criminal activity and people behind it becomes immense.

10 Problems Viruses Spam Scam Fraud Phishing

11 Problems

12 Problems Underlying internet protocols were not designed to address all those problems. Difficult, often impossible, to verify the source of a message or the operator of a web site. Minor details become important.

13 Problems

14 Problems

15 Problems

16 Had become

17 BUT

18 Fingerprint

19 Fingerprint

20 What About?

21 The Seamy Underbelly of the Internet

22 History Any situation involves people & money will quickly attract crime. Certainly the case with internet. Online crime is at an all-time high. Show no signs of slowing down, despite the best effort of computer industry.

23 The Scams

24 The Scams Many forms of criminal activity use the internet as a means of communication using instead of phone calls publishing offensive material on a web site instead of hard copy Internet has allowed some types of crime to evolve in new ways so as to exploit the new opportunities that it provides.

25 Spams Most widespread. Unsolicited on burden of millions of servers every day. Companies spend huge amounts of money on software and staff to keep control. Save employees from dealing with it. Incur even higher cost: lower productivity

26 Spams Computer savvy tend to overlook the content of those message: URLs of web site that promise: Cheap Viagra, cheap mortgages, chance to meet lonely singles in the neighborhoods. Other People Do Click Them!

27 Spams Most traditional scams have goal to get you hand over your credit card number. Being able to reach millions of potential victims through power of spam is what makes it so attractive.

28 Phishing Fake web sites that look like those of banks or credit card companies. Like spamming, but appearing to come from well-known, legitimate businesses. You click the URL, see a web site that look exactly like the real thing. You enter your information. Game over.

29 Viruses & Worms Comparable to graffiti tag spray painting. Damage range from negligible to minor. Real impact lay in the effort it took to deal with infected computers and in preventing future attacks. Today, viruses will actively disrupt the function of antivirus software and prevent such tools from being installed a system.

30 The Numbers

31 Spam = 73% of s

32 94% in July

33 Viruses 6%

34 250,000 Phishing, 6 months

35 4,500,000 Phishing, Year-End

36 Getting Worse?

37 Seemingly Unstoppable

38 Seemingly Unstoppable Several factors

39 Seemingly Unstoppable Several factors Scams don t cost much to set up

40 Seemingly Unstoppable Several factors Scams don t cost much to set up Potential audience is huge

41 Seemingly Unstoppable Several factors Scams don t cost much to set up Potential audience is huge Chance of getting caught is low

42 Seemingly Unstoppable Several factors Scams don t cost much to set up Potential audience is huge Chance of getting caught is low Chance of getting prosecuted is minimal

43 Seemingly Unstoppable Several factors Scams don t cost much to set up Potential audience is huge Chance of getting caught is low Chance of getting prosecuted is minimal People are making money doing it

44 Cost of Setting Phishing Cost: Web server Little programming experience Some way to send a lot of messages A few hundred $ at most One credit card = profit.

45 Larger Operation A pool of servers. using commercial servers still cheap. But... using someone else s computer is cheaper viruses install relay servers on infected hosts.

46 Reach Out I ll Be There Automating the generation and distribution of messages. Writing script is easy enough. Little programming or none at all.

47 Crime Scene Investigation

48 Crime Scene Investigation Internet crime scene takes the form of web site, server, message. We are unlikely to uncover the name and address of the culprit, but we will be able to build up a practice of their operation. That can contain a surprising amount of detail.

49 Tools & Threats Computer viruses & spyware are everyday threats. Actively seeking out and examining dubious web sites, we may exposing our systems to higher than normal risk. UNIX-based systems (GNU/Linux or Mac OS X) is preferred platform which to investigate dubious web sites and messages.

50 UNIX The environment is less susceptible to computer viruses. Control mechanisms that make it difficult for rogue executables to be installed simply by downloading them. Not a big target.

51 Windows Exactly the opposite.

52 Most important:

53 Ethics

54 Computer & Internet Forensic #2 7 Laws of Identity อ.รว ท ต ภ หลำ SIGMA Research Laboratory & Department of Computing Faculty of Science, Silpakorn University [email protected]

55 Question 1 Your company is designed a new system that will store a user s confidential reviews on a server in your main office. How should this system be designed? Users are required to upload their files to a site, with no explanation of where the files go. They are not informed that other uses may have access to the information They re notified that the information can be accessed only by their supervisors and HR counselors. Users are not required to upload files if they don t want to. Instead of placing their review on a remote server, they may play Solitaire on company time.

56 Question 1 Your company is designed a new system that will store a user s confidential reviews on a server in your main office. How should this system be designed? Users are required to upload their files to a site, with no explanation of where the files go. They are not informed that other uses may have access to the information They re notified that the information can be accessed only by their supervisors and HR counselors. Users are not required to upload files if they don t want to. Instead of placing their review on a remote server, they may play Solitaire on company time.

57 Why It is a condition of employment to create and file review. Users can choose whether to do this, but not complying violates company policy. The the same time, they are given concrete information that clearly explains the exact boundaries for their personal information, so they can feel confident that prying eyes will not get to it.

58 Technical identity systems must only reveal information identifying a user with user s consent.

59 Question 2 Complete the following message: Thank you for signing up for free daily joke s! In order to begin your description, we need your... Home address address Cell phone number Social security number and mother s maiden name

60 Question 2 Complete the following message: Thank you for signing up for free daily joke s! In order to begin your description, we need your... Home address address Cell phone number Social security number and mother s maiden name

61 Why You only need an address to send out . If this is a real service and not just some trick to get your home address. Nothing more should be required. Forms that ask for all sorts of personal information create an atmosphere of distrust.

62 The solution that discloses the least amount of identifying information and best limits its use is the most stable long-term solution.

63 Question 3 Who is the best party to control the identifying information you ve given to an online bookseller? The bookseller The government A third-party address-book site None of the above

64 Question 3 Who is the best party to control the identifying information you ve given to an online bookseller? The bookseller The government A third-party address-book site None of the above

65 Why People have high levels of trust in the entities they re dealing with directly, and less trust in third-party go-betweens.

66 Digital identity systems must be designed so the disclosure of identifying information is limited to parties having necessary and justifiable place in a given identity relationship.

67 Question 4 Which of the following choices is an example of a unidirectional identifier? Your bluetooth adapter signal A web site URL A building-entry swipe card The microchip that was secretly implanted in your arm when you were vaccinated as a child

68 Question 4 Which of the following choices is an example of a unidirectional identifier? Your bluetooth adapter signal A web site URL A building-entry swipe card The microchip that was secretly implanted in your arm when you were vaccinated as a child

69 Why A swipe card only works when you choose to swipe it. In contrast, a Bluetooth adapter announces its existence indiscriminately to all in the vicinity. A URL lets any visitor find their way to your site. We won t even get into what that microchip does.

70 A universal identity system must support both omnidirectional identifiers for use by public entities and unidirectional for use by private entities. Facilitating discovery while preventing unnecessary release of correlation handles.

71 Question 5 How many operators should be able to work together with a universal identify system? ,559 As many as necessary

72 Question 5 How many operators should be able to work together with a universal identify system? ,559 As many as necessary As many as necessary

73 Why An identity system is best defined through its underlying protocol and user experience. Providing extensibility for any valid operators who want to plug into the system.

74 A universal identity system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers.

75 Question 6 Why do crackers target the end user rather than the inprocess communication? The end user can be tricked into opening a fake message from a bank and entering info If the cracker can assume a user s identity, he also gets to keep the comfy office chair, stapler, and travel coffee mug Communications protocols can be effectively secured, and the end user is the weak point on the chain All of the above (except maybe B)

76 Question 6 Why do crackers target the end user rather than the inprocess communication? The end user can be tricked into opening a fake message from a bank and entering info If the cracker can assume a user s identity, he also gets to keep the comfy office chair, stapler, and travel coffee mug Communications protocols can be effectively secured, and the end user is the weak point on the chain All of the above (except maybe B)

77 Why The human at the end of the identity system is the path of least resistance into the system. Systems should be designed to minimize confusion and ambiguity for the end user.

78 The universal identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human/machine communication mechanisms, offering protection against identity attacks.

79 Question 7 Which of the following is not a common contextual identity choice? Browsing (self-asserted identity for exploring the web) Community (public identity for collaborating with others) Citizen (identity issued by a government) Credit Card (identity issued by a financial institution) Klingon (self-asserted identity for visiting a sci-fi conference at the local VFW hall)

80 Question 7 Which of the following is not a common contextual identity choice? Browsing (self-asserted identity for exploring the web) Community (public identity for collaborating with others) Citizen (identity issued by a government) Credit Card (identity issued by a financial institution) Klingon (self-asserted identity for visiting a sci-fi conference at the local VFW hall)

81 Why At least, we hope that s the answer.

82 The unifying identity metasystem must guarantee its users a simple, consistent experience while enable separation of contexts through multiple operators and technologies.

83 7 Laws in the Nutshell Technical identity systems must only reveal information identifying a user with user s consent. The solution that discloses the least amount of identifying information and best limits its use is the most stable long-term solution.

84 7 Laws in the Nutshell Digital identity systems must be designed so the disclosure of identifying information is limited to parties having necessary and justifiable place in a given identity relationship.

85 7 Laws in the Nutshell A universal identity system must support both omnidirectional identifiers for use by public entities and unidirectional for use by private entities. Facilitating discovery while preventing unnecessary release of correlation handles.

86 7 Laws in the Nutshell A universal identity system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers.

87 7 Laws in the Nutshell The universal identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human/machine communication mechanisms, offering protection against identity attacks.

88 7 Laws in the Nutshell The unifying identity metasystem must guarantee its users a simple, consistent experience while enable separation of contexts through multiple operators and technologies.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

An Introduction on How to Better Protect Your Computer and Sensitive Data

An Introduction on How to Better Protect Your Computer and Sensitive Data An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail

More information

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS

MARIN COUNTY OFFICE OF EDUCATION. EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS MARIN COUNTY OFFICE OF EDUCATION EDUCATIONAL INTERNET ACCOUNT Acceptable Use Agreement TERMS AND CONDITIONS Please read the following carefully before signing this document. INTERNET access is coordinated

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for an automated penetration testing product and demonstrate

More information

Professional Ethics for Computer Science

Professional Ethics for Computer Science Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement

SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT Employee Technology Acceptable Use Agreement SAN BERNARDINO CITY UNIFIED SCHOOL DISTRICT is providing employees access to the district s electronic network. This network includes Internet access, computer services, videoconferencing, computer equipment

More information

SECURING INFORMATION SYSTEMS

SECURING INFORMATION SYSTEMS SECURING INFORMATION SYSTEMS (November 9, 2015) BUS3500 - Abdou Illia - Fall 2015 1 LEARNING GOALS Understand security attacks preps Discuss the major threats to information systems. Discuss protection

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Optum Website Privacy Policy

Optum Website Privacy Policy Optum Website Privacy Policy 1 Privacy Website Privacy Policy Introduction We recognize that the privacy of your personal information is important. The purpose of this policy is to let you know how we

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at [email protected].

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

How To Protect Your Information From Being Hacked By A Hacker

How To Protect Your Information From Being Hacked By A Hacker DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate

More information

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about: financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index

More information

AUTOMATED PENETRATION TESTING PRODUCTS

AUTOMATED PENETRATION TESTING PRODUCTS AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI) EXECUTIVE SUMMARY This paper will help you justify the need for automated penetration testing software and demonstrate

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

OCT Training & Technology Solutions [email protected] (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

Almost 400 million people 1 fall victim to cybercrime every year.

Almost 400 million people 1 fall victim to cybercrime every year. 400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005

More information

Under the Hood of the IBM Threat Protection System

Under the Hood of the IBM Threat Protection System Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer

More information

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College

INFORMATION SECURITY BASICS. A computer security tutorial for Holyoke Community College INFORMATION SECURITY BASICS A computer security tutorial for Holyoke Community College I NTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers.

Computer Scene Technical Ltd (We) are committed to providing the best service and protecting & respecting all our customers. Computer Scene Technical Ltd ("We") are committed to providing the best service and protecting & respecting all our customers. INFORMATION ABOUT US Our site is operated by Computer Scene Technical Ltd

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

Mobile Devices and Malicious Code Attack Prevention

Mobile Devices and Malicious Code Attack Prevention Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com

More information

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

Promoting Network Security (A Service Provider Perspective)

Promoting Network Security (A Service Provider Perspective) Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

2011 Parent-Teen Internet Safety Report

2011 Parent-Teen Internet Safety Report 2011 Parent-Teen Internet Safety Report GFI Software June 2011 TABLE OF CONTENTS INTRODUCTION STUDY METHODOLOGY KEY FINDINGS AT A GLANCE CONTENT COMMUNICATIONS MALWARE INTERNET SAFETY EDUCATION ANALYSIS

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001 WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their

More information

Phishing Past, Present and Future

Phishing Past, Present and Future White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients

More information

You ll learn about our roadmap across the Symantec email and gateway security offerings.

You ll learn about our roadmap across the Symantec email and gateway security offerings. #SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Overview of computer and communications security

Overview of computer and communications security Overview of computer and communications security 2 1 Basic security concepts Assets Threats Security services Security mechanisms 2 Assets Logical resources Information Money (electronic) Personal data

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information