Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cyber Security Awereness Presentation

No description
by

Jason Duran

on 30 January 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Security Awereness Presentation

Who's at risk? Network Security Awareness On Jan 25th the Christian Science Monitor reported that Exxon Mobile, Marathon Oil, and ConocoPhillips were attacked in 3 separate instances in 2008. The stolen data included e-mail passwords, messages, and other information tied to executives with access to proprietary exploration and discovery information. The cyber attacks may have originated in China and experts highlight a new level of sophistication in the growing global war of Internet espionage.

Source: csmonitor.com Most Common Reason Behind Corporate Hacking Greed and financial gain
Theft
Activists motivated by ideological dissent (Anonymous, LulzSec)
Retribution (disgruntled employees)
Spying and espionage (Flame virus) Who is the target? The biggest misconception is that large corporations or organizations are the only cyber criminal’s target and not individuals.

Unaware, employees are the organizations greatest weakness as people make common mistakes such as clicking on malicious links or using an infected USB stick.

As a result of these unintended actions you have become the primary target. You are the target! Your computer and your information contains valuable information to a cybercriminal. It can also be used as a tool for hacking. Data theft – Cyber criminals can obtain confidential company information stored on your computer or use your credentials to steal it.

Identity theft – Cyber criminals can use employee identity's to access company credit card accounts.

Attacking others – Cybercriminals can use your computer to attack other individuals or organizations. Cyber crime is not limited from 9-5 Most individuals are unaware that they can be targeted any where at any time.You can be targeted at an;
Airport
Hotel
Conference
Also at home Always assume that you are at risk.

Our identity and access has great value to cyber criminals even if we do not think it does.

If something seems or feels suspicious, it most likely is. Remember these core principles: Recognizing And Avoiding The Risks Only download or install programs that come from trusted sources. If a window pops up telling you your system is infected, that you need a program to make your system run faster, or anything that wants you to install it without you having purposely started a download, close the window without clicking on yes, no, or other.
Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
If a website seems suspicious, it most likely is. Browsing the Internet If you don’t know the sender and/or don’t know what it is they are sending you, simply delete the e-mail. If it was important, they will send it again with a more descriptive ‘Subject:’ or ‘Body.’

A common e-mail attacking method is called ‘phishing.’ Phishing is used to bait e-mail recipients to follow certain links used by scammers to pages that mock the look of popular sites such as Paypal, Hotmail, and online back accounts.

If it seems suspicious, it most likely is! E-mail USB Drives or Thumb Drives If you find a USB drive in the parking lot, NEVER use it on your computer without having someone from IT check it first.

Be weary of “promotional” USB drives.

If you receive a warning from Symantec when using a USB drive, contact the Service Desk immediately. Social Engineering Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
Do not give sensitive information to anyone unless you are sure that they are indeed who they claim to be and that they should have access to the information.
If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity. Takeaways Assume you're always at risk

Don't share your user ID

Don't trust e-mail that seems suspicious

Contact the Service Desk or an IT rep if you think you have been hacked or received something malicious. 286-1600 or ext 3333 opt 2

If it seems suspicious, it most likely is! text
Full transcript