TEACHERS
GALLERY
PRICING
SIGN IN
TRY ZURU
GET STARTED
Loop
Audio
Interval:
5s
10s
15s
20s
60s
Play
1 of 22
Slide Notes
Download
Go Live
New! Free Haiku Deck for PowerPoint Add-In
Cyber Stuff
Share
Copy
Download
0
276
Published on Dec 08, 2015
No Description
View Outline
MORE DECKS TO EXPLORE
PRESENTATION OUTLINE
1.
DEFINITIONS
Photo by
Calsidyrose
2.
PERSONAL INFORMATION
WHAT IS IT?
Photo by
woodleywonderworks
3.
SOFTWARE
HOW IS THIS INFORMATION OBTAINED?
Photo by
TaranRampersad
4.
MOBILE MALWARE
Photo by
Deutsche Bank
5.
SOCIAL ENGINEERING
HOW IS THIS INFORMATION OBTAINED?
Photo by
vissago
6.
HARDWARE
HOW IS THIS INFORMATION OBTAINED?
Photo by
thekateblack
7.
SKIMMERS
Photo by
brian395
8.
REMOTE THEFT
Photo by
john antoni
9.
WHAT NOW?
WHAT HAPPENS ONCE THE BAD GUYS HAVE YOUR INFO?
Photo by
85mm.ch
10.
EXAMPLES OF CURRENT MALWARE
Photo by
sk8geek
11.
THE CASTNET
Photo by
c_laird825
12.
TARGETED APPROACH
Photo by
http://heretakis.com
13.
THE BUSINESS MODEL OF CYBERCRME
Photo by
factoryjoe
14.
THE IMPACT
Photo by
W J (Bill) Harrison
15.
HOW INDIVIDUALS CAN PROTECT THEMSELVES
AND THEIR BUSINESS
Photo by
nox-AM-ruit
16.
EDUCATION, EDUCATION, EDUCATION
Photo by
David Reber's Hammer Photography
17.
DON'T DIVULGE WHAT YOU DON'T HAVE TO
Photo by
MJ/TR (´・ω・)
18.
PASSWORDS
Photo by
Nasuni
19.
NETWORK SECURITY
Photo by
PCCare247 Inc.
20.
MONITOR TRANSACTIONS
Photo by
Andres Rueda
21.
REMAIN VIGILANT
Photo by
Newtown grafitti
22.
SECURITY POLICY
Photo by
new 1lluminati
fred touchette
×
Error!