Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1
What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage or unauthorized access or use of: computers (any intelligent device: PCs, tablets, handhelds, etc) networks (wired, wireless & fiber), etc. Programs, data, email, text messages, IMs, etc. Credit, health and financial tools (smart cards, credit cards, etc) Phones, cameras and multi-media devices Appliances and home control systems Cars and vehicles Utility control system (SCADA). Stop, Think, then Connect 2
Easy to Hack Password a statistic Experts agree 7 to 9 using All Character Passwords are minimum required safety Net 3
DID YOU KNOW? According to a December 2010 analysis of U.S. spending the federal government will spend over $13 billion annually on cyber security. In 2010, more than 12 million records were involved in data breaches Cyber attacks on social networks in 2010 doubled from the year before At any given time more than 100 million computers are infected with malware Thirty-two percent of online teens have experienced online harassment; or fraud; or bullying; or are victim to Cyber crime 4
Why worry its private right? Every crime you can think of can now be aided by or committed on the computer or cell phone Identity theft Predatory practices Surveillance Social networking misuse Bullying & illegal activities 5
What do you keep online? Social and relationship information Banking and Finance activities Pictures Videos Email WEB habits and places you ve been Intellectual property Personal and business patterns 6
Kid or not it is just this easy. 7
Online - Do you really Know? Online anyone can be anyone, no proof required. You may not know the truth about someone you first meet online. Time does not equal trust or knowing the person or the business. You can be lied to or betrayed. 8
The Silent Attack. 9
Phishing anyone? Phishing is a special type of e-mail or IM (instant Message) attack. A phisher sends out a fake notice like: your credit account has been disabled, a plea for help, or a note about an enticing subject. A system sometimes can be infected with spyware, viruses or a Trojan by just clicking on a link or visiting the malicious site. If you share personal information with others as a result of answering these messages, your identity can also be stolen. 10
Remember the 4 R s Recognize techniques used by online predators to deceive their victims. Refuse requests for personal information. Respond assertively if you are ever in an uncomfortable situation while online. Exit the program, log off or turn off the computer Report to a site manager, authorities, parent or other trusted entity any suspicious or dangerous contact. 11
Keeping Personal Information Private Who is looking at you online? Any One could Be! 12
Are social networking sites safe? Although social networking sites are not inherently dangerous, because of their open nature, and anonymity, users may not realize the potential dangers. Know the risks and note: 74% of social network users have given out at least some personal information. This information can be used to steal their identity. 83% of social networkers have downloaded content from another user. Content from untrustworthy sources can contain viruses, worms, or Trojan horses. All information placed on Social site is there permanently, it lives long after removed or deleted! 13
Knowledge is power! First and foremost spend the time to educate yourself. Stop and review what you want to do Think about what you are doing and the consequences, methods and risks Then Connect Treat using the internet like your credit cards or wallet 14
social networking tips. If you must place personal info online 1. Make sure you are on a secure site HTTPS:// 2. Know the site you are giving your information to 3. Use a credit card specifically meant for Cyber purchases and that is not tied to your bank accounts 4. Only provide minimal information to get job done; note if it is not required don t give it ( * usually indicates mandatory) 5. Never download anything from someone you don t know. 6. Don t respond if you don t know the source. 7. Use Privacy setting -DON T use default configurations! 15
Protect Your Reputation Consider if it is a picture you want everyone to see, including your employer, parents, teachers, law enforcement and college admission officers. Remember that any picture you upload to the Web can be downloaded by anyone and be copied or posted online FOREVER! 16
Your Cell Phone Your Phone is now a computer, it has all the same concerns, use it wisely. 17
DO NOT SAY ANYTHING ONLINE THAT YOU WOULDN T SAY OFFLINE. 18
15 Foolproof Tips for Online Transactions www.businessinsider.com/keeping-your-onlinetransactions-secure-2013-3 19
Some WEB Sites to help General information and educational Information: http://www.staysafeonline.org South Carolina Information Sharing & Analysis Center https://sc-isac.sc.gov/node SC-ISAC books, pamphlets, and training material https://sc-isac.sc.gov/content/policy/cyber-security-guide 20
Reporting Internet Crime IC3 http://www.ic3.gov/complaint/default.aspx or http://www.fbi.gov/contact-us 21
Thank You. And remember STOP, THINK and CONNECT! Vince.Simonowicz@CityofRockHill.com 22