Cybercrime Awareness - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Cybercrime Awareness

Description:

Nonprofit Organization. Auto. Liability. Professional. Liability. General. Liability & Sexual ... It provides the blue print for safety in an organization. ... – PowerPoint PPT presentation

Number of Views:6540
Avg rating:5.0/5.0
Slides: 22
Provided by: stcc4
Category:

less

Transcript and Presenter's Notes

Title: Cybercrime Awareness


1
Cybercrime Awareness
  • Michael De La Cruz
  • Information Security Officer

2
Objectives
  • To provide a general awareness of Cybercrime
  • To understand Cybercrime methods
  • To identify Internet scams
  • To learn how to keep from being a victim

3
What is Cybercrime?
  • Cybercrime is any illegal act committed by using
    a computer network.
  • Cybercrime is a subset of computer crime.

4
Examples of Cybercrime
  • Web defacement
  • Unauthorized network access
  • Cyber-Stalking
  • Internet fraud
  • Identity theft
  • Child pornography
  • Interception and fabrication of emails
  • Theft of passwords

5
Who are the perpetrators?
  • Not just hackers.
  • Companies seeking competitors trade secrets
  • Con-artists
  • Pedophiles
  • Disgruntled employees
  • Accidental criminals
  • The Internet should be viewed as another medium
    in which criminals can conduct illegal acts.

6
Who are the cybervictims?
  • Companies
  • No security awareness
  • Bottom liners
  • Individuals
  • The unaware individuals
  • The dont care individuals
  • The innocent by-stander individuals
  • Society

7
What does the WORLD know about YOU?
  • The Stalkers Home Page
  • http//www.glr.com/stalk.html
  • Email searches
  • Phone number searches
  • Address searches

8
Credit Card Fraud
  • A quick search on GOOGLE yielded this
    information
  • Discover Card number range 601100-601199
  • Visa Card number range 4000-4999
  • How much more information can we get?

9
Search Engine Fun
  • TRY THIS
  • Conduct an Advanced search on GOOGLE for your
    first 8 numbers of your credit card number.
  • Now try searching for the first 5 numbers of your
    SSN.
  • Try a search on GOOGLE for the letters SSN while
    filtering for Excel documents.

10
Website Fraud
  • Many con-artists go to great measures to create a
    legitimate looking website in order to convince
    customers to give up their personal information.
  • April 11, 2003
  • 50 ANZ bank customers in Australia were duped
    into revealing their bank username and passwords.
    The victims logged on to what appeared to be
    their bank, but in reality was redirecting them
    to another web site that was secretly recording
    all their data.

11
Spyware
  • Spyware is used by companies to gather the
    surfing habits of individuals.
  • Pop-up ads are usually a result of spyware being
    present on a computer.
  • Keyloggers are a form of spyware that secretly
    record keystrokes and have the ability to email
    them back to the intruder.

12
Desktop Security
  • Many people become victims of a cyber attack by
    what is referred to as drive by hacking.
  • Tools are freely available on the Internet to
    allow for such behavior to occur.
  • The latest Microsoft Security flaw is a good
    example of how vulnerable each users desktop is
    to such an attack.

13
Pornography
  • Pornography is the first consistently successful
    e-commerce product.
  • Deceptive marketing tactics and mouse trapping
    technologies encourage customers to access their
    websites.
  • Many sites are created to gather users personal
    information and install backdoors (trojans) on
    their computers.

14
Pornography Statistics
  • 30 of SPAM is from pornographers
  • Accessed unintentionally (whitehouse.com,
    coffeebeansupply.com, teenagershideout.com,
    clothingcatalog.com, watersports.com, boys.com)
  • Child Pornography est. revenue per year is 200
    million - 1 billion.
  • 1 in 2 parents do not use internet filtering
    software.

15
What can I do?
  • Awareness is the first step in protecting
    yourself and your family.
  • Invest in Anti-virus, Firewall, and SPAM blocking
    software for your home PC.
  • Detect secure websites when conducting
    transactions online.
  • Do NOT respond or act on emails sent from unknown
    sources.
  • Stay on top of current Cybercrime trends
  • www.stcc.cc.tx.us/ITSprojects/infosec/infosec.htm

16
Detecting Secure Websites
HTTPS instead of HTTP
Yellow Lock at bottom right of website
17
Emails
  • SPAM emails are becoming easier to detect by the
    average user. Look for these clues to identify
    SPAM
  • The receivers name is the same as the senders
  • The subject is offering money making deals
  • The user is unknown and there are links to what
    appear to be legitimate websites.

18
Email Filters
  • STCC is currently using a SPAM email filtering
    software to block most unwanted emails.
  • This is will not block all emails, since it
    filters by keywords, but will eliminate the more
    obvious ones.
  • Email filters for home use can be purchased to
    protect your family from SPAM.
  • Bundle packages are available that include pop-up
    blockers, anti-virus, spy-ware removers, and
    Internet filters.

19
Helpful Links
  • Tiny Personal Firewall
  • www.tinysoftware.com
  • Antivirus Software
  • http//www.thefreesite.com/Free_Software/Anti_viru
    s_freeware/
  • SPAM blockers
  • http//netsecurity.about.com/library/blfreepopup.h
    tm
  • STCC InfoSec page
  • www.stcc.cc.tx.us/ITSprojects/infosec/infosec.htm

20
Conclusion
  • The key to protecting yourself is being aware.
  • Not all cybercriminals are hackers.
  • There is a whole other world that exists in
    cyberspacemake sure that your information
    travels safely.

21
Questions
  • Michael De La Cruz
  • Information Security Officer
  • delacruzma_at_stcc.cc.tx.us
Write a Comment
User Comments (0)
About PowerShow.com