Abhay
Abhay
Cyber Security
Abhay Singh Taknet
Virus, Worm, Trojan Horse (Malware) – programs that infect your machine and
carry malicious codes to destroy the data on your machine or allow an intruder to
take control over your machine
Phishing – The practice of using email or fake website to lure the recipient in
providing personal information
Spyware – software that sends information from your computer to a third party
without your consent
Spam – programs designed to send a message to multiple users, mailing lists or
email groups
Security risks
• Compromised Personally Identifiable Information (PII);
PII data refers to name, SSN, D. Licenses, bank
accounts
• Identity Theft- computer intruders intent on stealing your
personal information to commit fraud or theft
• The use of unsecure settings of Peer to Peer File
Sharing applications.
• Compromised computer; A computer experiencing
unexpected and unexplainable
- Disk activities
- Performance degradation
- Repeated login failure or connections to unfamiliar services
- Third party complaint of a suspicious activity
Questions:
• How would you know whether an email sent to
you with an attachment is free from viruses?
• How do you secure sensitive data you send via
email?
• What steps would you take to secure your
computer from malware?
• What does the phrase“ safely manage your
password” mean to you?
Security Measures
• Stolen wallet
- Driver license ID
- Credit cards
- Debit cards
- Bank accounts checks; last withdrawal banking statement
- Health insurance
- Auto registration and insurance card
- Frequent flyer card
• Pilfered mail
• Computer virus
• Phishing and Social Engineering
- Links to fraudulent web sites
- Email
- Phone call
- Mail
• Social Networking account
• License plate
• Health records
• Financial Data
Identity Theft related crimes include
• Check fraud
• Credit card fraud
• Financial Identity Theft
• Criminal identity theft
• Governmental identity theft
• License plate number identity theft
• Mortgage fraud
What About Everyone Else?
The ISO:
1. Confirm compromise, notifiable data, and likelihood of
data breach (stolen laptop = data breach)
2. If data breach – proceed to notification
Run
Proper Handling of Sensitive Data 2/5