Download - Cyber Security Awareness October 2014
![Page 1: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/1.jpg)
Cyber Security'the good,' 'the bad,' & 'the ugly'
![Page 2: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/2.jpg)
Agenda
• Cyber Security• Social Media• Privacy• Cyberbullying• ID Theft• Cyber Spies• Cyber Crime• Questions
October is Cyber Security
Awareness Month
![Page 3: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/3.jpg)
Your Digital LifePersonal Cyber Security
Social Media
![Page 4: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/4.jpg)
Growth of Tech and Social Media
![Page 5: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/5.jpg)
Blurring the lines
Social Media
Private Life
Work
Family
School
![Page 6: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/6.jpg)
![Page 7: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/7.jpg)
Internet of EverythingSmart MetersToll road/bridgeTraffic managementParking MetersAutomobilesHome AutomationHealth MonitoringShoppingAppliancesCattle (tracking/monitoring)
By 2020 there will be more things on the internet than people, est. 50 billion things
![Page 8: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/8.jpg)
Data Rate Increasing
• Amount of data created, captured, and replicated in 2007 was 281 exabytes (281,000,000,000 GB)• In 2011 there will be nearly 1,800 exabytes of
information created• In 2012 we created more data than in the last 5000
years
![Page 9: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/9.jpg)
Social Media, the Good
Psychology Today 10 OCT 2014
![Page 10: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/10.jpg)
Social media is just a new way of connecting that is much more efficient
![Page 11: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/11.jpg)
Online Profile & Rep
• Your "online profile" is the sum of online content about you that you've created and content about you created by others. Items include: emails, videos, posts on social networks, someone posting a picture or comments about you on a social network or website, credit, financial, and medical information.• Your "online reputation" is the image created of you
through information you or others shared online in blogs, posts, pictures, tweets, and videos.
![Page 12: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/12.jpg)
Social Media & HR• The use of social media outside of personal lives has
increased and continues to increase• Concern that potential employers will misconstrue what is
seen• Used for monitoring current employees• Used for screening job applicants• Employees see it as a good way to “get to know” the applicant
![Page 13: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/13.jpg)
Picture from Department of Homeland Security
![Page 14: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/14.jpg)
Personal Ramifications
• Employers are increasingly using social media for background checks.
• Insurance companies use social media to look for fraud.
• Spies use social media to look for informants.
![Page 15: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/15.jpg)
Online Privacy and Reputation• Do you have control of what is
posted?• Not all fame is good!• People use anonymity to post
stuff about others!• Embarrassment, loss of
credibility
Rev2/28/2011
![Page 16: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/16.jpg)
Online Privacy• Would you invite a
stranger into your house to look at your children's photo album?• Public v. Private• Aggregate
information sources could give someone more information than intended.
![Page 17: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/17.jpg)
But what about what others share about you online?
![Page 18: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/18.jpg)
Giving up Privacy for $s or for free
![Page 19: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/19.jpg)
Bad guys use social media too
Bad guys can exploit your use of social
media to infect your computer with malware
![Page 20: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/20.jpg)
Information about you online• Do I have control of what is
posted about me?
• Look yourself up!
• Even if you are not on the web, you may be on the web!
• Do what you can to control what is out there.
• What is your social relevancy (Reputation)?
• Setup alerts and monitor what is posted about you.
• Public records on the web…
![Page 21: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/21.jpg)
Get Alerts
![Page 22: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/22.jpg)
Social Shopping & Brand Protection
If you own a business or are self-employed:• Have you looked to see
what is posted about you?• Do you monitor for
comments or ratings?• How do you address
complaints? • Do you monitor for brand-
jacking? http://knowem.com/
![Page 23: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/23.jpg)
Are people using your intellectual property?
![Page 24: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/24.jpg)
Watch what you put online
http://www.youtube.com/watch?v=Soq3jzttwiA
![Page 25: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/25.jpg)
Can someone use what you post against you?
![Page 26: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/26.jpg)
Social Media & Politics; A Game Changer
![Page 27: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/27.jpg)
Terrorists also use Social Media
![Page 28: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/28.jpg)
It never goes away
![Page 29: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/29.jpg)
Information on the Internet never diesInformation, once on the Internet, can be there for years, even if the service claims it is goneDon’t post anything you wouldn’t want seen by everyone
![Page 30: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/30.jpg)
Can happen to anyone
![Page 31: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/31.jpg)
Oh no!
![Page 32: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/32.jpg)
Cyber Spying
![Page 33: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/33.jpg)
![Page 34: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/34.jpg)
Governments
![Page 35: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/35.jpg)
Privacy is dead?
![Page 36: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/36.jpg)
Cyberbullying & Internet Trolls
![Page 37: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/37.jpg)
Real life consequences
![Page 38: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/38.jpg)
Cyberbullying
• "Cyberbullying" happens when a child, preteen, or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen, or teen using the Internet, interactive and digital technologies, or mobile phones• Examples of cyberbullying include, mean text messages
or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.• http://www.stopbullying.gov
![Page 39: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/39.jpg)
Prevention
![Page 40: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/40.jpg)
Results
• In extreme cases, some children have committed suicide• Distracts from
academics• Increases risk of
depression• Hurts self-esteem
Megan MeierRyan HalliganHope Witsell
Tyler ClementiTy Smalley Jesse Logan
![Page 41: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/41.jpg)
A new area of psychology
Virtually You: The Dangerous Powers of the E-Personality Elias Aboujaoude
![Page 42: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/42.jpg)
Online Drama
![Page 43: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/43.jpg)
Getting into trouble
![Page 44: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/44.jpg)
Hacktivisim
![Page 45: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/45.jpg)
Identity Fraud & Theft
![Page 46: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/46.jpg)
Situation
• Why does someone want your personal information?• In an information age,
information becomes a commodity• Information has a value• Some information has a
greater value• Your personal information is
potentially worth more than you think
![Page 47: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/47.jpg)
What is PII
• Personally Identifiable Information• Name and account number• Name and social security number• Name and address• Credit Card Number
• Where you might find it• Tax files• Account Statements• Records (Medical, Public and other)• Businesses you do business with
![Page 48: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/48.jpg)
Who keeps your personal data?
Social Media Sites – User generated, friends and family, enemies
Corporations – Big data, Tracking, Sales, Marketing
Government – Local, State, Federal and other
Organizations – Non-profits, Clubs, VSOsSchools – Grades, Clubs, School
NewspaperMedia – Newspapers, News, Video
![Page 49: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/49.jpg)
![Page 50: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/50.jpg)
Data from unexpected sources
![Page 51: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/51.jpg)
ID Theft vs. ID Fraud
• “Identity fraud," consists mainly of someone making unauthorized charges to your credit card. • “Identity theft,” is when someone gathers your personal
information and assumes your identity as their own.
"Identify theft is one of the fastest growing crimes in the US."John Ashcroft79th US Attorney General
![Page 52: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/52.jpg)
The Busboy That Started It All
• March 20th 2001, MSNBC reported the first identity theft case to gain widespread public attention• Thief assumed the identities of Oprah Winfrey and
Martha Stewart, took out new credit cards in their names, and accessed their bank accounts• Stole more than $7 million from 200 of the world’s
super rich - Warren Buffet and George Soros, tech tycoons Paul Allen and Larry Ellison• Used a library computer, public records, a cell
phone, a fax machine, a PO Box, and a copy of Forbes Richest People• 32-year-old Abraham Abdallah was described as “a
high school dropout, a New York City busboy, a pudgy, disheveled, career petty criminal.”
![Page 53: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/53.jpg)
ID Theft & Fraud
• PII exposed by others (Data Breaches)• PII exposed by ourselves (online & others)• Malware (Spyware, Viruses, etc…)• Social Engineering
• Phone• Internet (Phishing, social websites etc…) • In Person (at your door, in a restaurant etc…)
• Physical theft• Mail box• Trash (Dumpster diving)• ATMs (skimming)• Home break-ins
![Page 54: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/54.jpg)
Close to Home
![Page 55: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/55.jpg)
Physical theft
• Dumpster diving• ATM – Credit Card skimming• Mailbox• Home Break-in
![Page 56: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/56.jpg)
Close to Home
![Page 57: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/57.jpg)
“Lock Bumping”
http://cbs11tv.com/seenon/Bump.Key.Safety.2.499252.html
![Page 58: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/58.jpg)
Credit Card/ATM Skimming
![Page 59: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/59.jpg)
Credit Card Skimming Stats
TOP MERCHANT GROUPS
RESTAURANTSGASHOTELSCAR RENTALSALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE
![Page 60: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/60.jpg)
Credit Card Skimming Stats
BY MERCHANT LOCATIONS
CALIFORNIAFLORIDANEW YORKNEW JERSEYTEXASMEXICOILLINOISALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICE
![Page 61: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/61.jpg)
Public Records
“The federal government is the biggest offender.”Paul StephensPrivacy Rights Clearinghouse
![Page 62: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/62.jpg)
What do they do with stolen IDs?
• Information is sold on the Black Market
• Sometimes the information is traded for drugs
• Used to fund terrorist operations
![Page 63: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/63.jpg)
In the news…
![Page 64: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/64.jpg)
Computer and Mobile Security
![Page 65: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/65.jpg)
P2P (Peer to Peer file sharing)
• Used to ‘share’ computer files• Legal issues with
copyright• Malware issues• Privacy issues, do you
know what you are sharing?
![Page 66: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/66.jpg)
Malware
• Malware (Viruses, Worms, Spyware, etc…)• 1999 Melissa, Kevin Mitnick, • 2000 Mafiaboy, DoS Assault, • 2001 Code Red, Nimda, • 2002 Root Rot, Slapper, • 2003 SQL Slammer, • 2004 MyDoom, BerBew, • 2005 Samy (MySpace), • 2007 Storm Worm, Botnets, etc..• 2102 Advanced Persistent Threat
APT
Malware has cost trillions of dollars in the last
decade
![Page 67: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/67.jpg)
Viruses
• In the past, they were primarily destructive• Today, they focus on stealing information• Or using your computer as a Bot (Zombie) to send out
SPAM or attack other systems
![Page 68: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/68.jpg)
Malware is not gone
![Page 69: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/69.jpg)
Phishing: Internet Fraud
• Oldest trick in the book, there are examples in the 1500s• One particular fraud is called
the “Nigerian 419” scam or “Advanced Fee Fraud”• Started as a letter, then it
showed up in faxes and now it is sent by email.• The message contains many
variations on the story
Rev2/28/2011
http://www.secretservice.gov/fraud_email_advisory.shtml
![Page 70: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/70.jpg)
Computer Spyware
![Page 71: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/71.jpg)
Cell Phone Spyware
http://www.youtube.com/watch?v=uCyKcoDaofghttp://news.rutgers.edu/medrel/news-releases/2010/02/rutgers-researchers-20100222http://www.youtube.com/watch?v=UZgf32wVTd4
![Page 72: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/72.jpg)
Data Breaches
![Page 73: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/73.jpg)
![Page 75: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/75.jpg)
![Page 76: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/76.jpg)
![Page 77: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/77.jpg)
Desensitization of data breaches
![Page 78: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/78.jpg)
The Problem
Albert Gonzalez, 28
With accomplices, he was involved in of most of the major data breaches: Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW, and others.
![Page 79: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/79.jpg)
![Page 80: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/80.jpg)
Who is behind data breaches?
• 70% from external agents• 48% caused by insiders• 11% implicated business
partners• 27% involved multiple parties
![Page 81: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/81.jpg)
How others might expose your PII
• Data Breach• Lack of security on the part of
businesses• Organizations may post
information online• Loss of a laptop, hard drive, or
paper work• Data loss by a third party• Hacker (Organized Crime & Nation
State)• Organizations may break into your
computer
![Page 82: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/82.jpg)
Top 10 Largest Breaches
Data provided by DataLoss db as of February 2014
![Page 83: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/83.jpg)
Careers in IT and Cyber Security Application Development Network Engineer Analyst Teaching
Auditor/Assessor Systems Administration Program Management Law enforcement
![Page 84: Cyber Security Awareness October 2014](https://reader037.vdocuments.site/reader037/viewer/2022102922/5481edcdb4af9f32538b45a6/html5/thumbnails/84.jpg)
Linkstwitter.com/sobca
facebook.com/LearnSecwww.learnsecurity.org
linkedin.com/in/donaldehesteryoutube.com/user/LearnSecurity
Slideswww.slideshare.net/sobca