Title: Crimes, Malware and Phishing
1Crimes, Malware and Phishing
2- MOST CRIMES ARE DUE TO MOTIVATION AND
OPPORTUNITY. IN A HIGH-TECH WORLD WITH NETWORKS
EVERYWHERE, OPPORTUNITY IS ALWAYS PRESENT. - WHO IN YOUR COMPANY HAS ACCESS TO FINANCIAL AND
PERSONAL DATA ?
3- CRIME 1
- F.P.L. PROGRAMMER TOOK 1/10 CENT FROM EACH
CUSTOMER..
- CRIME 2
- COMPANY MADE UP BILLS FOR OFFICE SUPPLIES.
4AS TECHNOLOGY IMPROVES, PEOPLE GET MORE
RESOURCEFUL. EX FAKE ATM MACHINE WAS USED TO
GET CREDIT CARD NUMBERS AND PASSWORDS.
5- THE MOST COMMON COMPUTER CRIME IS SOFTWARE
PIRACY. (COPYING SOFTWARE ) - THESE CRIMES HAVE THE SAME MOTIVATION MONEY
6- OTHER TYPES OF COMPUTER CRIMES INCLUDE SABOTAGE.
- CRIME EMPLOYEE SETS UP A PROGRAM THAT WILL
DESTROY COMPANY RECORDS ONE WEEK AFTER HE IS
FIRED.
7- What would you do ?
- You are the owner of a company and your network
geek just told you that you couldnt fire him.
He said all of your records would all be
destroyed if he was fired
8- Another type of Crime is to obtain information
and then use it for personal gain - This is done with a KEYBOARD LOGGER
- And by PHISHING
9PHISHING
- Phishing is the art of sending a request to
people in the hopes that they will supply you
with personal information about themselves. -
- Phishing has been around for many years. It was
previously done by calling people or sending
paper letters - but has been perfected with
the creation of Internet and e-mail.
10- WHY ?
- If you supply personal information to someone,
they can open accounts and use your credit to buy
items for themselves using your name. - HOW ?
- E-mail is the newest method of phishing e-mails
are sent to thousands of people at once. These
e-mails convince the reader to click on a link
that sends them to a fake website. The website
prompts the user for personal information and
sends it back to the sender who uses it for their
own gain.
11 - From Washington Mutual
- Sent Friday, November 28, 2008 1014 AM
- Subject WaMu Chase. Safe Secure - Message id
XLKLTRZBGWWaMu customers we're proud to
welcome you to one of the nation's largest banks
as of September 25, 2008, all WaMu customer
deposits are now deposits of JPMorgan Chase, one
of the most stable banks in America.What will
change Some aspects of the ONLINE SERVICES
Chase Online and WaMu Online DEADLINE December,
30, 2008 What you need to do Update your
information by visiting Chase Online or WaMu
Online. Log on to your account and you will be
instructed on how to update the client
information screen. Click here to access your
account.Pif you do not complete this within 48
hours, your online priviledges will be suspended.
Please do not reply to this message. For
questions, please call Customer Service. We are
available 24 hours a day, 7 days a week.
Sincerely, Carter Franke Chief Marketing
Officer Member Services
12- You might see a phishing scam
- In e-mail messages, even if they appear to be
from a coworker or someone you know. - On your social networking Web site. (Facebook,
MySpace) - On a fake Web site that accepts donations for
charity. - On Web sites that spoof your familiar sites using
slightly different Web addresses, hoping you
won't notice. - In your instant message program.
- On your cell phone or other mobile device.
- By receiving a phone call at home.
13- How to protect yourself
- Don't use the links in an email to get to a web
page. EVER !! - Instead, log onto the website directly by typing
in the Web address in your browser. - Avoid filling out forms in email messages that
ask for personal financial information. You
should only communicate information such as
credit card numbers or account information via a
secure website or the telephone. - Always ensure that you're using a secure website
when submitting credit card or other sensitive
information via your Web browser. To make sure
you're on a secure Web server, check the
beginning of the Web address in your browser's
address bar - it should be https// rather
than just http//.
14Malware
ADWARE - Keeps track of events and creates
POP-Ups easily solved with free
programs SPYWARE Keeps track of events and
sends to others VIRUSES Harmful programs
designed to disrupt ..
15SPYWARE
- Spyware is a general name given to programs that
hide on your computer. These programs TRACK
your internet usage and then - Send your personal info to someone by e-mailing
it to them from your own computer.
16VIRUSES
A VIRUS IS A SMALL PROGRAM THAT IS WRITTEN BY
SOMEONE. THE PROGRAM IS ATTACHED TO ANOTHER
LARGE PROGRAM SUCH AS A GAME. WHEN THE USER
LOADS THE GAME INTO HIS COMPUTER, THE VIRUS IS
ALSO LOADED.
17- VIRUSES ARE TRIGGERED BY DIFFERENT MEANS
TIME, DATE, NUMBER OF OFF/ON CYCLES, ETC. - A WAY TO PREVENT YOUR COMPUTER FROM BEING
INFECTED IS ABSTENANCE ( BUY ONLY LICENSED
SOFTWARE AND NEVER USE A MODEM TO CONNECT TO
INTERNET)
18A MORE REALISTIC WAY IS TO USE AN ANTI-VIRUS
PROGRAM NORTON ANTI-VIRUS, MCAFEE, VIRUS-TECH,
A.V.G. THESE ARE INSTALLED ON YOUR COMPUTER AND
SCAN EVERY BIT OF DATA THAT YOU PUT INTO YOUR
COMPUTER. IT CHECKS IT AGAINST A LIST OF KNOWN
VIRUSES. IF IT FINDS A MATCH, IT ALERTS YOU.
19backup
BACKUP, BACKUP, BACKUP MAKE SEVERAL COPIES OF
VALUABLE DATA. SOME PEOPLE STORE ALL OF THEIR
DATA ON THE HARD DRIVE OF ONE COMPUTER..
FOOLISH The hard drive of a computer is a
cheap physical device that can (and will )
break..
20Methods of Backing up data
- 1. FLOPPY DISK
- 2. TAPE BACKUP
- 3. CD - BURNER
- 4. ZIP DRIVE
- 5. THUMB DRIVE
- 6. ON-LINE STORAGE COMPANY
- 7. EMBEDDED FINGER CHIP ?
21A DEVICE CALLED A U.P.S (UNINTERRUPTIBLE POWER
SUPPLY) PROVIDES CLEAN POWER TO YOUR COMPUTER.
IT PROVIDES BATTERY PROTECTION FOR 10 15
MINUTES. A DEVICE CALLED A SURGE PROTECTOR
PREVENTS YOUR COMPUTER FROM POWER SPIKES.
22the end