Intro To Cybersecurity

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Introduction to

Cybersecurity
Introduction to Cybersecurity:
Course Agenda and Objectives

Agenda

Unit 1 Cybersecurity

Unit 2 Protect your identity and data

Unit 3 Protect your apps

Unit 4 Protect your device


Unit 1:
Cybersecurity

After completing this unit, you should be able to:

• Define cybersecurity
• Understand cybercrimes and the different types that are present today
• Define phishing, spam, hacking, and identity theft
Cybersecurity
Cybersecurity is protecting yourself from someone stealing your digital information/personal data
or from someone pretending to act as you online
Key Terms
o Password – A combination of letters and numbers that is kept secret and used to gain access to a
computer, website, etc.
o Phishing – A scam email/website that tricks you into revealing personal information such as username,
password, location, etc.
o Spam – Unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking a harmful
link
o Virus –Harmful “software” that attaches to other programs to hurt or destroy a computer’s ability to
function normally
o Hacker – An unauthorized user trying to disrupt or damage a computer or network of computers

*Content was created by the IBM GBS North America Transformation Office
Impact on your future

Cybersecurity is a BIG issue, just a couple of weeks ago Instagram was hacked and over 6 million verified
account information was stolen. The hackers went on to try and sell that information for money.

90 30,000 6 Million
Passwords Websites Accounts

Average number of passwords Average number of websites Number of Instagram accounts in


someone has hacked per day recent hack

That means that you could This means you must be careful
Hackers stole over 6 million
have 90 passwords to keep about the websites you visit and
famous Instagram accounts’
track of; it’s important to make that even if you trust them, your
information and are selling their
sure all of your accounts are information could be at risk
personal information
safe

*Content was created by the IBM GBS North America Transformation Office
Imagine this…

Your friends and followers get


Someone logs into your They post and send
angry and ask about your
Instagram without YOU messages posing as you
posts or unfollow – but you
knowing
have no idea what happened!

Sound annoying or scary? You can prevent it!


*Content was created by the IBM GBS North America Transformation Office
Cybercrimes
Cybercrime is carrying out illegal activities by means of using a computer or the internet.

Currently, the cost of cybercrime is $445 Billion per year. That’s more than all the illegal drug
trade in the world

*Content was created by the IBM GBS North America Transformation Office
Types of cybercrimes

There are many different types of cybercrimes, and for this course we will be looking
at the following:

Phishing Spam Hacking Identity theft


Phishing
Phishing /ˈfiSHiNG/

The attempt to acquire sensitive information such as usernames, passwords, and credit card
details by masquerading as a something trustworthy, like a bank.

*Content was created by the IBM GBS North America Transformation Office
An example of Phishing
Dear Heather,

Your Apple ID was used to sign in to iCloud on an iPhone.

Time: July 06, 2014


Operating System: iOS;6.0.1
• Looks legitimate
If you recently signed in to this device, you can disregard this
email. If you have not recently signed in to an iPhone with your
• You are an Apple customer
Apple ID and believe someone may have accessed your • Convincing detail
account, please click here to confirm your details and change
your password.
• Convincing epilogue
• Increased potential for users to
Apple Support
My Apple ID | Support | Privacy Policy | Copyright © 2014
click links provided without
iTunes thinking
Apple Canada
7495 Birchmount Road
Markham, ON L3R 5G2. All rights reserved.

Go to Apple Canada for more information on our latest new


products.

*Content was created by the IBM GBS North America Transformation Office
Spam

Spam is unwanted ‘junk’ mail that can be used to trick you into revealing information or clicking
a harmful link

Spamming is the act of sending mail to a large number of e-mail addressees, and is often
compared to the term "junk mail" used to describe similar activities performed via postal
services.

What can you do when you are spammed?


• Move mail to the Junk folder
• Block or filter mail from a sender, domain, or subject
• Use Spam protection
Hacking

Hacking is when someone gets unauthorized access to your computer/laptop and your personal
data. A Hacker is an unauthorized user trying to disrupt or damage a computer or network of
computers

How do you know if you’ve been hacked?


• Your anti virus program triggers an alert that your system has been infected, especially if it
says that it was unable to remove the virus
• Get a pop up message that your computer has been encrypted and you must pay a ransom to
recover it or that your computer is infected and you must call a text support phone number to
fix it
• There are new accounts on your computer or device that you did not create or new programs
running that you did not install
• Your browser is taking you to unwanted websites and you cannot close them
• Your password no longer works when you try to login into your online accounts
• Your friends and workers are receiving odd messages from you that you know you never sent
Identity theft

Identity theft is the illegal use of someone else's personal information in order to obtain money
or credit.

Did you know?


• 18-29 year old's issue the most identity theft complaints.
• 31% of all identity theft complaints received by the Federal Trade Commission in 2012 were
filed by young adults.

*Homeland Security Cyber Kit


Unit 2:
Protect your identity
and data
After completing this unit, you should be able to:

• Module I: Understanding personal data


• Explain what is personal data
• Define digital footprint
• Explain the role of IP address and cookies
• Module II: How to protect yourself
•Presented by basic cybersecurity and online hygiene tips
Understand
Unit 2: Module I
Understanding personal data

Presented by
Personal data

Personal School Leisure


Name Grades Friends
Address Attendance Hobbies
Phone # Awards Interests
Email Schedule Photos

Each of these components really marks a part of your online identity

*Content was created by the IBM GBS North America Transformation Office
Digital Footprint

1. Devices are the Key


Phone or desktop, when you
use the internet – you’re
Every time you surf the Internet, you leave
making a mark. behind bits of information.

2. (Un)Conscious You publish some of this data voluntarily –


When you publish or browse like on Instagram.
things, you are leaving
footprints. Sometimes you aren't aware that data of
yours is being gathered and used for other
3. How Everyone Sees You purposes.
This is what you are telling to
the world about yourself.

*Content was created by the IBM GBS North America Transformation Office
Social media

• Attackers are using Social Networks to gather


information.

• This information has many uses for various illegal


activities

When you take a quiz, what information about you


can the quiz see?
Make sure to review your privacy settings!
A. Only my answers to the questions

B. Only info that’s on my profile that’s public

C. Almost everything, regardless of my privacy


settings

*Content was created by the IBM GBS North America Transformation Office
Cookies

Your Cookies are bits of text


Your Password stored on your computer
Name by the sites you visit.
Payment
Info They’re used to let the site
know who you are and to
store any specific
preferences you’ve set.
Your Your Unfortunately, they’re also
Address Preferences used by ad-trackers to
track the sites you visit.

*Content was created by the IBM GBS North America Transformation Office
IP Address
An IP address is the address the computer has
when it connects to the internet.

Public IPs will have things like your location stored


and your surfing history.

An IP address is assigned to every


computer/mobile-phone/ipad which is connected
to the Internet. These IP addresses are given to
them by the Internet Service Providers (like
Safaricom, MTN, Vodafone, etc).

With this information, combined with cookies, a


person can find out a lot about who you are, where
you’ve been, where you love, and what you like to
browse.
*Content was created by the IBM GBS North America Transformation Office
Protect your data

Keep personal data to yourself


Personal data includes your social security number, biometric records, passport number,
home/cell phone number, passwords, and date of birth. When combined with other personal or
identifying information, such as your place of birth or your mother’s maiden name, these details
can result in identity theft or even worse.

Look for the S in https


The 'S' at the end of HTTPS stands for 'Secure,' which means that encryption is being used as
you transmit your data across the internet.

*Content was created by the IBM GBS North America Transformation Office
Unit 2: Module II
How to protect yourself
Cybersecurity tips
Stop, Think, and Connect is a memorable
Passwords needs to be complicated but Always keep your personal information
way for you to stop and consider your
something you can remember. private.
actions online

Password Protection Personal Information Stop. Think. Connect.

Avoid simple passwords like password, Stop before clicking on any links, opening
Keep your personal information private
123456, qwerty – they’re easy to guess messages, sending information
Avoid sharing your name, address, phone Think about who is on the other side of
Longer passwords are more secure; try for
number, birthday, passwords to anyone anything you send and about the information
8-12 characters
you’re sending
Connect once you stopped and thought
Don’t talk to strangers or let strangers
about it, decide whether you really want to
Make them easy to remember friend/follow you
connect, send, post

Use a combination of character sets,


numbers, and letters (!@#$; 1594)

*Content was created by the IBM GBS North America Transformation Office
The 10 hygiene tips to keep you safe online

Keep private
Look for the “S” in Think before you Be cautious with Update software
information
HTPPS click email regularly
PRIVATE

Change passwords Create complex Be cautious of free Log out of all Spread awareness
regularly passwords WiFi accounts to other

*Content was created by the IBM GBS North America Transformation Office
Unit 3:
Protect Your Apps

After completing this unit, you should be able to:

• Understand what can happen to your apps


• Understand the high costs involved in an app security breach
• Understand how to protect your apps
Cost of an application security breach?

• Media attention / brand damage


• Communication / monitoring service costs
• Legal fees (reported $3-4 million)
• New security spending
• User loss

*Content by the IBM Dev Ex team


Prevent application security breach

Sensitive Data Identity theft


Leakage (Impersonating a person and Brand theft
using their name, number, (impersonating a company)
(sensitive info about
passport etc.)
corporates)

Corporates may lose Illegal use of someone else's Hurts the brand
clients, or Business personal information can be image, misleads
Partners or Customers used to obtain money, or for customers
other serious crimes

*Content by the IBM Dev Ex team


Prevent application security breach

Encryption of Strong
Digital signatures
data passwords (the source contains a digital
(storing data in such a way (Create password using certificate that authenticates the
that only authorized parties different characters, and store message)
can access it) them safely)

Prevents Prevents Prevents


sensitive data identity theft brand theft
leakage

*Content by the IBM Dev Ex team


Unit 4:
Protect Your Device

After completing this unit, you should be able to:

• Define what is a personal device


• Understand how to protect your computer
• Explain how to protect your mobile device
Protect your computer
• Be cautious about opening attachments or clicking on links. They may contain viruses or
spyware.
• Learn about security software and how your
• home computer, the kids’ laptop, and their
• computer tablets are protected. Maintain up-to date antivirus software on all your devices that
connect to the Internet to increase your devices’ security.
• Remember that, sometimes, free stuff—like games, ring tones, or screen savers—can
• hide viruses or spyware. Don’t download unless you trust the source and scan the file with
security software.
• Use peer-to-peer (P2P) file-sharing services
• with caution. Make sure you install file-sharing software properly, and scan downloaded files
with security software before you open or play them. Otherwise, you could be sharing
information your family expects to keep private, like financial records.

*Homeland Security Cyber Kit


Mobile security
In 2015, mobile technologies and services generated 6.7% of GDP in Africa, a contribution that amounted to around $150
billion of economic value. In the period to 2020 we expect this to increase to more than $210 billion (7.6% of GDP) as
countries benefit from the improvements in productivity and efficiency brought about by increased take-up of mobile
services - (The Mobile Economy Africa, 2016)

We are increasingly using phones for banking, online shopping, and social media. The more we travel and access the
Internet on the go, the more risks we face on our mobile devices.

Tips for Securing Mobile Devices:


• Think Before You Connect. Before you connect to any public Wi-Fi hotspot, confirm the name of the network and exact login
procedures to ensure that the network is legitimate.
• Guard Your Mobile Device. In order to prevent theft, unauthorized access, and loss of sensitive information, never leave your mobile
devices unattended in a public place.
• Keep It Locked. Always lock your device when you are not using it. Use strong PINs and passwords to prevent others from accessing
your device.
• Update Your Mobile Software. Keep your operating system software and apps updated, which will improve your device’s ability to
defend against malware.
• Know Your Apps. Be sure to thoroughly review the details and specifications of an application before you download it. Delete any apps
that you are not using to increase your security. Double-check how the app will be using your information (Example: does it need access
to your pictures or contact list? If so, why?)
• Only Connect to the Internet if Needed. Disconnect your device from the Internet when you aren’t using it and make sure your device
isn’t programmed to automatically connect to Wi-Fi.
*Homeland Security Cyber Kit
Thank
you.

You might also like