Cyber Security

24
Cyber Security Homeland Security, the CIA, Covert Ops

Transcript of Cyber Security

Page 1: Cyber Security

Cyber SecurityHomeland Security, the CIA, Covert

Ops

Page 2: Cyber Security

What is cyber security?O Cyber security is the body of

technologies, processes and practices designed to protect networks,

computers, programs and data from attack, damage or unauthorized

access.

Page 3: Cyber Security

What is a cyber crime?Here are some examples.Watch a hacker remotely control a Jeep on the highway!

O Hacking: This is when a person’s computer is broken into so that their personal information can be accessed.

OIn the United States this is classified as a felony!!

Page 4: Cyber Security

THEFTO This crime occurs

when a person violates copyrights and downloads music, movies games and software.

Page 5: Cyber Security

CYBER STALKINGClick here to watch a short video on cyber stalking

O This is a kind of online harassment where the victim is subjected to unwanted phone calls, text messages and emails. Cyber stalkers use these tactics to make their victims lives miserable.

Page 6: Cyber Security

IDENTITY THEFTO This has become a

major problem with people using the internet for shopping and banking services. A criminal can access data about a person’s bank account, credit cards, social security and other sensitive information. They use this information to steal money from their bank accounts and buy things in the victims name. This can result in MAJOR financial losses for the victim.

Page 7: Cyber Security

HOW TO COMBAT CYBER CRIMES

O Today’s world is more interconnected than ever before. We are reliant on modern technology, however that does leave us vulnerable to cyberattacks. There are three main departments that help keep us safe.

Page 8: Cyber Security

SECRET SERVICEThey maintain the Electronic Crimes Task Forces,

which focus on identifying and locating international cyber criminals that are connected to cyber intrusions, bank fraud, data breaches, and other computer related crimes. They have been

responsible for the arrest of cyber criminals responsible for the theft of hundreds of millions of

credit card numbers and the loss of about $600 million to financial and retail institutions.

Page 9: Cyber Security

U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT (ICE)

They deliver computer-based technical services to support domestic and international investigations into cross-border crime. This unit is made up of three different units: Cyber

Crimes Unit, the Child Exploitation Investigations Unit, and the Computer Forensics Unit. This state-of-the-art center offers

cyber crime support and training to federal, state, local, and international law enforcement agencies. They operate a fully equipped computer forensics laboratory, which specializes in

digital evidence recovery, and offers training in computer investigative and forensic skills.

Page 10: Cyber Security

LAW ENFORCEMENT CYBER INCIDENT REPORTING

They provide information for state, local, tribal, and territorial law enforcement on when, what and how

to report a cyber incident to a federal entity.

Page 11: Cyber Security

SECURITY TIPSO Here are some things to watch for

and some ideas on how you can protect yourself

Page 12: Cyber Security

CYBERBULLYINGO Cyberbullying is the practice of using

technology to harass, or bully, someone else.O Cyberbullies may use email, instant

messaging, web pages, and cell phones.

O Forms of cyberbullying can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking.

Page 13: Cyber Security

What can I do to protect myself from cyberbullying?O Practice good online habits – be responsibleO Keep lines of communication open – Talk to your

parents about your online activitiesO Limit availability of personal information- limit the

number of people who have access to your contact information (phone number, address, habits, details about your interests)

O Avoid escalating the situation – Don’t respond with hostility as it may provoke the bully.

O Report cyberbullying to the appropriate authorities – Contact your school, a trusted adult, or local law enforcement

Page 14: Cyber Security

PREVENTING AND RESPONDING TO IDENTITY THEFT

O You may be a victim of identity theft even if you never use a computer. Thieves may obtain your personal information (such as credit card numbers, telephone number, account numbers, and addresses) by stealing your wallet, overhearing a conversation, rummaging through your trash or picking up a receipt that has your account number on it.

Page 15: Cyber Security

How to avoid being a victim of identity theft

O Take advantage of security features – Passwords are very important! Choose ones that only you know.

O Be careful what information you publicize – Attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums (social media, websites, etc.)

Page 16: Cyber Security

STAYING SAFE ON SOCIAL NETWORKING SITES

O Social networking sites build upon the concept of traditional social networks where you are connected to new people through people you already know. Facebook is one for example. The purpose of some sites may be purely social, allowing users to establish friendships, while others may focus on establishing business connections.

O These sites allow you to provide information about yourself to connect with others.

Page 17: Cyber Security

HOW TO STAY SAFE ON SOCIAL NETWORK SITES LIKE FACEBOOK

O Limit the amount of personal information that you post

O Be wary of strangers – The internet makes it easy for people to misrepresent themselves and their motives. Never give personal information to people you do not know.

O Be skeptical – Don’t believe everything you read online. Information could be a lie, an exaggeration or a joke.

O Use strong passwords – Choose ones that can not be easily guessed

Page 18: Cyber Security

MOVIESInvolving cybercrimes

Page 19: Cyber Security

Catch Me If You CanA true story!

Watch the trailer here!

A true story about Frank Abagnale Jr., who, before

his 19th birthday, successfully conned

MILLIONS of dollars’ worth of checks as a Pan Am pilot,

doctor, and legal prosecutor.

Page 20: Cyber Security

The NetWatch the trailer with Sandra Bullock here!

A computer programmer stumbles

upon a conspiracy, putting her life and the lives of those around her in great danger.

Page 21: Cyber Security

BOOKSinvolving cybercrimes

Page 22: Cyber Security

Cyber-Warzone: Stories of Cyber-

Bullying and Textual Abuse

Cyber-Warzone is a collection of fictional but realistic stories of

cyber-aggression involving teens and pre-teens. The purpose of the

book is to help young people, parents, teachers and school cope with a variety of forms of cyber-

aggression. Useful resources, links and strategies are included at the

end of the book.

Page 23: Cyber Security

What Would JeeMin Do: Cyber

BullyingJeeMin is at a friend’s birthday party.

Her friend shows off her new cell phone she had received for her

birthday. Being so excited she passes her 

number on to several friends, some who send her very unkind bullying

text messages. JeeMin and her friend

learn what to do in this bully situation.

Page 24: Cyber Security

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

O You are under surveillance right now.O Your cell phone provider tracks your location

and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

O The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

O Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He shows us exactly what we can do to reform our government surveillance programs and shake up surveillance-based business models, while also providing tips for you to protect your privacy every day. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.