This document discusses cybersecurity topics including identity theft, fraud and phishing, cyber bullying and ethics, and cyber predators. It provides information and tips on each topic:
Identity theft involves illegally using someone else's personal information to obtain money or credit. In 2010, 8.1 million people were victims of identity theft. Steps to protect online identity include locking devices and not sharing personal details.
Fraud scams people into revealing information, while phishing uses authentic-looking websites or personalized emails. Attacks can shut down systems. Steps to protect include educating others and identifying phishing.
Cyber bullying involves mean online posts, often anonymously. Good cyber ethics help understand right from wrong online. Whatever
2. Cyber security Topics
• Cyber and the Internet are critical in helping us day-to-day
activities, from communicating via email to gathering information
via the Internet
• There are four cybersecurity topics that should help you .
• Identity Theft
• Fraud and Phishing
• Cyber Bullying and Ethics
• Cyber Predators
•
Robin Rafique
3. Identity Theft
• Identity theft is the illegal use of someone else’s personal
information in order to obtain money or credit
• Identity theft can happen to anyone in any location across the
country
– 8.1 million were victims of identity theft in 2010*
– Take simple steps to protect your online identity, such as:
– Locking and password protecting your computer and cell phone
– Not sharing specific personal information online, such as your
full name or birthday
– Setting proper privacy settings on social networking sites
Robin Rafique
4. Crime in the Modern World
Massive amount of data:
• 247 billion email per day
• 234 million websites
• 5 billion mobile-phone
users
ICT Infrastructures:
• Complex,rapidly growing
• Dynamically changing
• Hostile,adversary environment
Cyber crime:
• One million victims daily
• Expected losses 297
• Billion Euro
Ultra‐large Scale
Forensic
Investgations.
• Situation-aware methods
• Quanlified,measurable
• indicators
• Adaptive, self‐organizing models
Distributed, cooperative,autonomo
us
Rule-of-Law:
• Culture,social behaviours
• Legal&privacy aspects
• Law as framework for ICT
• Law as contents of
ICT, Automation,programming of
legal rules
Robin Rafique
5. Fraud and Phishing
• Fraud is the intentional perversion of truth in order to induce
another to part with something of value or to surrender a legal right
• Phishing is a scam by which an email user is duped into revealing
personal or confidential information that the scammer can use
illicitly or fraudulently
• Fraud and phishing attacks may take the form of an authentic-
looking website or a personalized email
– In April 2011, a phishing scam targeted the Department of
Energy’s Oak Ridge Laboratory facility, shutting down email
and Internet access*
– Secure yourself from fraud and phishing attacks by:
– Working with your peers to identify and deal with phishing
attacks
– Educating your family and friends about the types of phishing
scams and what they can do to protect themselves
Robin Rafique
6. Cyber Bullying and Ethics
• Cyber bullying is the electronic posting of mean-spirited
messages about a person, often done anonymously
• Cyber ethics help Internet users understand what type of online
behavior is right and wrong
• Cyber bullying and poor cyber ethics are threats many teens and
young adults face not from strangers, but from their own peers
• Whatever anyone posts online about another person can be spread
virally, resulting in serious, unwarranted damage to an individual’s
reputation or personal well-being
• Avoid being a cyber bully and practice good cyber ethics by:
– Following the “golden rule” online and in real life – be nice
– Not saying or doing anything online that you wouldn’t do in
person
– Owning what you say and do online
Robin Rafique
7. Cyber Predators
• Cyber predators are people who search online for other people in
order to use, control, or harm them in some way
• Cyber predators target teens and young adults – both male and
female – on a regular basis, regardless of whether or not the victims
are 18 or above
• Social networking sites enhance a predator’s ability to target young
Americans, especially if they share personal information in your
profile
– 91% of young adults say they are social networking “friends”
with people they don’t know well*
– You never know who is behind the screen, so protect yourself
and your personal information
– If you are being targeted or harassed online, you should notify
your family or the proper authorities
Robin Rafique
8. Chatting with Kids About
Being Online Tips
• Have regular conversations about using the Internet.
• Talk to kids about online manners.
• Ask kids who they are in touch with online and what sites they visit.
• Use parental control options that allow you to block and filter
content, filter outgoing content and limit kid’s time online.
• Develop computer and cell phone rules, such as no cell phone use at
the dinner table, during homework or sleeping hours.
Robin Rafique
9. Tips
DO
• Stop before you post
something and think about
how you will feel if your
family, teachers, neighbors or
coaches see it.
• Limit your online friends to
people you actually know.
• Speak up if you feel
uncomfortable or threated by
something you see online.
DON’T
• Reply to text, email or pop up
messages that ask you for
personal information.
• Open attachments or click on
links that are suspicious or
come from strangers.
• Stand for bullying – online or
off.
• Post videos or photos of
someone without their
approval.
Robin Rafique