84
Cyber Security 'the good,' 'the bad,' & 'the ugly'

Cyber Security Awareness October 2014

Embed Size (px)

DESCRIPTION

Coverage of the following topics: Tech growth, social media, Internet of things, how business are using social media in HR, how people expose their information online, privacy, the ramifications of your online life, how criminals, terrorist, governments and organizations use your online information, cyberbullying, data breaches, and Hacktivisim.

Citation preview

Page 1: Cyber Security Awareness October 2014

Cyber Security'the good,' 'the bad,' & 'the ugly'

Page 2: Cyber Security Awareness October 2014

Agenda

• Cyber Security• Social Media• Privacy• Cyberbullying• ID Theft• Cyber Spies• Cyber Crime• Questions

October is Cyber Security

Awareness Month

Page 3: Cyber Security Awareness October 2014

Your Digital LifePersonal Cyber Security

Social Media

Page 4: Cyber Security Awareness October 2014

Growth of Tech and Social Media

Page 5: Cyber Security Awareness October 2014

Blurring the lines

Social Media

Private Life

Work

Family

School

Page 6: Cyber Security Awareness October 2014
Page 7: Cyber Security Awareness October 2014

Internet of EverythingSmart MetersToll road/bridgeTraffic managementParking MetersAutomobilesHome AutomationHealth MonitoringShoppingAppliancesCattle (tracking/monitoring)

By 2020 there will be more things on the internet than people, est. 50 billion things

Page 8: Cyber Security Awareness October 2014

Data Rate Increasing

• Amount of data created, captured, and replicated in 2007 was 281 exabytes (281,000,000,000 GB)• In 2011 there will be nearly 1,800 exabytes of

information created• In 2012 we created more data than in the last 5000

years

Page 9: Cyber Security Awareness October 2014

Social Media, the Good

Psychology Today 10 OCT 2014

Page 10: Cyber Security Awareness October 2014

Social media is just a new way of connecting that is much more efficient

Page 11: Cyber Security Awareness October 2014

Online Profile & Rep

• Your "online profile" is the sum of online content about you that you've created and content about you created by others. Items include: emails, videos, posts on social networks, someone posting a picture or comments about you on a social network or website, credit, financial, and medical information.• Your "online reputation" is the image created of you

through information you or others shared online in blogs, posts, pictures, tweets, and videos.

Page 12: Cyber Security Awareness October 2014

Social Media & HR• The use of social media outside of personal lives has

increased and continues to increase• Concern that potential employers will misconstrue what is

seen• Used for monitoring current employees• Used for screening job applicants• Employees see it as a good way to “get to know” the applicant

Page 13: Cyber Security Awareness October 2014

Picture from Department of Homeland Security

Page 14: Cyber Security Awareness October 2014

Personal Ramifications

• Employers are increasingly using social media for background checks.

• Insurance companies use social media to look for fraud.

• Spies use social media to look for informants.

Page 15: Cyber Security Awareness October 2014

Online Privacy and Reputation• Do you have control of what is

posted?• Not all fame is good!• People use anonymity to post

stuff about others!• Embarrassment, loss of

credibility

Rev2/28/2011

Page 16: Cyber Security Awareness October 2014

Online Privacy• Would you invite a

stranger into your house to look at your children's photo album?• Public v. Private• Aggregate

information sources could give someone more information than intended.

Page 17: Cyber Security Awareness October 2014

But what about what others share about you online?

Page 18: Cyber Security Awareness October 2014

Giving up Privacy for $s or for free

Page 19: Cyber Security Awareness October 2014

Bad guys use social media too

Bad guys can exploit your use of social

media to infect your computer with malware

Page 20: Cyber Security Awareness October 2014

Information about you online• Do I have control of what is

posted about me?

• Look yourself up!

• Even if you are not on the web, you may be on the web!

• Do what you can to control what is out there.

• What is your social relevancy (Reputation)?

• Setup alerts and monitor what is posted about you.

• Public records on the web…

Page 21: Cyber Security Awareness October 2014

Get Alerts

Page 22: Cyber Security Awareness October 2014

Social Shopping & Brand Protection

If you own a business or are self-employed:• Have you looked to see

what is posted about you?• Do you monitor for

comments or ratings?• How do you address

complaints? • Do you monitor for brand-

jacking? http://knowem.com/

Page 23: Cyber Security Awareness October 2014

Are people using your intellectual property?

Page 24: Cyber Security Awareness October 2014

Watch what you put online

http://www.youtube.com/watch?v=Soq3jzttwiA

Page 25: Cyber Security Awareness October 2014

Can someone use what you post against you?

Page 26: Cyber Security Awareness October 2014

Social Media & Politics; A Game Changer

Page 27: Cyber Security Awareness October 2014

Terrorists also use Social Media

Page 28: Cyber Security Awareness October 2014

It never goes away

Page 29: Cyber Security Awareness October 2014

Information on the Internet never diesInformation, once on the Internet, can be there for years, even if the service claims it is goneDon’t post anything you wouldn’t want seen by everyone

Page 30: Cyber Security Awareness October 2014

Can happen to anyone

Page 31: Cyber Security Awareness October 2014

Oh no!

Page 32: Cyber Security Awareness October 2014

Cyber Spying

Page 33: Cyber Security Awareness October 2014
Page 34: Cyber Security Awareness October 2014

Governments

Page 35: Cyber Security Awareness October 2014

Privacy is dead?

Page 36: Cyber Security Awareness October 2014

Cyberbullying & Internet Trolls

Page 37: Cyber Security Awareness October 2014

Real life consequences

Page 38: Cyber Security Awareness October 2014

Cyberbullying

• "Cyberbullying" happens when a child, preteen, or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen, or teen using the Internet, interactive and digital technologies, or mobile phones• Examples of cyberbullying include, mean text messages

or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.• http://www.stopbullying.gov

Page 39: Cyber Security Awareness October 2014

Prevention

Page 40: Cyber Security Awareness October 2014

Results

• In extreme cases, some children have committed suicide• Distracts from

academics• Increases risk of

depression• Hurts self-esteem

Megan MeierRyan HalliganHope Witsell

Tyler ClementiTy Smalley Jesse Logan

Page 41: Cyber Security Awareness October 2014

A new area of psychology

Virtually You: The Dangerous Powers of the E-Personality Elias Aboujaoude

Page 42: Cyber Security Awareness October 2014

Online Drama

Page 43: Cyber Security Awareness October 2014

Getting into trouble

Page 44: Cyber Security Awareness October 2014

Hacktivisim

Page 45: Cyber Security Awareness October 2014

Identity Fraud & Theft

Page 46: Cyber Security Awareness October 2014

Situation

• Why does someone want your personal information?• In an information age,

information becomes a commodity• Information has a value• Some information has a

greater value• Your personal information is

potentially worth more than you think

Page 47: Cyber Security Awareness October 2014

What is PII

• Personally Identifiable Information• Name and account number• Name and social security number• Name and address• Credit Card Number

• Where you might find it• Tax files• Account Statements• Records (Medical, Public and other)• Businesses you do business with

Page 48: Cyber Security Awareness October 2014

Who keeps your personal data?

Social Media Sites – User generated, friends and family, enemies

Corporations – Big data, Tracking, Sales, Marketing

Government – Local, State, Federal and other

Organizations – Non-profits, Clubs, VSOsSchools – Grades, Clubs, School

NewspaperMedia – Newspapers, News, Video

Page 49: Cyber Security Awareness October 2014
Page 50: Cyber Security Awareness October 2014

Data from unexpected sources

Page 51: Cyber Security Awareness October 2014

ID Theft vs. ID Fraud

• “Identity fraud," consists mainly of someone making unauthorized charges to your credit card. • “Identity theft,” is when someone gathers your personal

information and assumes your identity as their own.

"Identify theft is one of the fastest growing crimes in the US."John Ashcroft79th US Attorney General

Page 52: Cyber Security Awareness October 2014

The Busboy That Started It All

• March 20th 2001, MSNBC reported the first identity theft case to gain widespread public attention• Thief assumed the identities of Oprah Winfrey and

Martha Stewart, took out new credit cards in their names, and accessed their bank accounts• Stole more than $7 million from 200 of the world’s

super rich - Warren Buffet and George Soros, tech tycoons Paul Allen and Larry Ellison• Used a library computer, public records, a cell

phone, a fax machine, a PO Box, and a copy of Forbes Richest People• 32-year-old Abraham Abdallah was described as “a

high school dropout, a New York City busboy, a pudgy, disheveled, career petty criminal.”

Page 53: Cyber Security Awareness October 2014

ID Theft & Fraud

• PII exposed by others (Data Breaches)• PII exposed by ourselves (online & others)• Malware (Spyware, Viruses, etc…)• Social Engineering

• Phone• Internet (Phishing, social websites etc…) • In Person (at your door, in a restaurant etc…)

• Physical theft• Mail box• Trash (Dumpster diving)• ATMs (skimming)• Home break-ins

Page 54: Cyber Security Awareness October 2014

Close to Home

Page 55: Cyber Security Awareness October 2014

Physical theft

• Dumpster diving• ATM – Credit Card skimming• Mailbox• Home Break-in

Page 56: Cyber Security Awareness October 2014

Close to Home

Page 57: Cyber Security Awareness October 2014

“Lock Bumping”

http://cbs11tv.com/seenon/Bump.Key.Safety.2.499252.html

Page 58: Cyber Security Awareness October 2014

Credit Card/ATM Skimming

Page 59: Cyber Security Awareness October 2014

Credit Card Skimming Stats

TOP MERCHANT GROUPS

RESTAURANTSGASHOTELSCAR RENTALSALL OTHER

SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE

Page 60: Cyber Security Awareness October 2014

Credit Card Skimming Stats

BY MERCHANT LOCATIONS

CALIFORNIAFLORIDANEW YORKNEW JERSEYTEXASMEXICOILLINOISALL OTHER

SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE

Page 61: Cyber Security Awareness October 2014

Public Records

“The federal government is the biggest offender.”Paul StephensPrivacy Rights Clearinghouse

Page 62: Cyber Security Awareness October 2014

What do they do with stolen IDs?

• Information is sold on the Black Market

• Sometimes the information is traded for drugs

• Used to fund terrorist operations

Page 63: Cyber Security Awareness October 2014

In the news…

Page 64: Cyber Security Awareness October 2014

Computer and Mobile Security

Page 65: Cyber Security Awareness October 2014

P2P (Peer to Peer file sharing)

• Used to ‘share’ computer files• Legal issues with

copyright• Malware issues• Privacy issues, do you

know what you are sharing?

Page 66: Cyber Security Awareness October 2014

Malware

• Malware (Viruses, Worms, Spyware, etc…)• 1999 Melissa, Kevin Mitnick, • 2000 Mafiaboy, DoS Assault, • 2001 Code Red, Nimda, • 2002 Root Rot, Slapper, • 2003 SQL Slammer, • 2004 MyDoom, BerBew, • 2005 Samy (MySpace), • 2007 Storm Worm, Botnets, etc..• 2102 Advanced Persistent Threat

APT

Malware has cost trillions of dollars in the last

decade

Page 67: Cyber Security Awareness October 2014

Viruses

• In the past, they were primarily destructive• Today, they focus on stealing information• Or using your computer as a Bot (Zombie) to send out

SPAM or attack other systems

Page 68: Cyber Security Awareness October 2014

Malware is not gone

Page 69: Cyber Security Awareness October 2014

Phishing: Internet Fraud

• Oldest trick in the book, there are examples in the 1500s• One particular fraud is called

the “Nigerian 419” scam or “Advanced Fee Fraud”• Started as a letter, then it

showed up in faxes and now it is sent by email.• The message contains many

variations on the story

Rev2/28/2011

http://www.secretservice.gov/fraud_email_advisory.shtml

Page 70: Cyber Security Awareness October 2014

Computer Spyware

Page 71: Cyber Security Awareness October 2014

Cell Phone Spyware

http://www.youtube.com/watch?v=uCyKcoDaofghttp://news.rutgers.edu/medrel/news-releases/2010/02/rutgers-researchers-20100222http://www.youtube.com/watch?v=UZgf32wVTd4

Page 72: Cyber Security Awareness October 2014

Data Breaches

Page 73: Cyber Security Awareness October 2014
Page 75: Cyber Security Awareness October 2014
Page 76: Cyber Security Awareness October 2014
Page 77: Cyber Security Awareness October 2014

Desensitization of data breaches

Page 78: Cyber Security Awareness October 2014

The Problem

Albert Gonzalez, 28

With accomplices, he was involved in of most of the major data breaches: Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW, and others.

Page 79: Cyber Security Awareness October 2014
Page 80: Cyber Security Awareness October 2014

Who is behind data breaches?

• 70% from external agents• 48% caused by insiders• 11% implicated business

partners• 27% involved multiple parties

Page 81: Cyber Security Awareness October 2014

How others might expose your PII

• Data Breach• Lack of security on the part of

businesses• Organizations may post

information online• Loss of a laptop, hard drive, or

paper work• Data loss by a third party• Hacker (Organized Crime & Nation

State)• Organizations may break into your

computer

Page 82: Cyber Security Awareness October 2014

Top 10 Largest Breaches

Data provided by DataLoss db as of February 2014

Page 83: Cyber Security Awareness October 2014

Careers in IT and Cyber Security Application Development Network Engineer Analyst Teaching

Auditor/Assessor Systems Administration Program Management Law enforcement

Page 84: Cyber Security Awareness October 2014

Linkstwitter.com/sobca

facebook.com/LearnSecwww.learnsecurity.org

linkedin.com/in/donaldehesteryoutube.com/user/LearnSecurity

Slideswww.slideshare.net/sobca