Разделы презентаций


8. CYBERSECURITY

Содержание

Copyright NoticeThis presentation is presented as is. This presentation was assembled using information from various websites or sources across the web.This presentation uses Creative Commons Attribution 4.0 International (CC BY 4.0).

Слайды и текст этой презентации

Слайд 18. CYBERSECURITY
D. Serikbayev East Kazakhstan State Technical University
ICT Spring 2018

8. CYBERSECURITYD. Serikbayev East Kazakhstan State Technical UniversityICT Spring 2018

Слайд 2Copyright Notice
This presentation is presented as is. This presentation was

assembled using information from various websites or sources across the

web.
This presentation uses Creative Commons Attribution 4.0 International (CC BY 4.0). © 2019 BilimEdtech

Copyright NoticeThis presentation is presented as is. This presentation was assembled using information from various websites or

Слайд 38.1: Cybercrime
8.2: Cybersecurity
8.3: Common Threats
8.1: Cybercrime

8.1: Cybercrime8.2: Cybersecurity8.3: Common Threats8.1: Cybercrime

Слайд 4Learning Objectives
Know the definitions of cybercrime and cybersecurity
Describe cybercriminals
List four

categories of computer crimes
Explain why you should care about cybercriminal
Describe

the difference between Computer as a Tool and Computer as a Target
Learning ObjectivesKnow the definitions of cybercrime and cybersecurityDescribe cybercriminalsList four categories of computer crimesExplain why you should

Слайд 5Terminology
Cyber: Relating to the culture of computers, information technology, and

virtual reality
Cyberspace: The online world of computer networks

TerminologyCyber: Relating to the culture of computers, information technology, and virtual realityCyberspace: The online world of computer

Слайд 6Terminology (2)
Cybercrime: Criminal activities carried out using computers or the

internet

Terminology (2)Cybercrime: Criminal activities carried out using computers or the internet

Слайд 7Terminology (3)
Cybersecurity, computer security, or IT security: Measures taken to

protect a computer against unauthorized access or attack

Terminology (3)Cybersecurity, computer security, or IT security:  Measures taken to protect a computer against unauthorized access

Слайд 8Do I need to worry about cybersecurity?
Hackers are getting more

sophisticated… and more effective!
Hackers run successful international enterprises
Hackers hack for

a living
That what they do, and they’re very good at it!
Do I need to worry about cybersecurity?Hackers are getting more sophisticated… and more effective!Hackers run successful

Слайд 9Cybercrime is not New
Computers have been hacked since their inception
The

first spam email took place in 1978 when it was

sent out over ARPANET
The first virus was installed on an Apple computer by a high school student 1981
Cybercrime is not NewComputers have been hacked since their inceptionThe first spam email took place in 1978

Слайд 10Cybercriminals – No Rules!
Steady increase in cybercrime
Many nations refuse to

investigate and prosecute
Hackers and governments can access your unprotected

data
Ransomware is increasing – because it works!
Cybercriminals – No Rules!Steady increase in cybercrimeMany nations refuse to investigate and prosecute Hackers and governments can

Слайд 11What do cybercriminals do?
Apply all sorts of techniques to steal

personal or financial data
Work silently in the background
They are stealthy
Use

stolen data for their gain
What do cybercriminals do?Apply all sorts of techniques to  steal personal or financial dataWork silently in

Слайд 12Who are the cybercriminals?
Crackers and Hackers
Computer-savvy programmer who create attack

software
Script Kiddies
Unsophisticated computer users who know how to execute programs

created by the crackers
Criminals
Create & sell bots to generate spam
Sell credit card numbers, etc…
Who are the cybercriminals?Crackers and HackersComputer-savvy programmer who create attack softwareScript KiddiesUnsophisticated computer users who know how

Слайд 13Cybercriminals
Cracker / Hacker:
Computer-savvy
programmer creates
attack software
Script Kiddies:
Unsophisticated computer users who

know how to
execute programs
Hacker Bulletin Board
SQL Injection
Buffer overflow
Password Crackers
Password Dictionaries


Successful

attacks!
Crazyman broke into …
CoolCat penetrated…

Criminals:
Create & sell bots to generate spam;
Sell credit card numbers, etc…

Posts to

Downloads

Posts to

Reports

CybercriminalsCracker / Hacker:Computer-savvy programmer createsattack softwareScript Kiddies:Unsophisticated computer users who know how toexecute programsHacker Bulletin BoardSQL InjectionBuffer

Слайд 14What do cybercriminals want?
Make their living through cybercrimes
Money
Information
Notoriety
Status, fame

What do cybercriminals want?Make their living through cybercrimesMoneyInformationNotoriety	Status, fame

Слайд 15Categories of Computer Crimes
Computer as a Tool
Computer as the Target
Selling

Illicit Goods
Offensive content or Harassment

Categories of Computer CrimesComputer as a ToolComputer as the TargetSelling Illicit GoodsOffensive content or  Harassment

Слайд 16Computer as a Tool
Using a computer to target an individual
Spam,

phishing scams, cyber theft, fraud (deception), identity theft, etc.
These cyberthieves

are scammers, not technical experts
Computer as a ToolUsing a computer to target an individualSpam, phishing scams, cyber theft, fraud (deception), identity

Слайд 17Computer as a Target
Targeting a computer or system to commit

a crime
Viruses or malware
Destruction or theft of information
Unauthorized access of

a computer or account
A select group of people with technical knowledge commit these crimes
Computer as a TargetTargeting a computer or system to commit a crimeViruses or malwareDestruction or theft of

Слайд 18Selling Illicit Goods
Using a computer to sell illicit goods
Drugs trafficking
Counterfeit

products
Stolen items
Weapons
Organized crime groups commit these crimes

Selling Illicit GoodsUsing a computer to sell illicit goodsDrugs traffickingCounterfeit productsStolen itemsWeaponsOrganized crime groups commit these crimes

Слайд 19Offensive Content or harassment
The content of online information may be

distasteful, obscene or offensive for a variety of reasons
Hate speech
Against

a group based race, religion, ethnic origin, disability, etc.
Harassing someone through cyberspace
Stalking, threats of violence, cyberbullying
Offensive Content or harassmentThe content of online information may be distasteful, obscene or offensive for a variety

Слайд 20Common Types of Cybercrime
Phishing: Using fake email messages to get

personal information from internet users
Identity theft (misusing personal information)
Illegal pornography
Hacking:

Shutting down or misusing websites or computer networks
Spreading hate and inciting terrorism;
Grooming: making sexual advances to minors.
Common Types of CybercrimePhishing: Using fake email messages to get personal information from internet usersIdentity theft (misusing

Слайд 21Cybercrime Legislation Worldwide
A worldwide fight against cybercrimes
138 countries have created laws

to fight cybercriminals
However, 20% of countries do not have any

legislation
Cybercrime Legislation WorldwideA worldwide fight against cybercrimes138 countries have created laws to fight cybercriminalsHowever, 20% of countries do

Слайд 22Cybercrime Summary
Cybercrime is any criminal activity carried out using computers

or the internet
Cybersecurity is taking measures to protect a computer

from unauthorized access
Cybercriminals exploit others for their personal gain
Cybercrime categories: Computer as a tool, as the target, selling illicit goods, offensive content and harassment
Computer as a tool: When an individual is a primary target
Computer as a target: When a computer is a target
Cybercrime SummaryCybercrime is any criminal activity carried out using computers or the internetCybersecurity is taking measures to

Слайд 238.1: Cybercrime
8.2: Cybersecurity
8.3: Common Threats
8.2: Cybersecurity

8.1: Cybercrime8.2: Cybersecurity8.3: Common Threats8.2: Cybersecurity

Слайд 24Learning Objectives
Define the goal of cybersecurity
Describe easy targets
Explain general guidelines

of protection against cyber threats
Describe why pirated software is not

safe
State why software updates are important
Describe the difference between a password and a passphrase
Learning ObjectivesDefine the goal of cybersecurityDescribe easy targetsExplain general guidelines of protection against cyber threatsDescribe why pirated

Слайд 25Cybersecurity Goal
Your goal is to make it as difficult as

possible to dissuade a hacker from getting your data or

from being a victim of cybercrime
Cybercriminals go after easy targets unless the victim has something of great value
Cybersecurity GoalYour goal is to make it as difficult as possible to dissuade a hacker from getting

Слайд 26Good Line of Defense
Can you prevent from being a victim

of cybercrime?
If a professional hacker or government surveillance wants your

information, they will get it.
Make them work them for it! In doing so, they might give up and move on to an easier target
Minimizes the chances of being a victim
Good Line of DefenseCan you prevent from being a victim of cybercrime?If a professional hacker or government

Слайд 27Password Cracking Example
Hackers use “Brute-Force” Password Crackers
One group cracked 2700

“bad” passwords in 30 seconds
The crack program ran for 48

hours more and did not crack the 250 remaining “good” passwords
Do the hackers keep trying to get the remaining 250 passwords? Or do they find easier targets?
Your goal: Be one of the 250
Password Cracking ExampleHackers use “Brute-Force” Password CrackersOne group cracked 2700 “bad” passwords in 30 secondsThe crack program

Слайд 28Are you a target?
Most victims are not specifically targeted
They are

bystanders or part of a larger cybercrime operation
A lot of

information is out of your control
Logins from a website you use is hacked and your password was leaked
Control what you can control
Are you a target?Most victims are not specifically targetedThey are bystanders or part of a larger cybercrime

Слайд 29Who are the easy targets?
Easy Targets
Use weak passwords
Reuse passwords
Respond to

spam
Click links in emails
Visit shady internet sites
Run pirated software
Difficult Targets
Security

conscious
Understand the dangers and risks
Use encryption
Use Two-Factor Authentication (2FA)
Who are the easy targets?Easy TargetsUse weak passwordsReuse passwordsRespond to spamClick links in emailsVisit shady internet sitesRun

Слайд 30Why do Breaches Happen?

Why do Breaches Happen?

Слайд 31General Protection Guidelines
Use official software (not pirated)
Do not visit shady

websites
Update software regularly
Use a reputable antivirus program
Use strong passwords
Do not

reuse passwords
General Protection GuidelinesUse official software (not pirated)Do not visit shady websitesUpdate software regularlyUse a reputable antivirus programUse

Слайд 32Pirated Software
Pirated software is software that has been copied or distributed

for free against the wishes of the creator
Popular choices
Windows 7/10
Microsoft

Office
Kaspersky Lab
Adobe products
Pirated SoftwarePirated software is software that has been copied or distributed for free against the wishes of the

Слайд 33Pirated Software (2): Created by Criminals
Crackers hack software for a

living
They do not do it for the goodwill of the

community
They are not Robin Hood
If they crack software, they do so to help their criminal enterprise
They can control the computers of those who install it
Pirated Software (2): Created by CriminalsCrackers hack software for a livingThey do not do it for the

Слайд 34Pirated Software (3): Risks
Pirated software contains backdoors
Cybercriminals use your computer

in many ways
Mine for Bitcoins or cryptocurrencies
Send spam
Launch cyber attacks
Monitor

communications for financial information
Pirated Software (3): RisksPirated software contains backdoorsCybercriminals use your computer in many waysMine for Bitcoins or cryptocurrenciesSend

Слайд 35Pirated Software (4): Assumptions
All pirated software is compromised
All cracking software

used to hack official versions contains malware

Pirated Software (4): AssumptionsAll pirated software is compromisedAll cracking software used to hack official versions contains malware

Слайд 36Pirated Software (5): Assumptions
Free download sites can be dangerous, even

for free software, such as Adobe PDF
Could contain unofficial versions

of the software with malware
Pirated Software (5): AssumptionsFree download sites can be dangerous, even for free software, such as Adobe PDFCould

Слайд 37Pirated Software (6): Food for Thought
Would you install a free

lock on your door from a mafia street vendor?
What are

the risks?
Similarly, why would you trust a hacker with your computer and data?
Pirated Software (6): Food for ThoughtWould you install a free lock on your door from a mafia

Слайд 38Pirated Software (7): Alternatives
Only download software from official sources
microsoft.com; adobe.com;

google.com; mozilla.org;
Do not use cracking software to unlock software
Use

free alternatives
GIMP - GNU Image Manipulation Program
Linux
FreeOffice
Google Drive
Pirated Software (7): AlternativesOnly download software from official sourcesmicrosoft.com; adobe.com; google.com; mozilla.org; Do not use cracking software

Слайд 39Software Updates: Are they important?
Crackers find new exploits all the

time
Write software to exploit these
Script kiddies and cybercriminals purchase the

hacker’s software to use the exploits
Running up-to-date software patches these vulnerabilities
Software Updates: Are they important?Crackers find new exploits all the timeWrite software to exploit theseScript kiddies and

Слайд 40Passwords
Bad passwords easily guessed by a computer program
Qwerty; 123456; password;

superman; p@ssword
Good passwords are long and have special characters and

numbers.
They do not make sense, such as:
KN%6hGYgEqdVvAt7#W!cVk31
PasswordsBad passwords easily guessed by a computer programQwerty; 123456; password; superman; p@sswordGood passwords are long and have

Слайд 41Passwords (2): Passphrase
Use a passphrase if you need to memorize

your password
Strong passwords require a password safe
Memorize a passphrase (can

use special letters)
Positive message: I want 2 smile more :)
Random words: Yellow-green pancakes 4bfast
Some phrase: Te@ is better with milk
A memory: Remember Turkey 2017?
Passwords (2): PassphraseUse a passphrase if you need to memorize your passwordStrong passwords require a password safeMemorize

Слайд 42Final point to ponder
Someone will always have your data
You give

them permission to read the emails and your documents by

using the service
Do you trust them?
Who do you trust more not to abuse your data?
mail.ru/.kz
Gmail.com
yandex.ru/.kz
any-email-address /.com/.ru/.cn/.eu/.abc
Final point to ponderSomeone will always have your dataYou give them permission to read the emails and

Слайд 43Cybersecurity Summary
Goal: Be a difficult target
Easy targets: People with a

low awareness of cybersecurity; don’t take measures to protect themselves

online
Protection guidelines: Use official software that automatically updates, do not visit shady websites, and choose strong passwords
Pirated software: Are tools of hackers
Software updates: Fix recent exploits in software
Password: UecX6JxZJ^cJ$;
Passphrase: I like d33p blue!
Cybersecurity SummaryGoal: Be a difficult targetEasy targets: People with a low awareness of cybersecurity; don’t take measures

Слайд 448.1: Cybercrime
8.2: Cybersecurity
8.3: Common Threats

8.3: Common Threats

8.1: Cybercrime8.2: Cybersecurity8.3: Common Threats8.3: Common Threats

Слайд 45Learning Objectives
Describe the common cyber threats
Understand how malware works
List the

ways that malware infects computers
Describe how to protect against data

leaks
Explain the dangers links in unsolicited email
Describe security risks when using public WiFi
Learning ObjectivesDescribe the common cyber threatsUnderstand how malware worksList the ways that malware infects computersDescribe how to

Слайд 46Common Cyber Threats
Malware
Data Leaks
Unsolicited Email
Open WiFi Networks

Common Cyber ThreatsMalwareData LeaksUnsolicited EmailOpen WiFi Networks

Слайд 47Malware
The word "malware" comes from the term "MALicious softWARE."
Malware is any

software that infects and damages a computer system without the

owner's knowledge or permission
MalwareThe word

Слайд 48Malware (2): How Malware Operates
The malicious code attaches itself to

a program, file, or disk
When the program executes, the virus

activates and replicates itself
The virus works in background, often without knowledge of the user
Malware (2): How Malware OperatesThe malicious code attaches itself to a program, file, or diskWhen the program

Слайд 49Malware (3): Infection Methods
Untrusted websites
Clicking a link in email
Downloading a

file
Malicious JavaScript
Email attachments
Pirated software
Flash drives
Another computer on the network

Malware (3): Infection MethodsUntrusted websitesClicking a link in emailDownloading a fileMalicious JavaScriptEmail attachmentsPirated softwareFlash drivesAnother computer on

Слайд 50Malware (4): What They Do
Worms self-replicate but do not cause

harm
Viruses can cause the computer crashes, loss of data,
Trojan horses

steal data and provide a backdoor for the cybercriminal
Spyware collects data from the infected machine
Keyloggers record all of a user’s keystrokes
Fake antivirus software allows malware to remain undetected
This is true for pirated/hacked antivirus software
Malware (4): What They DoWorms self-replicate but do not cause harmViruses can cause the computer crashes, loss

Слайд 51Malware (5): Ransomware
Encrypts your entire computer
Only way to get access

to your files is to pay the cybercriminal

Malware (5): RansomwareEncrypts your entire computerOnly way to get access to your files is to pay the

Слайд 52Malware (6): Infected Computers
Antivirus software can clean some malware, but

not all
Might require the user to reinstall the operating system
User’s

data may or may not be salvaged
Malware (6): Infected ComputersAntivirus software can clean some malware, but not allMight require the user to reinstall

Слайд 53Malware (7): Protect Against
Use a reputable antivirus program
Keep your computer

up to date
Do not visit untrusted websites
Do not click unknown

links in an email
Do not download files from unknown sources
Do not use pirated software
Most pirated software contains malware
Malware (7): Protect AgainstUse a reputable antivirus programKeep your computer up to dateDo not visit untrusted websitesDo

Слайд 54Data Leaks
Release of secure information to an untrusted environment
Cybercriminals frequently

post hacked usernames and passwords from websites
One online hacker’s database

has 1.4 billion usernames and passwords
Data LeaksRelease of secure information to an untrusted environmentCybercriminals frequently post hacked usernames and passwords from websitesOne

Слайд 55Data Leaks (2): Data from Websites

Data Leaks (2): Data from Websites

Слайд 56Data Leaks (3)
You cannot prevent data leaks
Instead, plan for

your username, password, and other sensitive data to be leaked

online
Data Leaks (3) You cannot prevent data leaksInstead, plan for your username, password, and other sensitive data

Слайд 57Data Leaks (4)
Cybercriminal plan on users using the same

username and password for multiple accounts

Data Leaks (4) Cybercriminal plan on users using the same username and password for multiple accounts

Слайд 58Data Leaks (5): How to Plan
Use a unique username

and password combination for each account
Use a password manager
LastPass
1Password
KeePass
Use two-factor

authentication
Data Leaks (5): How to Plan Use a unique username and password combination for each accountUse a

Слайд 59Data Leaks (6): Encryption
Encrypt sensitive data
Secure Folder (Samsung)
BitLocker (Windows 7/10

Pro )
VeraCrypt (Windows)
7zip encrypts compressed files (Any)
The easiest to use
You

will learn how to use 7zip in a lab
Data Leaks (6): EncryptionEncrypt sensitive dataSecure Folder (Samsung)BitLocker (Windows 7/10 Pro )VeraCrypt (Windows)7zip encrypts compressed files (Any)The

Слайд 60Unsolicited Email
Unsolicited email is a favorite way for cybercriminal to

get access to a computer or an account
Phishing: Tricking the

user to giving account information
Click Here: The link takes a user to a malicious website
Unsolicited EmailUnsolicited email is a favorite way for cybercriminal to get access to a computer or an

Слайд 61Unsolicited Email (2)
Infected attachments: A doc, pdf, or another file

that contain malicious software
Self-replicating: Once you are infected, the malware

uses your account to send the infected email to everyone in your address book
Unsolicited Email (2)Infected attachments: A doc, pdf, or another file that contain malicious softwareSelf-replicating: Once you are

Слайд 62Unsolicited Email (2): Click Here
If you click a malicious link

or fall for a phishing scam, it might be too

late…
Drive-by downloads: Malicious software can install just by visiting a website (virus, ransomware, keylogger)
Ransomware: 93% of all phishing emails are now ransomware
Unsolicited Email (2): Click HereIf you click a malicious link or fall for a phishing scam, it

Слайд 63Unsolicited Email (3): Protection
In addition to the malware protection guidelines:
Know

how to identify fake email or spam
Never click a link

in an email, not even from a friend, unless you know it is safe
Never click a password reset link. Instead, go to the website directly
Mouse over a link to verify the URL
Unsolicited Email (3): ProtectionIn addition to the malware protection guidelines:Know how to identify fake email or spamNever

Слайд 64Open WiFi Access Points
Any data transmitted through an unsecured WiFi

connection can be easily collected
Intercepting login credentials
Only use SSL/HTTPS when

logging into your sites
Understand the risks and use with care
Virus threat from infected users
Better to use mobile data through your phone
Open WiFi Access PointsAny data transmitted through an unsecured WiFi connection can be easily collectedIntercepting login credentialsOnly

Слайд 65Common Threats Summary
Common cyber threats
malware, data leaks, unsolicited email, and

public WiFi
Malware is malicious software that runs the background
From: untrusted

websites, email attachments, pirated software, infected flash drives, or infected computers on a network
Data leaks publish private data online
Harmful websites automatically install malware when visited
Public WiFi expose unencrypted data, such as passwords
Common Threats SummaryCommon cyber threatsmalware, data leaks, unsolicited email, and public WiFiMalware is malicious software that runs

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика