Вы находитесь на странице: 1из 20

“It Will Never

Happen To
Me”
A Cyber Security Seminar
Presented by:
Mrs. Sheena D. Hilis
• Cyber-security is the practice of
defending computers, servers,
What is mobile devices, electronic
Cyber systems, networks, and data
from malicious attacks.
Security??
• It's also known as information
technology security or
electronic information security.
• Cyber crime encompasses any
criminal act dealing with
What is computers and networks (also

Cyber known as hacking).

Crime?? • Additionally , cyber crime also


includes traditional crimes
conducted through the
internet.
• For example: hate crimes,
telemarketing and Internet
What is fraud, identity theft,

Cyber • Credit card account thefts are


Crime?? considered to be cyber crimes
when the illegal activities are
committed through the use of
a computer and the Internet.
What is Ransomware?
• Ransomware is a strain of malware
(malicious software) that encrypts
or locks all of the files on your
computer or server, and then
demands a payment (or ransom) to
unlock your files.
What is Ransomware?
• It takes many forms, including its most infamous
incarnation, Cryptolocker .

• In some instances, ransomware’s presence can be


betrayed by a .EXE file extension - but cyber
criminals are getting more and more sophisticated,
so this often isn’t the case.
How Does Ransomware Spread ?
• Like many viruses, the most common source of infection is
from emails, when a user opens contaminated attachments
or clicks a malicious link.

• However, there are many other sources, like rogue USB


sticks, or even joining free WiFi networks.
How can I Remove it ?
• Unfortunately, there’s no sure-fire way to remove
Ransomware.
• Even paying up doesn’t always work; criminals have been
known to ask for higher and higher sums, or claim to have
lost the ‘key’.
• The best approach is to access your backups.
What can I do to avoid
Ransomware?

Preventative measures,
Anti-virus,
Backup.
• Do you know how much data
about yourself is freely online?
Research • If someone were to research
Yourself you, what would they be able
to find?
• What could they know about
you from a simple search?
WHO WOULD WANT TO HACK US?
WHO WOULD WANT TO HACK US?
• What Have We Got That Can't
Be Found Elsewhere More
Easily
• Credit/Debit Card Details
• Online Account Details Such
As Pay Pal
• Scanning Of Passports Or
Credit Cards
Think you can Outsmart
Internet Scammers?
Ever wonder how good you are at telling the
difference between a legitimate website and one
that's a phishing attempt?

https://www.opendns.com/phishing-quiz/
Basic Kinds of Phishing
Spear Phishing
Whaling
Pharming
1. Spear phishing targets specific individuals
instead of a wide group of people.
2. Whaling is when attackers go after a “big
fish” like a CEO, it's called whaling.
3. Pharming sends users to a fraudulent
website that appears to be legitimate
How • less than eight characters
• common usage words such as:

strong is – Names of family members, pets, friends,


co-workers, fantasy characters, etc.

your – Computer terms and names, commands,


sites, companies, hardware, software.

password – "Boston University”, “Boston", or unit


names.

? – Any of the above spelled backwards.


– Any of the above preceded or followed by
a digit (e.g., secret1, 1secret)
HOW DO WE PROTECT OURSELVES?
1. You don’t get calls from your Bank about the Balance in your
account.
2. You don’t get phone calls from Microsoft Technical Support or
other support agents.
3. You don’t get emails from HMRC “ You are owed credit and to
contact them”
4. You probably don’t have a long lost Relative in the Congo
who has Millions that they need you to hold for them just
short term
5. Passwords should be changed regularly and not use common
ones
QUESTION & ANSWER
Thanks for listening. 

Вам также может понравиться