Password Management

advertisement
PASSWORD
MANAGEMENT:
Creating and managing
passwords to be as
secure as possible
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
WHAT’S A PASSWORD?
 A password is a string of characters that gives you access to a
computer or an online account.
COMMON THREATS AGAINST
YOUR PASSWORD
Password cracking is the process of breaking passwords in
order to gain unauthorized access to a computer or account .
Guessing:
Method of gaining access
to an account by
attempting to authenticate
using computers,
dictionaries, or large word
lists.
 Brute force – uses every
possible combination of
characters to retrieve a
password
 Dictionary attack – uses
every word in a dictionary
of common words to
identify the password
Social Engineering/Phishing:
Deceiving users into revealing
their username and
password. (easier than
technical hacking)
 Usually by pretending to be
an IT help desk agent or a
legitimate organization
such as a bank.
 DO NOT EVER SHARE YOUR
PASSWORDS, sensitive
data, or confidential
banking details on sites
accessed through links in
emails.
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
HOW MANY PASSWORDS DO YOU HAVE?
Banking and
Business
services
Personal
Emails
Social media
& news
Work
related
accounts
DON’T FORGET YOUR COMPUTER AND
PHONE LOGINS!
TIERED PASSWORD SYSTEMS
Tiered password systems involve having different levels of
passwords for different types of websites, where the complexity of
the password depends on what the consequences would be if that
password is compromised/obtained.
 Low security: for signing up for a forum, newsletter, or
downloading a trial version for a cer tain program.
 Medium security: for social networking sites, webmail and
instant messaging ser vices.
 High security: for anything where your personal finance is
involved such as banking and credit card accounts . If these are
compromised it could drastically and adversely affect your life .
This may also include your computer login credentials.
Keep in mind that this categorization should be based on how
critical each type of website is to you. What goes in which category
will vary from person to person .
HANDS-ON PART 1: REVIEW AND
CATEGORIZE YOUR PASSWORDS
1. Categorize your passwords into 3 categories: high, medium,
or low. Categorization should be based on how critical each
type of website is to you. Take 5 minutes to categorize some
of your online accounts.
2. Your high security passwords are the most important. Keep
in mind:


You should change any password that is weak.
If you have used any of your passwords for more than 1 site, you
should change.
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
COMMON
MISTAKES IN
CREATING
PASSWORDS
RISK EVALUATION
OF COMMON MISTAKES
Mistake
Example
Risk Evaluation
123456789
password
qwerty
Too risky. These are most criminal’s first guesses, so
don’t use them.
Gladiator
“Bobby”
“Jenny”
“Scruffy”
Too risky: anyone who knows you can easily guess this
information. Basing a password on your social security
number, nicknames, family members’ names, the names
of your favorite books or movies or football team are all
bad ideas.
Using a Short Password
John12
Jim2345
The shorter a password, the more opportunities for
observing, guessing, and cracking it.
Using the same password
everywhere.
Too risky: it’s a single point of failure. If this password is
Using one password on
compromised, or someone finds it, the rest of your
every site or online
accounts – including your sensitive information – are at
service.
risk.
Writing your passwords down.
Very high risk, especially in corporate environments.
Writing your password
Anyone who physically gets the piece of paper or sticky
down on a postit note
note that contains your password can log into your
stuck to your monitor.
account.
Using a Common Password.
Using a Password that is based
on personal data
WHAT MAKES A PASSWORD SAFE?
 Strong passwords:
 are a minimum of 8 characters in length, it’s highly recommended
that it’s 12 characters or more
 contain special characters such as @#$%^& and/or numbers.
 use a variation of upper and lower case letters.
WHAT MAKES A PASSWORD SAFE?
(CONT.)
It must not contain
easily guessed
information such
your birth date,
phone number,
spouse’s name,
pet’s name, kid’s
name, login name,
etc.
It shouldn’t contain
words found in the
dictionary.
HOW TO MAKE A STRONG PASSWORD
 “Treat your password like your
toothbrush. Don’t let anybody
else use it, and get a new one
ever y six months.” ~ Clif ford
Stoll
 The stronger your password, the
more protected your account or
computer is from being
compromised or hacked. You
should make sure you have a
unique and strong password for
each of your accounts.
MOZILLA’S SAFE
PASSWORD METHODOLOGY
1. Pick up a familiar phrase or quote, for example, “May the force
be with you” and then abbreviate it by taking the first letter of
each word, so it becomes “mtfbwy”
2. Add some special characters on either sides of the word to
make it extra strong (like # mtfbwy!)
3. And then associate it with the website by adding a few
characters from the website name into the original password
as either a suffix or prefix. So the new password for Amazon
could become #mtfbwy!AmZ, #mtfbwy!FbK for Facebook and so
on.
*While this technique lets us reuse the phrase -generated part of
the password on a number of different websites, it would still be a
bad idea to use it on a site like a bank account which contains
high-value information. Sites like that deserve their own password
selection phrase.
USING A PASSPHRASE TO WRITE A
SECURE PASSWORD
While generating a password you should follow two rules; Length
and Complexity. Let’s start by using the following sentence: “May
the force be with you”. Let’s turn this phrase into a password.
1. Take the first letter from each word: Mtfbwy.
2. Now increase its strength by adding symbols and numbers:
!20Mtfbwy13!
The 20 and 13 refer to the year, 2013.
Secondly, I put a “!” symbol on each end of the password
Try using the name of your online account in the password





!20Mtfbwy13!Gmail
fb!20Mtfbwy13!
(for gmail)
(for Facebook)
 That’s one password developing strategy. Let’s keep adding
complexity, while also attempting to keep things possible to
memorize. *you actually should not use a should not be a
common phrase.
HAYSTACKING YOUR PASSWORD:
A S I M P LE A N D P OW E RF UL WAY O F S E C URI NG YO UR PA SSWORD
 Password Haystack is a methodology of making your password
extremely dif ficult to brute force by padding the password
with a pattern like (//////) before or/and after your
password.
Here’s how it works:
1. Come up with a password, but try to make it as a mix of uppercase and
lowercase letters, numbers and symbols
2. Come up with a pattern/scheme you can remember, such as the first letter of
each word from an excerpt of your favorite song or a set of symbols like
(…../////)
3. Use this pattern and repeat using it several times (padding your password)
Let’s have an example of this:
Password:
!20Mtfbwy13!
By applying this approach, the password becomes a Haystacked Password:
…../////!20Mtfbwy13!…../////
HANDS-ON PART 2:
TESTING YOUR PASSWORDS
Use these tools to test the strength of a password. As a
precaution, you probably shouldn’t use these services to test
your actual password. Instead, simply use it to learn what works
and what doesn’t work. Just play with the strength checkers by
constructing fake passwords and testing them.
 http://rumkin.com/tools/password/passchk.php
 https://www.microsoft.com/security/pc -security/passwordchecker.aspx
 http://www.grc.com/haystack.htm
 http://howsecureismypassword.net/
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
PASSWORD OVERLOAD: HOW CAN
ANYONE REMEMBER THEM ALL?
Many people use a few passwords for all of
their major accounts.
The average Web user maintains 25 separate
accounts but uses just 6.5 passwords to
protect them.
PASSWORD SECURIT Y
More than
60%
of
people use the same
password across multiple
sites
If one of your accounts is hacked, it’s likely that
your other accounts that used the same
password will quickly follow.
PASSWORD MANAGEMENT TECHNIQUES
(WAYS TO STORE YOU PASSWORDS)
 Human memory is the safest database for storing all your
passwords
 Writing passwords down on a piece of paper
 Storing passwords on a computer in a Word document or Excel
file
 Password Manager is software that allows you to securely
store all of your passwords and keep them safe, typically
using one master password. This kind of software saves an
encrypted password database, which securely stores your
passwords either on your machine or on the Web.
 You should not rely totally on any type of password manager
 Your single master password must be unique and complex
HUMAN MEMORY
 Strength: safest database for storing all your passwords
 Weakness: Easy to forget
WRITING PASSWORDS DOWN
ON A PIECE OF PAPER
 Strength: ease of access
 Weaknesses:
 You can lose the paper
 Paper could be easily stolen or viewed by other people
STORING PASSWORDS ON A COMPUTER
IN A WORD DOCUMENT OR EXCEL FILE
 Strength: ease of access
 Weaknesses:
 Data is not encrypted, anyone who has access to the computer that
the file is saved on can easily read your passwords
 If your computer breaks, you could possibly permanently lose the file
PASSWORD MANAGER IS SOFTWARE
 Password Manager is software that allows you to securely
store all of your passwords and keep them safe, typically
using one master password. This kind of software saves an
encrypted password database, which securely stores your
passwords either on your machine or on the Web.
 You should not rely totally on any type of password manager
 Your single master password must be unique and complex
SO WHICH ONE IS THE BEST?
 Password management tools are really good solutions for reducing the
likelihood that passwords will be compromised, but don’t rely on a single
source. Why? Because any computer or system is vulnerable to attack .
Relying on a password management tool creates a single point of potential
failure.
 But before you turn to a password -management service based in the cloud or on your
PC, it's best to review the quality of the service , said Tim Armstrong, malware
researcher at Kaspersky Lab. He pointed out that you've got to ensure against data
leakage or insecure database practices . "Users must be extra careful in choosing a
provider," Armstrong said. "Make sure they're a valid and reputable vendor .“
 Grant Brunner wrote a fascinating article at ExtremeTech about Staying safe online:
Using a password manager just isn’t enough . In it, he wrote, “using a password
manager for all of your accounts is a ver y sensible idea, but don’t be lulled into a false
sense of security You’re not immune from cracking or downtime.” Broadly speaking,
password managers such as LastPass are like any software: vulnerable to security
breaches. For example, LastPass experienced a security breach in 2011, but users
with strong master passwords were not affected .
 Disadvantage : If you forget the master password, all your other passwords
in the database are lost forever, and there is no way of recovering them.
Don’t forget that password!
KEEPASS
 KeePass is a popular open-source, cross-platform, desktopbased password manager. It is available for Windows, Linux
and Mac OS X as well as mobile operating systems like iOS
and Android. It stores all your passwords in a single database
(or a single file) that is protected and locked with one master
key. The KeePass database is mainly one single file which can
be easily transferred to (or stored on) any computer. Go to the
download page to get your copy.
 KeePass is a local program, but you can make it cloud -based
by syncing the database file using Dropbox, or another service
like it. Check out Justin Pot’s article, Achieve Encrypted Cross Platform Password Syncing With KeePass & Dropbox.
 Make sure you always hit save after making a new entry to the
database!
MOZILLA FIREFOX’S
PASSWORD MANAGER
DO NOT PUT ALL YOUR
EGGS IN ONE BASKET.
 You should never record or write your password down on a post -it note.
 Never share your password with anyone, even your colleagues.
 You have to be ver y careful when using your passwords on public PCs
like schools, universities and libraries…etc. Why? Because there’s a
chance these machines are infected with keyloggers (or keystroke
logging methods) or password -stealing trojan hor ses.
 Do not use any password -saving features such as Google Chrome’s Auto
Fill feature or Microsof t’s Auto Complete feature, especially on public
PCs.
 Do not fill any form on the Web with your per sonal information unless
you know you can trust it. Nowadays, the Internet is full of fraudulent
websites, so you have to be aware of phishing attempts.
 Use a trusted and secure browser such as Mozilla Firefox. Firefox
patches hundreds of security updates and makes significant
improvements just to protect you from malware, phishing attempts,
other security threats, and to keep you safe as you browse the Web .
PWNEDLIST
 This free tool helps users
figure out if their account
credentials have been
hacked. If you go to the
website of the service, you
will see up-to-date statistics
of the number of leaked
credentials, passwords and
email addresses.
 PwnedList keeps
monitoring (or crawling) the
Web in order to find stolen
data posted by hackers on
the public sites and then
indexes all the login
information it finds.
POINTS TO REMEMBER
 ALWAYS use a mix of uppercase and lowercase letters along
with numbers and special characters.
 Have a dif ferent strong password for each site, account,
computer etc., and DO NOT have any personal information like
your name or birth details in your password.
 DO NOT share any of your passwords or your sensitive data
with anyone – even your colleagues or the helpdesk agent in
your company. In addition, use your passwords carefully,
especially in public PCs. Don’t be a victim of shoulder surfing.
 Last recommendation that we strongly encourage is for you to
start evaluating your passwords, building your tiered password
system, alternating your ways of creating passwords and
storing them using password managers.
HANDS-ON PART 3:
MANAGING YOUR PASSWORDS
1. Decide which methods you plan to store each password.
2. Download and practice using KeePass
3. Check your primary emails on PwnedList.com/
TABLE OF CONTENTS
1. The scale of consumer cyber crime
2. What is a password and facts about password security and
its importance
3. Tiered password system - review and categorize your
existing passwords
4. Writing secure passwords



Characteristic of strong and weak passwords
Tips and techniques
Testing the strength of a password
5. Password management techniques
6. Additional tips to secure your identity
ADDITIONAL TIPS TO
SECURE YOUR IDENTIT Y
 Open Wi-fi connection can be easily hacked using a free
packet snif fer software
 Always enable “HTTPS” (also called secure HTTP) settings in
all online services that support it – this includes Twitter,
Google, Facebook and more .
 Spoofed Website
INTERNET CRIME PREVENTION TIPS
FROM THE INTERNET CRIME COMPLAINT CENTER (IC3). IC3 IS A PARTNERSHIP BETWEEN THE FEDERAL
BUREAU OF INVESTIGATION AND THE NATIONAL WHITE COLLAR CRIME CENTER.
 I n te r n et c r i m e s c h e m e s t h a t s te a l m i l l io n s o f d o l l a r s e a c h ye a r f r o m v i c t i ms
c o n t i n ue to p l a g ue t h e I n te r n et t h r o u g h v a r i o us m et h o d s . Fo l l ow in g a r e p r ev e n t a t i ve
m e a s u r e s t h a t w i l l a s s i s t yo u i n b e i n g i n f o r m e d p r i o r to e n te r i n g i n to t r a n s a c t i o n s
o v e r t h e I n te r n et :
 A u c t i o n Fr a u d
 C o u n ter fe i t C a s h i e r ' s C h e c k
 C r e d i t C a r d Fr a u d
 D e b t E l i m i n a t io n
 DHL/UPS
 E m p l oy me n t / B us i n e s s O p p o r t un i t ie s
 E s c r ow S e r v i c e s Fr a u d
 Identity Theft
 I n te r n et E x to r t io n
 I nv e s t m e n t Fr a u d
 L o t te r i e s
 N i g e r i a n L et te r o r " 41 9 "
 P h i s h i n g / S p o o fi n g
 Po n z i /Py r a m i d
 Re s h i p p i n g
 Spam
 T h i r d P a r t y Re c e i v e r o f Fu n d s
ONLINE CRIME PREVENTION
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
Au c t io n Fr a ud
 B e fo re yo u bi d, c o n t a c t t h e s e ller
w i t h a ny q ue s t ions yo u h ave .
 Rev i ew t h e s e lle r's fe e dba c k .
 B e c a ut i o us w h e n de a l ing w i t h
i n di vidua ls o ut s i de o f yo ur ow n
c o un t r y.
 E n s ure yo u un de r s t a nd re fun d,
ret urn , a n d wa rra n t y po l i c ies.
 D ete rm in e th e s h ippin g c h a rg es
be fo re yo u buy.
 B e wa r y i f t h e s e ller o n l y a c c e pt s
w i re t ra n s fer s o r c a s h .
 If a n e s c row s e r vic e i s us e d, e n s ure
i t i s l e git imate .
 Co n sider i n s uring yo ur i te m .
 B e c a ut i o us o f un s o lic ited o f fe r s .
C o u n ter feit C a s h ier's C h e c k
 In s pe c t t h e c a s h ier's c h e c k .
 E n s ure t h e a m o unt o f t h e c h e c k
m a t c h es i n fi g ure s a n d wo rds .
 C h e c k to s e e t h a t t h e a c c o un t
n um be r i s n ot s h i ny i n a ppe a ra n c e.
 B e wa t c h ful t h a t t h e drawe r' s
s i g nat ure i s n ot t ra c e d.
 O f fi c i al c h e c ks a re g e n e rally
pe r fo ra te d o n a t l e a st o n e s i de .
 In s pe c t t h e c h e c k fo r a ddi t i ons,
de l et ions, o r ot h e r a l te ra tions.
 C o n t a c t t h e fi n a n cial i n s tit ut i on o n
w h i c h t h e c h e c k wa s draw n to
e n s ure l e g it imac y.
 O bt a i n t h e ba n k ' s te l e ph one
n um be r fro m a re l ia ble s o urc e , n ot
fro m t h e c h e c k i ts elf.
 B e c a ut i o us w h e n de a l ing w i t h
i n di vidua ls o ut s i de o f yo ur ow n
c o un t r y.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
C r e d i t C a r d Fr a u d
 E n s u r e a s i te i s s e c u r e a n d r e p u t a b l e
b e fo r e p r ov i d i n g yo u r c r e d i t c a r d
number online.
 D o n ' t t r u s t a s i te j u s t b e c a u s e i t c l a i m s
to b e s e c u r e .
 If purchasing merchandise, ensure it is
from a reputable source.
 Promptly reconcile credit card
s t a te m e n t s to av o i d u n a u t h o r i z e d
charges.
 D o yo u r r e s e a r c h to e n s u r e l e g i t i m a c y
o f t h e i n d i v i d u a l o r c o m p a ny.
 B e wa r e o f p r ov i d i n g c r e d i t c a r d
information when requested through
unsolicited emails.
Debt Elimination
 K n ow w h o yo u a r e d o i n g b u s i n e s s w i t h
— d o yo u r r e s e a r c h .
 Obtain the name, address, and
te l e p h o n e n u m b e r o f t h e i n d i v i d u a l o r
c o m p a ny.
 Re s e a r c h t h e i n d i v i d u a l o r c o m p a ny to
e n s u r e t h ey a r e a u t h e n t i c .
 C o n t a c t t h e B e t te r B u s i n e s s B u r e a u to
d e te r m i n e t h e l e g i t i m a c y o f t h e
c o m p a ny.
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r o w n c o u n t r y.
 E n s u r e yo u u n d e r s t a n d a l l te r m s a n d
c o n d i t i o n s o f a ny a g r e e m e n t .
 B e wa r y o f b u s i n e s s e s t h a t o p e r a te
f r o m P. O . b ox e s o r m a i l d r o p s .
 A s k fo r n a m e s o f o t h e r c u s to m e r s o f
t h e i n d i v i d u a l o r c o m p a ny a n d c o n t a c t
them.
 I f i t s o u n d s to o g o o d to b e t r u e , i t
probably is.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
DHL/UPS
 B e wa r e o f i n d i v i d u a l s u s i n g t h e D H L o r
U P S l o g o i n a ny e m a i l c o m m u n i c a t i o n .
 B e s u s p i c i o u s w h e n p ay m e n t i s
r e q u e s t e d by m o n ey t r a n s fe r b e fo r e t h e
goods will be delivered.
 Re m e m b e r t h a t D H L a n d U P S d o n ot
g e n e r a l l y g e t i nv o l v e d i n d i r e c t l y
c o l l e c t i n g p ay m e n t f r o m c u s to m e r s .
 Fe e s a s s o c i a t e d w i t h D H L o r U P S
t r a n s a c t i o n s a r e o n l y fo r s h i p p i n g c o s t s
a n d n e v e r fo r ot h e r c o s t s a s s o c i a t e d
with online transactions.
 C o n t a c t D H L o r U P S to c o n fi r m t h e
authenticity of email communications
received.
E m p l oy m e n t / B u s i n e s s O p p o r t u n i t i e s
 B e wa r y o f i n fl a t e d c l a i m s o f p r o d u c t
e f fe c t i v e n e s s .
 Be cautious of exaggerated claims of
possible earnings or profits.
 B e wa r e w h e n m o n ey i s r e q u i r e d u p f r o n t
fo r i n s t r u c t i o n s o r p r o d u c t s .
 Be leer y when the job posting claims
"no experience necessar y".
 D o n ot g i v e yo u r s o c i a l s e c u r i t y n u m b e r
w h e n fi r s t i n te r a c t i n g w i t h yo u r
p r o s p e c t i v e e m p l oye r.
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r o w n c o u n t r y.
 B e wa r y w h e n r e p l y i n g to u n s o l i c i t e d
e m a i l s fo r wo r k - a t - h o m e e m p l oy m e n t .
 Re s e a r c h t h e c o m p a ny to e n s u r e t h ey
are authentic.
 C o n t a c t t h e B e t te r B u s i n e s s B u r e a u to
d e te r m i n e t h e l e g i t i m a c y o f t h e
c o m p a ny.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
E s c r o w S e r v i c e s Fr a u d
 A l way s t y p e i n t h e we b s i t e a d d r e s s
yo u r s e l f r a t h e r t h a n c l i c k i n g o n a l i n k
provided.
 A l e g i t i m a t e we b s i te w i l l b e u n i q u e a n d
w i l l n o t d u p l i c a t e t h e wo r k o f ot h e r
companies.
 B e c a u t i o u s w h e n a s i te r e q u e s t s
p ay m e n t to a n " a g e n t " , i n s te a d o f a
c o r p o r a t e e n t i t y.
 B e l e e r y o f e s c r ow s i te s t h a t o n l y
a c c e p t w i r e t r a n s fe r s o r e - c u r r e n c y.
 B e wa t c h f u l o f s p e l l i n g e r r o r s , g r a m m a r
p r o b l e m s , o r i n c o n s i s t e n t i n fo r m a t i o n .
 B e wa r e o f s i te s t h a t h av e e s c r ow fe e s
t h a t a r e u n r e a s o n a b l y l ow.
Identity Theft
 E n s u r e we b s i t e s a r e s e c u r e p r i o r to
s u b m i t t i n g yo u r c r e d i t c a r d n u m b e r.
 D o yo u r h o m e wo r k to e n s u r e t h e
b u s i n e s s o r we b s i t e i s l e g i t i m a t e .
 At te m p t to o b t a i n a p hy s i c a l a d d r e s s ,
r a t h e r t h a n a P. O . b o x o r m a i l d r o p .
 N e v e r t h r ow away c r e d i t c a r d o r b a n k
s t a te m e n t s i n u s a b l e f o r m .
 B e awa r e o f m i s s e d b i l l s w h i c h c o u l d
i n d i c a t e yo u r a c c o u n t h a s b e e n t a ke n
ov e r.
 B e c a u t i o u s o f s c a m s r e q u i r i n g yo u to
p r ov i d e yo u r p e r s o n a l i n f o r m a t i o n .
 N e v e r g i v e yo u r c r e d i t c a r d n u m b e r o v e r
t h e p h o n e u n l e s s yo u m a ke t h e c a l l .
 M o n i to r yo u r c r e d i t s t a te m e n t s m o n t h l y
fo r a ny f r a u d u l e n t a c t i v i t y.
 Re p o r t u n a u t h o r i z e d t r a n s a c t i o n s to
yo u r b a n k o r c r e d i t c a r d c o m p a ny a s
soon as possible.
 Re v i e w a c o py o f yo u r c r e d i t r e p o r t a t
l e a s t o n c e a ye a r.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
Internet Extor tion
 S e c u r i t y n e e d s to b e m u l t i - l ay e r e d s o
that numerous obstacles will be in the
way o f t h e i n t r u d e r.
 Ensure security is installed at ever y
possible entr y point.
 I d e n t i f y a l l m a c h i n e s c o n n e c t e d to t h e
I n te r n e t a n d a s s e s s t h e d e fe n s e t h a t ' s
engaged.
 I d e n t i f y w h e t h e r yo u r s e r v e r s a r e
u t i l i z i n g a ny p o r t s t h a t h av e b e e n
k n ow n to r e p r e s e n t i n s e c u r i t i e s .
 E n s u r e yo u a r e u t i l i z i n g t h e m o s t u p - to d a te p a t c h e s fo r yo u r s o f t wa r e .
I n v e s t m e n t Fr a u d
 I f t h e " o p p o r t u n i t y " a p p e a r s to o g o o d to
be true, it probably is.
 B e wa r e o f p r o m i s e s to m a ke f a s t
p r o fi t s .
 D o n ot i nv e s t i n a ny t h i n g u n l e s s yo u
understand the deal.
 D o n ' t a s s u m e a c o m p a ny i s l e g i t i m a t e
b a s e d o n " a p p e a r a n c e " o f t h e w e b s i te .
 B e l e e r y w h e n r e s p o n d i n g to i nv e s m e n t
o f fe r s r e c e i v e d t h r o u g h u n s o l i c i t e d
email.
 B e wa r y o f i nv e s t m e n t s t h a t o f f e r h i g h
returns at little or no risk.
 I n d e p e n d e n t l y v e r i f y t h e te r m s o f a ny
i nv e s t m e n t t h a t yo u i n te n d to m a ke .
 Re s e a r c h t h e p a r t i e s i nv o l v e d a n d t h e
n a t u r e o f t h e i nv e s t m e n t .
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r o w n c o u n t r y.
 C o n t a c t t h e B e t te r B u s i n e s s B u r e a u to
d e te r m i n e t h e l e g i t i m a c y o f t h e
c o m p a ny.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
Lotteries
 I f t h e l o t te r y w i n n i n g s a p p e a r to o g o o d
to b e t r u e , t h ey p r o b a b l y a r e .
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r ow n c o u n t r y.
 B e l e e r y i f yo u d o n ot r e m e m b e r
e n te r i n g a l ot te r y o r c o n te s t .
 B e c a u t i o u s i f yo u r e c e i v e a te l e p h o n e
c a l l s t a t i n g yo u a r e t h e w i n n e r i n a
l o t te r y.
 B e wa r e o f l ot te r i e s t h a t c h a r g e a fe e
p r i o r to d e l i ve r y o f yo u r p r i z e .
 B e wa r y o f d e m a n d s to s e n d a d d i t i o n a l
m o n ey to b e e l i g i b l e fo r f u t u r e
winnings.
 I t i s a v i o l a t i o n o f fe d e r a l l aw to p l ay a
f o r e i g n l ot te r y v i a m a i l o r p h o n e .
N i g e r i a n L e t t e r o r " 41 9 “
 I f t h e " o p p o r t u n i t y " a p p e a r s to o g o o d
to b e t r u e , i t p r o b a b l y i s .
 D o n ot r e p l y to e m a i l s a s k i n g f o r
personal banking information.
 B e wa r y o f i n d i v i d u a l s r e p r e s e n t i n g
t h e m s e l v e s a s fo r e i g n g o v e r n m e n t
o f fi c i a l s .
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r o w n c o u n t r y.
 B e wa r e w h e n a s ke d to a s s i s t i n p l a c i n g
l a r g e s u m s o f m o n ey i n ov e r s e a s b a n k
accounts.
 D o n ot b e l i e v e t h e p r o m i s e o f l a r g e
s u m s o f m o n ey fo r yo u r c o o p e r a t i o n .
 G u a r d yo u r a c c o u n t i n f o r m a t i o n
c a r e f u l l y.
 Be cautious when additional fees are
r e q u e s t e d to f u r t h e r t h e t r a n s a c t i o n .
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
P h is hing/ S po o fin g
 B e s us pi c ious o f a ny un s o licite d
e m a il re q ue s t ing pe r s o nal
i n fo rmat ion.
 Avoid fi l lin g o ut fo rm s i n e m a il
m e ssa ges t h a t a s k fo r pe r s o nal
i n fo rmat ion.
 Al way s c o m pa re t h e l i nk i n t h e
e m a il to t h e l i n k t h a t yo u a re
a c t ua l ly di re c te d to .
 Lo g o n to t h e o f fi c i al we bs i te ,
i n s tead o f " l i nking" to i t fro m a n
un s o licite d e m a il.
 Co n t a c t t h e a c t ua l bus i n ess t h a t
s uppo s edly s e n t t h e e m a il to ve ri fy
i f t h e e m a il i s g e n ui ne.
Po n z i/ P y ramid
 If t h e " o ppo r t un i t y" a ppe a r s to o
g o o d to be t rue , i t pro ba bl y i s .
 B ewa re o f pro m i ses to m a ke fa s t
pro fi t s .
 E xe rc i se di l ig enc e i n s e l ec t ing
i nvest ment s.
 B e v i g ila nt i n re s e a rc hing w i t h
w h o m yo u c h o ose to i nvest .
 M a ke s ure yo u ful l y un de r s ta nd th e
i nvest ment pri o r to i nvest ing.
 B e wa r y w h e n yo u a re re q ui re d to
bri n g i n s ubs e quen t i nvestor s.
 In de pe n dent ly ve rify t h e l e g it ima cy
o f a ny i nvest ment .
 B ewa re o f re fe re n ces g i ve n by t h e
pro m ote r.
ONLINE CRIME PREVENTION (CONT.)
I F T H E " O P P O R T U N I T Y " A P P E A R S T O O G O O D T O B E T R U E , I T P R O B A B LY I S .
Reshipping
 B e c a u t i o u s i f yo u a r e a s ke d to s h i p
p a c ka g e s to a n " ove r s e a s h o m e o f fi c e . "
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r ow n c o u n t r y.
 B e l e e r y i f t h e i n d i v i d u a l s t a te s t h a t h i s
c o u n t r y w i l l n ot a l l ow d i r e c t b u s i n e s s
s h i p m e n t s f r o m t h e U n i te d S t a te s .
 B e wa r y i f t h e " s h i p to " a d d r e s s i s yo u r s
b u t t h e n a m e o n t h e p a c ka g e i s n ot .
 N e v e r p r ov i d e yo u r p e r s o n a l i n fo r m a t i o n
to s t r a n g e r s i n a c h a t r o o m .
 D o n ' t a c c e p t p a c ka g e s t h a t yo u d i d n ' t
o r d e r.
 I f yo u r e c e i v e p a c ka g e s t h a t yo u d i d n ' t
o r d e r, e i t h e r r e f u s e t h e m u p o n d e l i v e r y
o r c o n t a c t t h e c o m p a ny w h e r e t h e
p a c ka g e i s f r o m .
Spam
 D o n ' t o p e n s p a m . D e l e te i t u n r e a d .
 N e v e r r e s p o n d to s p a m a s t h i s w i l l
c o n fi r m to t h e s e n d e r t h a t i t i s a " l i v e "
email address.
 H av e a p r i m a r y a n d s e c o n d a r y e m a i l
a d d r e s s - o n e fo r p e o p l e yo u k n o w a n d
o n e fo r a l l ot h e r p u r p o s e s .
 Av o i d g i v i n g o u t yo u r e m a i l a d d r e s s
u n l e s s yo u k n ow h o w i t w i l l b e u s e d .
 N e v e r p u r c h a s e a ny t h i n g a d v e r t i s e d
through an unsolicited email.
T h i r d P a r t y R e c e i v e r o f Fu n d s
 D o n ot a g r e e to a c c e p t a n d w i r e
p ay m e n t s fo r a u c t i o n s t h a t yo u d i d n o t
post.
 B e l e e r y i f t h e i n d i v i d u a l s t a te s t h a t h i s
c o u n t r y m a ke s r e c e i v i n g t h e s e t y p e o f
f u n d s d i f fi c u l t .
 Be cautious when the job posting
claims "no experience necessar y".
 Be cautious when dealing with
i n d i v i d u a l s o u t s i d e o f yo u r o w n c o u n t r y.
REFERENCES
 Al-Marhoon, M. (n.d.). Password Management Guide.
MakeUseOf. Retrieved April 10, 2013, from
http://www.makeuseof.com/pages/the -passwordmanagement-guide-fulltext
 http://www.slideshare.net/NortonOnline/2012 -nortoncybercrime-report-14207489
 http://www.ic3.gov/media/annualreports.aspx
Download