SlideShare una empresa de Scribd logo
1 de 19
Cyber Security Seminar
“It Will Never Happen to
Me”
What is Cyber Crime
Webopedia Definition
• Cyber crime encompasses any criminal act dealing with computers and
networks(called hacking)
• Additionally, cyber crime also includes traditional crimes conducted
through the internet
• For example; hate crimes, telemarketing and Internet fraud, identity
theft,
• Credit card account thefts are considered to be cyber crimes when the
illegal activities are committed through the use of a computer and the
Internet.
Cyber Crime Statistics
*Crime rate in England and Wales soars as cybercrime is included
for first time
• The sharp rise in the headline figures is due to the inclusion of an
estimated 5.1m online fraud incidents and 2.5m cybercrime offences for
the first time
• The detailed figures for online fraud show 14% of victims lost less than
£20, 27% lost less than £100 and a further 37% lost less than £500. One
per cent lost more than £5,000.
• The virus or malware, known as Dridex netted criminals £20m in funds
from UK Banks in 1 heist
• Report also stated is was reported to have netted over $100m worldwide
What is Ransomware
• Ransomware is a strain of malware (malicious software) that encrypts or
locks all of the files on your computer or server, and then demands a
payment (or ransom) to unlock your files.
• It takes many forms, including its most infamous incarnation,
Cryptolocker.
• Other strains include Locky, Teslacrypt, and Cryptowall.
• In some instances, ransomware’s presence can be betrayed by a .EXE
file extension - but cyber criminals are getting more and more
sophisticated, so this often isn’t the case.
How Does Ransomware Spread ?
• Like many viruses, the most common source of infection is from emails,
when a user opens contaminated attachments or clicks a malicious link.
However, there are many other sources, like rogue USB sticks, or even
joining free WiFi networks.
How can I Remove it ?
• Unfortunately, there’s no sure-fire way to remove Ransomware.
• Even paying up doesn’t always work; criminals have been known to ask
for higher and higher sums, or claim to have lost the ‘key’.
• The best approach is to access your backups.
What can I do to avoid Ransomware?
• There are three major forms of protection:
• Preventative measures,
• Anti-virus & backup.
• Preventative measures are the first lines of defence against Ransomware:
education can ensure that staff are aware of the risks and know what to
look out for, and changing system permissions can lower the risk of
infection.
• Anti-virus is a must for all businesses, and can detect and deflect a high
percentage of attacks.
What can I do to avoid Ransomware? Cont’d
• However, due to the ever-changing nature of Ransomware, these steps
aren’t 100% effective. That’s when you need a backup and business
continuity solution. This allows you to roll back to a point prior to infection.
Who would want to hack us ?
• What have we got that can't be found elsewhere more easily
• Credit/Debit Card Details
• Online Account Details such as Pay Pal
• Scanning of passports or credit cards
Who would want to hack us ?
• There are basic kinds of phishing
• Blanket
• Spear Phishing
• Whaling
Types of attacks?
Example of Social Engineering
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
• They will ring you up to inform you , “you have an issue with Internet Traffic from
your connection “ you may have spyware
• Call reference you Credit Card being used
• Scammers who pretend to be tech support from Microsoft
Tech Support Scammers
• Crypto Locker , CryptoDefense and CryptoWall
• 5 Stages of Crypto Ransomware
1. Installation
2. Contacting Headquarters
3. Hand Shake and Keys
4. Encryption
5. Extortion
Most Commonly known attack !
• You don’t get calls from your Bank about the Balance in your account
• You don’t get phone calls from Microsoft Technical Support or other support
agents
• You don’t get emails from HMRC “ You are owed credit and to contact them”
• You probably don’t have a long lost Relative in the Congo who has Millions that
they need you to hold for them just short term
• Passwords should be changed regularly and not use common ones
How Do we Protect Ourselves
Educating our users on the Do’s and Don'ts is a Major factor in
reducing he impact to your Business

Más contenido relacionado

La actualidad más candente

Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryptionsmithj12
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primerfwscholl
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeRocket Matter, LLC
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 

La actualidad más candente (20)

Viruses, Biometrics And Encryption
Viruses, Biometrics And EncryptionViruses, Biometrics And Encryption
Viruses, Biometrics And Encryption
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Digital security
Digital securityDigital security
Digital security
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
Cyber security
Cyber security Cyber security
Cyber security
 

Destacado

Output devices
Output devicesOutput devices
Output devices1anmol1
 
Seguridad en laboratorios
Seguridad en laboratoriosSeguridad en laboratorios
Seguridad en laboratoriosjose jimenez
 
Julian le grand #pp40 slides
Julian le grand #pp40 slidesJulian le grand #pp40 slides
Julian le grand #pp40 slidesPP40
 
Elena Busso - Professional Thesis - A Comparative study of three European Lif...
Elena Busso - Professional Thesis - A Comparative study of three European Lif...Elena Busso - Professional Thesis - A Comparative study of three European Lif...
Elena Busso - Professional Thesis - A Comparative study of three European Lif...Elena Busso
 
Design rules and usability requirements
Design rules and usability requirementsDesign rules and usability requirements
Design rules and usability requirementsAndres Baravalle
 

Destacado (11)

Output devices
Output devicesOutput devices
Output devices
 
D.comercial i
D.comercial i D.comercial i
D.comercial i
 
Seguridad en laboratorios
Seguridad en laboratoriosSeguridad en laboratorios
Seguridad en laboratorios
 
Julian le grand #pp40 slides
Julian le grand #pp40 slidesJulian le grand #pp40 slides
Julian le grand #pp40 slides
 
Rudraksh Group Team
Rudraksh Group TeamRudraksh Group Team
Rudraksh Group Team
 
Fut16 coin
Fut16 coinFut16 coin
Fut16 coin
 
Digital Marketing Masterclass
Digital Marketing MasterclassDigital Marketing Masterclass
Digital Marketing Masterclass
 
Elena Busso - Professional Thesis - A Comparative study of three European Lif...
Elena Busso - Professional Thesis - A Comparative study of three European Lif...Elena Busso - Professional Thesis - A Comparative study of three European Lif...
Elena Busso - Professional Thesis - A Comparative study of three European Lif...
 
CAPE Green Engineering
CAPE Green Engineering CAPE Green Engineering
CAPE Green Engineering
 
Design rules and usability requirements
Design rules and usability requirementsDesign rules and usability requirements
Design rules and usability requirements
 
The CXC Examiner - Celebrating 30 years of CSEC
The CXC Examiner -  Celebrating 30 years of CSECThe CXC Examiner -  Celebrating 30 years of CSEC
The CXC Examiner - Celebrating 30 years of CSEC
 

Similar a Cyber Security Presentation - IT Will Never Happen To Me

TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 

Similar a Cyber Security Presentation - IT Will Never Happen To Me (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Cyber Security Presentation - IT Will Never Happen To Me

  • 1. Cyber Security Seminar “It Will Never Happen to Me”
  • 2. What is Cyber Crime Webopedia Definition • Cyber crime encompasses any criminal act dealing with computers and networks(called hacking) • Additionally, cyber crime also includes traditional crimes conducted through the internet • For example; hate crimes, telemarketing and Internet fraud, identity theft, • Credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 3. Cyber Crime Statistics *Crime rate in England and Wales soars as cybercrime is included for first time • The sharp rise in the headline figures is due to the inclusion of an estimated 5.1m online fraud incidents and 2.5m cybercrime offences for the first time • The detailed figures for online fraud show 14% of victims lost less than £20, 27% lost less than £100 and a further 37% lost less than £500. One per cent lost more than £5,000. • The virus or malware, known as Dridex netted criminals £20m in funds from UK Banks in 1 heist • Report also stated is was reported to have netted over $100m worldwide
  • 4. What is Ransomware • Ransomware is a strain of malware (malicious software) that encrypts or locks all of the files on your computer or server, and then demands a payment (or ransom) to unlock your files. • It takes many forms, including its most infamous incarnation, Cryptolocker. • Other strains include Locky, Teslacrypt, and Cryptowall. • In some instances, ransomware’s presence can be betrayed by a .EXE file extension - but cyber criminals are getting more and more sophisticated, so this often isn’t the case.
  • 5. How Does Ransomware Spread ? • Like many viruses, the most common source of infection is from emails, when a user opens contaminated attachments or clicks a malicious link. However, there are many other sources, like rogue USB sticks, or even joining free WiFi networks. How can I Remove it ? • Unfortunately, there’s no sure-fire way to remove Ransomware. • Even paying up doesn’t always work; criminals have been known to ask for higher and higher sums, or claim to have lost the ‘key’. • The best approach is to access your backups.
  • 6. What can I do to avoid Ransomware? • There are three major forms of protection: • Preventative measures, • Anti-virus & backup. • Preventative measures are the first lines of defence against Ransomware: education can ensure that staff are aware of the risks and know what to look out for, and changing system permissions can lower the risk of infection. • Anti-virus is a must for all businesses, and can detect and deflect a high percentage of attacks.
  • 7. What can I do to avoid Ransomware? Cont’d • However, due to the ever-changing nature of Ransomware, these steps aren’t 100% effective. That’s when you need a backup and business continuity solution. This allows you to roll back to a point prior to infection.
  • 8. Who would want to hack us ?
  • 9. • What have we got that can't be found elsewhere more easily • Credit/Debit Card Details • Online Account Details such as Pay Pal • Scanning of passports or credit cards Who would want to hack us ?
  • 10. • There are basic kinds of phishing • Blanket • Spear Phishing • Whaling Types of attacks?
  • 11. Example of Social Engineering
  • 17. • They will ring you up to inform you , “you have an issue with Internet Traffic from your connection “ you may have spyware • Call reference you Credit Card being used • Scammers who pretend to be tech support from Microsoft Tech Support Scammers
  • 18. • Crypto Locker , CryptoDefense and CryptoWall • 5 Stages of Crypto Ransomware 1. Installation 2. Contacting Headquarters 3. Hand Shake and Keys 4. Encryption 5. Extortion Most Commonly known attack !
  • 19. • You don’t get calls from your Bank about the Balance in your account • You don’t get phone calls from Microsoft Technical Support or other support agents • You don’t get emails from HMRC “ You are owed credit and to contact them” • You probably don’t have a long lost Relative in the Congo who has Millions that they need you to hold for them just short term • Passwords should be changed regularly and not use common ones How Do we Protect Ourselves Educating our users on the Do’s and Don'ts is a Major factor in reducing he impact to your Business