Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Similar documents
Online Safety for Middle and High School

National Cyber Security Month 2015: Daily Security Awareness Tips

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

STOP. THINK. CONNECT. Online Safety Quiz

Learn to protect yourself from Identity Theft. First National Bank can help.

Identity Theft Protection

BE SAFE ONLINE: Lesson Plan

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Don t Fall Victim to Cybercrime:

Digital Citizenship Lesson Plan

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

National Cybersecurity Awareness Campaign Families Presentation

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

HEADS up. stop think connect

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Saheel KHOYRATTY. Partner Technology Advisor

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Retail/Consumer Client. Internet Banking Awareness and Education Program

Safe Practices for Online Banking

EADS up. stop think connect

E-Safety Issues and Online Safety

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

National Cybersecurity Awareness Campaign. Kids Presentation

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Remote Deposit Quick Start Guide

A Publication of the GCPS Information Management Division

Protecting your business from fraud

Tips for Banking Online Safely

How To Prevent Cybercrime

Protect yourself online

E-Safety Issues and Online Safety

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Internet Safety/CIPA Lesson Plan

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Protection from Fraud and Identity Theft

Customer Awareness for Security and Fraud Prevention

2012 NORTON CYBERCRIME REPORT

Protecting Yourself from Identity Theft

Understand What s Going On

Network Security and the Small Business

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Internet basics 2.3 Protecting your computer

High Speed Internet - User Guide. Welcome to. your world.

Online Security Tips

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

2012 NCSA / McAfee Online Safety Survey

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.


Safety Tips for Social Networking

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Cyber Security. Securing Your Mobile and Online Banking Transactions

Introduction to Cyber Security

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Activities for Protecting Your Identity and Computer for Middle and High School Students

Fraud Prevention Tips

E-Safety Issues and Online Safety. Parents Evening

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Welcome to the Protecting Your Identity. Training Module

Internet Safety: Pitfalls & Dangers

How-To Guide: Cyber Security. Content Provided by

Corporate Account Takeover & Information Security Awareness. Customer Training

Contents. NetSafe 3. Facebook 4. YouTube 6. Google 7. Microsoft 8. Yahoo! 10. Trade Me 12. Twitter 14. Further Reading 17

Computer Security Maintenance Information and Self-Check Activities

Infocomm Sec rity is incomplete without U Be aware,

ICT Security Policy for Schools

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Certified Secure Computer User

National Cyber Crime Unit

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

10 Quick Tips to Mobile Security

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Cyber Security: Beginners Guide to Firewalls

Transcription:

Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1

What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage or unauthorized access or use of: computers (any intelligent device: PCs, tablets, handhelds, etc) networks (wired, wireless & fiber), etc. Programs, data, email, text messages, IMs, etc. Credit, health and financial tools (smart cards, credit cards, etc) Phones, cameras and multi-media devices Appliances and home control systems Cars and vehicles Utility control system (SCADA). Stop, Think, then Connect 2

Easy to Hack Password a statistic Experts agree 7 to 9 using All Character Passwords are minimum required safety Net 3

DID YOU KNOW? According to a December 2010 analysis of U.S. spending the federal government will spend over $13 billion annually on cyber security. In 2010, more than 12 million records were involved in data breaches Cyber attacks on social networks in 2010 doubled from the year before At any given time more than 100 million computers are infected with malware Thirty-two percent of online teens have experienced online harassment; or fraud; or bullying; or are victim to Cyber crime 4

Why worry its private right? Every crime you can think of can now be aided by or committed on the computer or cell phone Identity theft Predatory practices Surveillance Social networking misuse Bullying & illegal activities 5

What do you keep online? Social and relationship information Banking and Finance activities Pictures Videos Email WEB habits and places you ve been Intellectual property Personal and business patterns 6

Kid or not it is just this easy. 7

Online - Do you really Know? Online anyone can be anyone, no proof required. You may not know the truth about someone you first meet online. Time does not equal trust or knowing the person or the business. You can be lied to or betrayed. 8

The Silent Attack. 9

Phishing anyone? Phishing is a special type of e-mail or IM (instant Message) attack. A phisher sends out a fake notice like: your credit account has been disabled, a plea for help, or a note about an enticing subject. A system sometimes can be infected with spyware, viruses or a Trojan by just clicking on a link or visiting the malicious site. If you share personal information with others as a result of answering these messages, your identity can also be stolen. 10

Remember the 4 R s Recognize techniques used by online predators to deceive their victims. Refuse requests for personal information. Respond assertively if you are ever in an uncomfortable situation while online. Exit the program, log off or turn off the computer Report to a site manager, authorities, parent or other trusted entity any suspicious or dangerous contact. 11

Keeping Personal Information Private Who is looking at you online? Any One could Be! 12

Are social networking sites safe? Although social networking sites are not inherently dangerous, because of their open nature, and anonymity, users may not realize the potential dangers. Know the risks and note: 74% of social network users have given out at least some personal information. This information can be used to steal their identity. 83% of social networkers have downloaded content from another user. Content from untrustworthy sources can contain viruses, worms, or Trojan horses. All information placed on Social site is there permanently, it lives long after removed or deleted! 13

Knowledge is power! First and foremost spend the time to educate yourself. Stop and review what you want to do Think about what you are doing and the consequences, methods and risks Then Connect Treat using the internet like your credit cards or wallet 14

social networking tips. If you must place personal info online 1. Make sure you are on a secure site HTTPS:// 2. Know the site you are giving your information to 3. Use a credit card specifically meant for Cyber purchases and that is not tied to your bank accounts 4. Only provide minimal information to get job done; note if it is not required don t give it ( * usually indicates mandatory) 5. Never download anything from someone you don t know. 6. Don t respond if you don t know the source. 7. Use Privacy setting -DON T use default configurations! 15

Protect Your Reputation Consider if it is a picture you want everyone to see, including your employer, parents, teachers, law enforcement and college admission officers. Remember that any picture you upload to the Web can be downloaded by anyone and be copied or posted online FOREVER! 16

Your Cell Phone Your Phone is now a computer, it has all the same concerns, use it wisely. 17

DO NOT SAY ANYTHING ONLINE THAT YOU WOULDN T SAY OFFLINE. 18

15 Foolproof Tips for Online Transactions www.businessinsider.com/keeping-your-onlinetransactions-secure-2013-3 19

Some WEB Sites to help General information and educational Information: http://www.staysafeonline.org South Carolina Information Sharing & Analysis Center https://sc-isac.sc.gov/node SC-ISAC books, pamphlets, and training material https://sc-isac.sc.gov/content/policy/cyber-security-guide 20

Reporting Internet Crime IC3 http://www.ic3.gov/complaint/default.aspx or http://www.fbi.gov/contact-us 21

Thank You. And remember STOP, THINK and CONNECT! Vince.Simonowicz@CityofRockHill.com 22