1 of 22

Slide Notes

DownloadGo Live

Cyber Stuff

Published on Dec 08, 2015

No Description

PRESENTATION OUTLINE

DEFINITIONS

Photo by Calsidyrose

PERSONAL INFORMATION

WHAT IS IT?

SOFTWARE

HOW IS THIS INFORMATION OBTAINED?

MOBILE MALWARE

Photo by Deutsche Bank

SOCIAL ENGINEERING

HOW IS THIS INFORMATION OBTAINED?
Photo by vissago

HARDWARE

HOW IS THIS INFORMATION OBTAINED?
Photo by thekateblack

SKIMMERS

Photo by brian395

REMOTE THEFT

Photo by john antoni

WHAT NOW?

WHAT HAPPENS ONCE THE BAD GUYS HAVE YOUR INFO?
Photo by 85mm.ch

EXAMPLES OF CURRENT MALWARE

Photo by sk8geek

THE CASTNET

Photo by c_laird825

TARGETED APPROACH

THE BUSINESS MODEL OF CYBERCRME

Photo by factoryjoe

THE IMPACT

HOW INDIVIDUALS CAN PROTECT THEMSELVES

AND THEIR BUSINESS
Photo by nox-AM-ruit

EDUCATION, EDUCATION, EDUCATION

DON'T DIVULGE WHAT YOU DON'T HAVE TO

PASSWORDS

Photo by Nasuni

NETWORK SECURITY

MONITOR TRANSACTIONS

Photo by Andres Rueda

REMAIN VIGILANT

SECURITY POLICY