Your Digital Life - Cyber Security
-
Upload
donald-hester -
Category
Technology
-
view
278 -
download
2
Transcript of Your Digital Life - Cyber Security
![Page 1: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/1.jpg)
Social Media, Identity Theft, Data Breaches , Espionage & Cyber Security
![Page 2: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/2.jpg)
![Page 3: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/3.jpg)
![Page 4: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/4.jpg)
Social Media
Private
Life
Work
Family
School
![Page 5: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/5.jpg)
![Page 6: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/6.jpg)
![Page 7: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/7.jpg)
![Page 8: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/8.jpg)
![Page 9: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/9.jpg)
![Page 10: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/10.jpg)
If you own a business or are self-
employed:
• Have you looked to see what is
posted about you?
• Do you monitor for comments
or ratings?
• How do you address
complaints?
• Do you monitor for brand-
jacking? http://knowem.com/
![Page 11: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/11.jpg)
![Page 12: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/12.jpg)
• Employers are increasingly using social
media for background checks.
• Insurance companies use social media
to look for fraud.
• Spies use social media to look for
informants.
![Page 13: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/13.jpg)
![Page 14: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/14.jpg)
![Page 15: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/15.jpg)
![Page 16: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/16.jpg)
Bad guys can exploit your use of social media to infect your computer with malware
![Page 17: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/17.jpg)
![Page 18: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/18.jpg)
http://www.youtube.com/watch?v=Soq3jzttwiA
![Page 19: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/19.jpg)
![Page 20: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/20.jpg)
![Page 21: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/21.jpg)
![Page 22: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/22.jpg)
![Page 23: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/23.jpg)
![Page 24: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/24.jpg)
![Page 25: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/25.jpg)
![Page 26: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/26.jpg)
![Page 27: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/27.jpg)
"Identify theft is one of the fastest growing
crimes in the US."
John Ashcroft79th US Attorney General
![Page 28: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/28.jpg)
![Page 29: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/29.jpg)
![Page 30: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/30.jpg)
![Page 31: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/31.jpg)
![Page 32: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/32.jpg)
http://cbs11tv.com/seenon/Bump.Key.Safety.2.499252.html
![Page 33: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/33.jpg)
![Page 34: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/34.jpg)
TOP MERCHANT GROUPS
RESTAURANTS
GAS
HOTELS
CAR RENTALS
ALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE
![Page 35: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/35.jpg)
BY MERCHANT LOCATIONS
CALIFORNIA
FLORIDA
NEW YORK
NEW JERSEY
TEXAS
MEXICO
ILLINOIS
ALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE
![Page 36: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/36.jpg)
“The federal government is the biggest
offender.”
Paul StephensPrivacy Rights Clearinghouse
![Page 37: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/37.jpg)
• Information is sold on the Black Market
• Sometimes the information is traded for drugs
• Used to fund terrorist operations
![Page 38: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/38.jpg)
![Page 39: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/39.jpg)
![Page 40: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/40.jpg)
Malware has cost trillions of
dollars in the last decade
![Page 41: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/41.jpg)
![Page 42: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/42.jpg)
http://www.secretservice.gov/fraud_email_advisory.shtml
![Page 43: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/43.jpg)
![Page 44: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/44.jpg)
http://www.youtube.com/watch?v=uCyKcoDaofg
http://news.rutgers.edu/medrel/news-releases/2010/02/rutgers-researchers-20100222
http://www.youtube.com/watch?v=UZgf32wVTd4
![Page 45: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/45.jpg)
![Page 47: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/47.jpg)
![Page 48: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/48.jpg)
![Page 49: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/49.jpg)
Albert Gonzalez, 28
With accomplices, he was involved in data breaches of most of the major data breaches:
Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes &
Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW and others.
![Page 50: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/50.jpg)
![Page 51: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/51.jpg)
![Page 52: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/52.jpg)
![Page 53: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/53.jpg)
Data provided by DataLoss db as of
February 2014
![Page 54: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/54.jpg)
![Page 55: Your Digital Life - Cyber Security](https://reader033.fdocuments.us/reader033/viewer/2022042716/55a9ae221a28ab280c8b4594/html5/thumbnails/55.jpg)