55
Social Media, Identity Theft, Data Breaches , Espionage & Cyber Security

Your Digital Life - Cyber Security

Embed Size (px)

Citation preview

Page 1: Your Digital Life - Cyber Security

Social Media, Identity Theft, Data Breaches , Espionage & Cyber Security

Page 2: Your Digital Life - Cyber Security
Page 3: Your Digital Life - Cyber Security
Page 4: Your Digital Life - Cyber Security

Social Media

Private

Life

Work

Family

School

Page 5: Your Digital Life - Cyber Security
Page 6: Your Digital Life - Cyber Security
Page 7: Your Digital Life - Cyber Security
Page 8: Your Digital Life - Cyber Security
Page 9: Your Digital Life - Cyber Security
Page 10: Your Digital Life - Cyber Security

If you own a business or are self-

employed:

• Have you looked to see what is

posted about you?

• Do you monitor for comments

or ratings?

• How do you address

complaints?

• Do you monitor for brand-

jacking? http://knowem.com/

Page 11: Your Digital Life - Cyber Security
Page 12: Your Digital Life - Cyber Security

• Employers are increasingly using social

media for background checks.

• Insurance companies use social media

to look for fraud.

• Spies use social media to look for

informants.

Page 13: Your Digital Life - Cyber Security
Page 14: Your Digital Life - Cyber Security
Page 15: Your Digital Life - Cyber Security
Page 16: Your Digital Life - Cyber Security

Bad guys can exploit your use of social media to infect your computer with malware

Page 17: Your Digital Life - Cyber Security
Page 18: Your Digital Life - Cyber Security

http://www.youtube.com/watch?v=Soq3jzttwiA

Page 19: Your Digital Life - Cyber Security
Page 20: Your Digital Life - Cyber Security
Page 21: Your Digital Life - Cyber Security
Page 22: Your Digital Life - Cyber Security
Page 23: Your Digital Life - Cyber Security
Page 24: Your Digital Life - Cyber Security
Page 25: Your Digital Life - Cyber Security
Page 26: Your Digital Life - Cyber Security
Page 27: Your Digital Life - Cyber Security

"Identify theft is one of the fastest growing

crimes in the US."

John Ashcroft79th US Attorney General

Page 28: Your Digital Life - Cyber Security
Page 29: Your Digital Life - Cyber Security
Page 30: Your Digital Life - Cyber Security
Page 31: Your Digital Life - Cyber Security
Page 32: Your Digital Life - Cyber Security

http://cbs11tv.com/seenon/Bump.Key.Safety.2.499252.html

Page 33: Your Digital Life - Cyber Security
Page 34: Your Digital Life - Cyber Security

TOP MERCHANT GROUPS

RESTAURANTS

GAS

HOTELS

CAR RENTALS

ALL OTHER

SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE

Page 35: Your Digital Life - Cyber Security

BY MERCHANT LOCATIONS

CALIFORNIA

FLORIDA

NEW YORK

NEW JERSEY

TEXAS

MEXICO

ILLINOIS

ALL OTHER

SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE

Page 36: Your Digital Life - Cyber Security

“The federal government is the biggest

offender.”

Paul StephensPrivacy Rights Clearinghouse

Page 37: Your Digital Life - Cyber Security

• Information is sold on the Black Market

• Sometimes the information is traded for drugs

• Used to fund terrorist operations

Page 38: Your Digital Life - Cyber Security
Page 39: Your Digital Life - Cyber Security
Page 40: Your Digital Life - Cyber Security

Malware has cost trillions of

dollars in the last decade

Page 41: Your Digital Life - Cyber Security
Page 42: Your Digital Life - Cyber Security

http://www.secretservice.gov/fraud_email_advisory.shtml

Page 43: Your Digital Life - Cyber Security
Page 45: Your Digital Life - Cyber Security
Page 47: Your Digital Life - Cyber Security
Page 48: Your Digital Life - Cyber Security
Page 49: Your Digital Life - Cyber Security

Albert Gonzalez, 28

With accomplices, he was involved in data breaches of most of the major data breaches:

Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes &

Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW and others.

Page 50: Your Digital Life - Cyber Security
Page 51: Your Digital Life - Cyber Security
Page 52: Your Digital Life - Cyber Security
Page 53: Your Digital Life - Cyber Security

Data provided by DataLoss db as of

February 2014

Page 54: Your Digital Life - Cyber Security
Page 55: Your Digital Life - Cyber Security