0% found this document useful (0 votes)
68 views

Basic Cyber Security

Cyber Security presentation

Uploaded by

Gabriel López
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Basic Cyber Security

Cyber Security presentation

Uploaded by

Gabriel López
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Cybersecurity:

A basic guide to safer computing

Jose G. Lopez
IT Specialist
Knowing some cybersecurity basics and
putting them into practice will help you stay
safe, protected and private while online.
Quick knowledge check :

´Are you familiar with the following terms?


qHacking
qPhishing
qVishing
qVirus
qBackup
qEncryption
qMalware
What is a Cyber Attack?
´ A cyberattack is a deliberate exploitation of your systems and/or network.
Cyber attacks use malicious code to compromise your computer, logic, or
data and steal, leak, or hold your data or assets hostage.

´ Here are some examples of common cyber attacks and types of data
breaches:
´ Identity Theft, Fraud, Extortion
´ Malware, Phishing, Spamming, Spoofing, Spyware, Trojans, Viruses
´ Stolen Hardware, such as laptops or mobile devices
´ Breach of Access
´ Password Sniffing
´ System Infiltration
´ Private and Public Web Browser Exploits
´ Intellectual Property Theft or Unauthorized Access
How common are cyberattacks?
No, really- how common?
´ Puerto Rico was the target of more than 1 billion cyber
attacks in the first half of 2023.

´ Latin America and the Caribbean were targeted more than


63 billion times for the same period.

´ Brazil – 23 billion
´ Mexico – 14 billion
Data provided by:
´ Venezuela – 10 billion
´ Colombia – 5 billion
´ Chile – 4 billion
Do you remember these cyber attacks?
Do you remember these cyber attacks?
Jokes aside- what can I do, to stay safe
online and prevent cyber attacks at home
and on my business?
´ Continuous education
´ Keep your software and systems fully up to date
´ Ensure Endpoint Protection
´ Install a Firewall
´ Backup your data
´ Control Access to your systems
´ Wi-Fi Security
´ Be Extra Cautious when using Public Computers
´ Do not share accounts
´ Access Management
´ Proper Passwords
What can I do? - Continuous Education
´ The US Cybersecurity & Infrastructure Security Agency has made
available to the public over 850 hours of course content on
cyber security, through the Federal Virtual Training Environment
platform.
´ These courses were originally designed for US military and US and
State government employees.
Did I say FREE of charge?

´ You can access these courses at: www.fedvte.usalearning.gov


´ Some courses include:
´ Cloud Computing Security
´ Cyber Essentials
´ Fundamentals of Cyber Risk Management
´ Foundations of Cyber Security
What can I do? - Keep software and
Systems up-to-date
´ Most modern systems and hardware are aggressively
tested by their developers to make sure they are safe
and secure for their end-user.
´ Periodically, developers release updates for their
equipment to better adapt to ongoing, newer and
possible future exploits.
´ It is very important to keep with these updates, as this will
enable software and systems to correct security issued
and better protect itself from attacks.
´ Follow the recommended update instructions for your
specific systems.
What can I do? – Ensure End-Point Protection

´ End-Point Protection is the cyber security approach of


protecting end-points- such as laptops, mobile devices,
desktops etc. from malicious activities.
´ Protecting end-points is as important as protecting main
servers and systems, as all end-points can be an entry point
for attackers to access main servers and systems.
´ End-Point protection works by scanning and actively
monitoring files, processes and system activity for suspicious
or malicious indicators.
´ End-Point protection prevents, detect, hunt, and respond
to viruses, trojans, malicious scripts and other suspicious
activities.
What can I do? – Install a Firewall

´ A firewall acts as a 24/7 filter, scanning all data traffic that


attempts to enter your network, thus preventing anything
that looks suspicious from getting through.
´ A simple way to explain how a firewall works is to think of it
as a security guard with intimate knowledge of millions of
potential criminals. If a criminal is detected, it is kept out of
your system.
´ Many systems and hardware already have integrated
firewalls but it is important to keep these up-to-date.
´ Many antivirus solutions include firewalls on their software
platforms.
What can I do? – Back up your data

´ Data back up are of the utmost importance and must be


performed frequently to make sure the lates iteration of
your data is kept safe.
´ Back ups protect data against human errors, hardware
failures, power failures, natural disasters and most
importantly against viruses and hackers.
´ Back ups can save you time and money if these failures
occur.
´ Some cloud services like iCloud, Google Drive and
MS One Drive- provide limited backup solutions.
What can I do? – Control access to systems

´ Systems access control is a technique that regulates


who or what can view and use resources within a
specific system or computing environment.
´ There are two types of Access Controls: physical
and logical. Logical refers to limits to connections
to network computers, system files and data.
´ User accounts and Passwords are the first line of defense to
prevent particular people, software and malware to reach
systems and data files.
´ Use strong passwords whenever possible.
What can I do? – Wi-Fi Security
´ Virtual Private Network (VPN) – This allows the user to create a tunnel
through which your data can be transferred securely over public Wi-Fi
networks, by encrypting your internet connection. This technology can
also conceal your IP address as it passes through the VPN server.
´ Change default Wi-Fi Passwords and Network Names - Most devices
have a default admin passwords which can be easily guessed. These
passwords are meant to keep device setup fairly easy and most of them
can be found online.
´ Media Access Control Addresses (MAC) – A MAC address is a unique
combination of letters and numbers which identify a specific equipment.
Some Wi-Fi equipment with advanced network configuration can create
a white/black list of MAC addressed allowed on the network thus
preventing unauthorized devices to access your network.
What can I do? – Public Computers
Be extra cautious when using public computer. I cannot stress this enough!
´ Shoulder surfing
´ Spyware and Malware
´ Browsing History, Cookies – Clear them when you are finished!
´ Saving passwords on public computers – remember me not!
´ Keyloggers – used to record key presses
´ Password Loggers – used to record password
´ Avoid financial transactions, accessing bank account,
using credit cards or PayPal accounts
´ Remember to log out to any and all services you have accessed
What can I do? – Physical Key Loggers/Grabbers
Think Twice!

www.phaceb0ok.com/
Another example of how hackers can
get to your information:
What can I do? – Do Not Share Passwords

´ Sharing passwords may result on increased vulnerability given the


point of access security and the individual user’s security practices.
This makes it easier for hackers to intercept your data.
´ Increased potential of users leaving accounts left opened or
unsecured.
´ Higher risk of phishing- among other methods of data breaches.
What can I do? – Proper Passwords

´ This is one of the most important steps you can take to protect your
identity and data while online.
´ Change your passwords regularly- set alarms!
´ A strong password should contain:
´ At least 12 characters or longer
´ A combination of lower/uppercase letters
´ Non-sequential numbers and special characters
´ Not be a word on the dictionary, name, place or product

Example of strong password: $tr0ngP@ssword24


In Conclusion – Cyber Security, Your
Responsibility!
The internet is a public domain. Everyone has access to it.
Think of it as a virtual park with unlimited access to
everyone and everything.

Expectation of privacy while accessing the internet


cannot be guaranteed but you can surely protect
yourself while doing so- to make sure you surf the web in a
safe and responsible manner.
Questions and Answers!

You might also like