National Cybersecurity Awareness Campaign

advertisement
National Cybersecurity Awareness Campaign
CyberWatch C3 Conference
October 7, 2011
1
October is National Cybersecurity Awareness Month
This year a different critical cybersecurity issue will be featured each week in October:
Week One emphasizes general cybersecurity awareness with events highlighting the
Stop.Think.Connect. Campaign.
Week Two showcases the urgent need to develop cyber education programs to train
the next-generation cyber workforce.
Week Three focuses on national and local efforts to prevent identity theft and other
cyber crimes.
Week Four highlights strategies small- and medium-sized business owners can use to
bolster their own cybersecurity defenses.
2
Stop.Think.Connect. Background
 In May 2009, President Obama issued
the Cyberspace Policy Review, which
recommends the Federal government
“initiate a national public awareness and
education campaign informed by
previous successful campaigns.”
 The Stop.Think.Connect. Campaign’s
overarching goal is to help Americans
understand not only the risks that come
with using the Internet, but also the
importance of practicing safe online
behavior
3
Stop.Think.Connect. Partners
4
Stop.Think.Connect. Public Service Announcement
5
Issues Affecting You
Identity Theft
Fraud & Phishing
Cyberbullying
Cyber Predators
6
Cyberbullying
7
Stop.Think.Connect. Public Service Announcement
8
Cyberbullying
Cyberbullying is bullying that happens online. It can happen in an email, a text
message, an online game, or on a social networking site. It might involve rumors or
images posted on someone’s profile or passed around for other people to see.
 Don’t stand for bullying—online or off. Treat others the way you want to be
treated—whether you’re interacting with them online, on your phone or in
person.
 Speak up. If you see something inappropriate on a social networking site or in a
game or chat room, let the website know and tell an adult you trust. Using
“Report Abuse” links can help keep sites fun for everyone.
 Tell the bully to stop. Most kids don’t bully, and there’s no reason for anyone to
put up with it. This mean behavior usually stops pretty quickly when somebody
stands up for the person being bullied.
9
Cyber Predators
10
Cyber Predators
Cyber predators are people who search online for other people in order to use, control,
or harm them in some way.
 Cyber predators target teens and young adults – both male and female – on a regular
basis, regardless of whether or not the victims are 18 or above.
 Social networking sites enhance a predator’s ability to target young Americans,
especially if they share personal information in their profile.
 91% of young adults say they are social networking “friends” with people they don’t
know well*
 Protect yourself and your personal information, you never know who is behind the
screen
 Notify your family and the proper authorities immediately if you are being targeted
or harassed online
* Source: http://www.staysafeonline.org/sites/default/files/resource_documents/Cyber%20Education%205.3.11%20PDF.pdf
11
Social Media Tips
US-CERT* suggests ten steps that you can take to protect yourself on social networks:










Limit the amount of personal information you post
Remember that the internet is a public resource
Be wary of strangers
Be skeptical – Don’t believe everything you read online.
Evaluate your settings – don’t stick with the defaults!
Be wary of third-party applications
Use strong passwords
Check privacy policies
Keep software, particularly your web browser, up to date
Use and maintain anti-virus software
* Source: The United States Computer Emergency Readiness Team (US-CERT) www.us-cert.gov
12
Identity Theft
13
Identity Theft
Identity theft is the illegal use of someone else's personal information in order to obtain
money or credit.
 Every 3 seconds an identity is stolen- so for the length of this training session over
2,400 identities may have been stolen.
 Every year, 500,000 kids have their identity stolen.
 Here are some simple tips to prevent identity theft:
–
–
–
–
–
Don’t use the same password twice.
Choose a password that means someone to you and you only.
If you have been compromised, report it to the Federal Trade Commission.
Lock your computer and cell phone.
Don’t share personal information without knowing exactly who is on the receiving end.
14
Stop.Think.Connect. Public Service Announcement
15
Fraud & Phishing
16
Fraud & Phishing Tips
Fraud is the intentional perversion of truth in order to induce another to part with something
of value or to surrender a legal right.
Phishing is a scam by which an email user is duped into revealing personal or confidential
information that the scammer can use illicitly or fraudulently.
 Most organizations – banks, universities, companies, etc. - don’t ask for your personal
information over email. Beware of requests to update or confirm your personal
information.
 Don’t open emails from strangers and don’t click on unfamiliar sites; if you think an offer is
too good to be true, then it probably is.
 Make sure you change your passwords often and avoid using the same password on
multiple sites.
 Always enter a URL by hand instead of following links.
 Reporting of suspicious or unsolicited e-mails from unknown sources is key to preventing
and mitigating the impacts of these attacks. Report any suspicious emails or links to USCERT, Internet Crime Complaint Center, and the Federal Trade Commission.
17
Stop.Think.Connect. Website
www.dhs.gov/
stopthinkconnect
18
Toolkit







Chatting with Kids
Heads Up
Spread the Word
Brochure
Bookmark
Poster
PowerPoint
19
Chatting with Kids About Being Online
 Chatting with Kids is a guide that
instructs you how to talk to kids about
online safety
 The guide also covers hot button issues,
such as sexting and cyberbullying
 Use the guide to talk to kids directly or
when you train parents how to talk to
their kids.
20
Chatting with Kids About Being Online Tips
 Have regular conversations about using
the Internet.
 Talk to kids about online manners.
 Ask kids who they are in touch with
online and what sites they visit.
 Use parental control options that allow
you to block and filter content, filter
outgoing content and limit kid’s time
online.
 Develop computer and cell phone rules,
such as no cell phone use at the dinner
table, during homework or sleeping
hours.
21
Heads Up: Stop.Think.Connect.
 Heads Up is an online safety guide you
can hand out to kids during cyber safety
presentations or within the community
– at schools, recreation centers, libraries
and other community centers.
 Heads Up is designed specifically for kids
on how and why to stay safe online,
including a word search activity.
 The guide provides Do’s and Don’ts of
online behavior.
22
Heads Up Tips
DO
DON’T
 Stop before you post something and
think about how you will feel if your
family, teachers, neighbors or coaches
see it.
 Limit your online friends to people you
actually know.
 Speak up if you feel uncomfortable or
threated by something you see online.
 Reply to text, email or pop up messages
that ask you for personal information.
 Open attachments or click on links that
are suspicious or come from strangers.
 Stand for bullying – online or off.
 Post videos or photos of someone
without their approval.
23
Spread the Word: Community Outreach Guide
 This guide shows you how to use all of
the materials in the Toolkit to give
effective presentations on cyber safety.
 It also provides tips on how to get the
word out about Internet safety – online
and offline.
 Spread the word to your family,
colleagues, and communities.
24
Ice-Breaker Questions
For Kids:
For Parents:
 Do you sleep with your cell phone in
reach?
 Raise your hand if you post pictures
online. Have you ever posted anything
you’ve regretted?
 Raise your hand if you or one of your
friends have ever received a mean text
message.
 Have you ever talked to your parents
about something that bothered you
online?
 Raise your hand if you think your child
knows more about the Internet and
technology than you do.
 Do your kids have their own computers?
Do they have their own cell phones?
 Do you set rules for Internet use? If so,
what are they?
 What are your main concerns about
your children using the Internet?
25
Supporting Documents
 Stop.Think.Connect. brochure, bookmark
and poster included
 CD including Chatting with Kids, Spread
the Word and Heads Up Guides and
PowerPoint presentation
 The PowerPoint presentation may be
customized to suit your needs
 Toolkit materials may also be found on
the Stop.Think.Connect. website
26
If you have been exposed to a cyber threat:
You can report Internet -related frauds, scams and suspicious activity with the following
organizations
 National Center for Missing & Exploited Children – This nonprofit organization has a
Congressionally-mandated Cyber Tipline as a means for reporting crimes against children.
Reports may be made 24-hours a day, 7 days a week online at www.cybertipline.com or by
calling 1-800-843-5678
 Department of Justice (DOJ) – The DOJ’s Computer Crime & Intellectual Property Section
(CCIPS) tells you where to go to report hacking, password trafficking, SPAM, child
exploitation and other Internet harassment. For more information visit
http://www.justice.gov/criminal/cybercrime/
 The Internet Crime Complaint Center (IC3) – The IC3 (http://www.ic3.gov/) is a partnership
between the FBI, the National White Collar Crime Center, and the Bureau of Justice
Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal
complaints related to cyber crime
27
Call to Action
 Cybersecurity is a shared
responsibility
 Visit our website and become a
Friend of the Campaign
 Use our Toolkit materials at your
own cyber safety presentations
 Spread the word about
Stop.Think.Connect. to your peers
28
Remember to Stop.Think.Connect.
Stop
Stop hackers from accessing your accounts- set secure passwords
Stop sharing too much information- keep your personal information personal
Stop- trust your gut, if something doesn’t feel right, stop what you are doing
Think
Think about the information you want to share before you share it
Think how your online actions can affect your offline life
Think before you act- don’t automatically click on links
Connect
Connect over secure networks
Connect with people you know
Connect with care and be on the lookout for potential threats
29
Securing cyberspace
starts with YOU
30
Download