National Cybersecurity Awareness Campaign CyberWatch C3 Conference October 7, 2011 1 October is National Cybersecurity Awareness Month This year a different critical cybersecurity issue will be featured each week in October: Week One emphasizes general cybersecurity awareness with events highlighting the Stop.Think.Connect. Campaign. Week Two showcases the urgent need to develop cyber education programs to train the next-generation cyber workforce. Week Three focuses on national and local efforts to prevent identity theft and other cyber crimes. Week Four highlights strategies small- and medium-sized business owners can use to bolster their own cybersecurity defenses. 2 Stop.Think.Connect. Background In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the Federal government “initiate a national public awareness and education campaign informed by previous successful campaigns.” The Stop.Think.Connect. Campaign’s overarching goal is to help Americans understand not only the risks that come with using the Internet, but also the importance of practicing safe online behavior 3 Stop.Think.Connect. Partners 4 Stop.Think.Connect. Public Service Announcement 5 Issues Affecting You Identity Theft Fraud & Phishing Cyberbullying Cyber Predators 6 Cyberbullying 7 Stop.Think.Connect. Public Service Announcement 8 Cyberbullying Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game, or on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for other people to see. Don’t stand for bullying—online or off. Treat others the way you want to be treated—whether you’re interacting with them online, on your phone or in person. Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using “Report Abuse” links can help keep sites fun for everyone. Tell the bully to stop. Most kids don’t bully, and there’s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied. 9 Cyber Predators 10 Cyber Predators Cyber predators are people who search online for other people in order to use, control, or harm them in some way. Cyber predators target teens and young adults – both male and female – on a regular basis, regardless of whether or not the victims are 18 or above. Social networking sites enhance a predator’s ability to target young Americans, especially if they share personal information in their profile. 91% of young adults say they are social networking “friends” with people they don’t know well* Protect yourself and your personal information, you never know who is behind the screen Notify your family and the proper authorities immediately if you are being targeted or harassed online * Source: http://www.staysafeonline.org/sites/default/files/resource_documents/Cyber%20Education%205.3.11%20PDF.pdf 11 Social Media Tips US-CERT* suggests ten steps that you can take to protect yourself on social networks: Limit the amount of personal information you post Remember that the internet is a public resource Be wary of strangers Be skeptical – Don’t believe everything you read online. Evaluate your settings – don’t stick with the defaults! Be wary of third-party applications Use strong passwords Check privacy policies Keep software, particularly your web browser, up to date Use and maintain anti-virus software * Source: The United States Computer Emergency Readiness Team (US-CERT) www.us-cert.gov 12 Identity Theft 13 Identity Theft Identity theft is the illegal use of someone else's personal information in order to obtain money or credit. Every 3 seconds an identity is stolen- so for the length of this training session over 2,400 identities may have been stolen. Every year, 500,000 kids have their identity stolen. Here are some simple tips to prevent identity theft: – – – – – Don’t use the same password twice. Choose a password that means someone to you and you only. If you have been compromised, report it to the Federal Trade Commission. Lock your computer and cell phone. Don’t share personal information without knowing exactly who is on the receiving end. 14 Stop.Think.Connect. Public Service Announcement 15 Fraud & Phishing 16 Fraud & Phishing Tips Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. Phishing is a scam by which an email user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently. Most organizations – banks, universities, companies, etc. - don’t ask for your personal information over email. Beware of requests to update or confirm your personal information. Don’t open emails from strangers and don’t click on unfamiliar sites; if you think an offer is too good to be true, then it probably is. Make sure you change your passwords often and avoid using the same password on multiple sites. Always enter a URL by hand instead of following links. Reporting of suspicious or unsolicited e-mails from unknown sources is key to preventing and mitigating the impacts of these attacks. Report any suspicious emails or links to USCERT, Internet Crime Complaint Center, and the Federal Trade Commission. 17 Stop.Think.Connect. Website www.dhs.gov/ stopthinkconnect 18 Toolkit Chatting with Kids Heads Up Spread the Word Brochure Bookmark Poster PowerPoint 19 Chatting with Kids About Being Online Chatting with Kids is a guide that instructs you how to talk to kids about online safety The guide also covers hot button issues, such as sexting and cyberbullying Use the guide to talk to kids directly or when you train parents how to talk to their kids. 20 Chatting with Kids About Being Online Tips Have regular conversations about using the Internet. Talk to kids about online manners. Ask kids who they are in touch with online and what sites they visit. Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online. Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours. 21 Heads Up: Stop.Think.Connect. Heads Up is an online safety guide you can hand out to kids during cyber safety presentations or within the community – at schools, recreation centers, libraries and other community centers. Heads Up is designed specifically for kids on how and why to stay safe online, including a word search activity. The guide provides Do’s and Don’ts of online behavior. 22 Heads Up Tips DO DON’T Stop before you post something and think about how you will feel if your family, teachers, neighbors or coaches see it. Limit your online friends to people you actually know. Speak up if you feel uncomfortable or threated by something you see online. Reply to text, email or pop up messages that ask you for personal information. Open attachments or click on links that are suspicious or come from strangers. Stand for bullying – online or off. Post videos or photos of someone without their approval. 23 Spread the Word: Community Outreach Guide This guide shows you how to use all of the materials in the Toolkit to give effective presentations on cyber safety. It also provides tips on how to get the word out about Internet safety – online and offline. Spread the word to your family, colleagues, and communities. 24 Ice-Breaker Questions For Kids: For Parents: Do you sleep with your cell phone in reach? Raise your hand if you post pictures online. Have you ever posted anything you’ve regretted? Raise your hand if you or one of your friends have ever received a mean text message. Have you ever talked to your parents about something that bothered you online? Raise your hand if you think your child knows more about the Internet and technology than you do. Do your kids have their own computers? Do they have their own cell phones? Do you set rules for Internet use? If so, what are they? What are your main concerns about your children using the Internet? 25 Supporting Documents Stop.Think.Connect. brochure, bookmark and poster included CD including Chatting with Kids, Spread the Word and Heads Up Guides and PowerPoint presentation The PowerPoint presentation may be customized to suit your needs Toolkit materials may also be found on the Stop.Think.Connect. website 26 If you have been exposed to a cyber threat: You can report Internet -related frauds, scams and suspicious activity with the following organizations National Center for Missing & Exploited Children – This nonprofit organization has a Congressionally-mandated Cyber Tipline as a means for reporting crimes against children. Reports may be made 24-hours a day, 7 days a week online at www.cybertipline.com or by calling 1-800-843-5678 Department of Justice (DOJ) – The DOJ’s Computer Crime & Intellectual Property Section (CCIPS) tells you where to go to report hacking, password trafficking, SPAM, child exploitation and other Internet harassment. For more information visit http://www.justice.gov/criminal/cybercrime/ The Internet Crime Complaint Center (IC3) – The IC3 (http://www.ic3.gov/) is a partnership between the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal complaints related to cyber crime 27 Call to Action Cybersecurity is a shared responsibility Visit our website and become a Friend of the Campaign Use our Toolkit materials at your own cyber safety presentations Spread the word about Stop.Think.Connect. to your peers 28 Remember to Stop.Think.Connect. Stop Stop hackers from accessing your accounts- set secure passwords Stop sharing too much information- keep your personal information personal Stop- trust your gut, if something doesn’t feel right, stop what you are doing Think Think about the information you want to share before you share it Think how your online actions can affect your offline life Think before you act- don’t automatically click on links Connect Connect over secure networks Connect with people you know Connect with care and be on the lookout for potential threats 29 Securing cyberspace starts with YOU 30