SlideShare a Scribd company logo
Cyber Security Seminar
“It Will Never Happen To
Me”
What is Cyber Crime
Webopedia Definition
• Cyber crime encompasses any criminal act dealing with computers and
networks(called hacking)
• Additionally, cyber crime also includes traditional crimes conducted
through the internet
• For example; hate crimes, telemarketing and Internet fraud, identity
theft,
• Credit card account thefts are considered to be cyber crimes when the
illegal activities are committed through the use of a computer and the
Internet.
Cyber Crime Statistics
*Crime rate in England and Wales soars as cybercrime is included
for first time
• The sharp rise in the headline figures is due to the inclusion of an
estimated 5.1m online fraud incidents and 2.5m cybercrime offences for
the first time
• The detailed figures for online fraud show 14% of victims lost less than
£20, 27% lost less than £100 and a further 37% lost less than £500. One
per cent lost more than £5,000.
• The virus or malware, known as Dridex netted criminals £20m in funds
from UK Banks in 1 heist
• Report also stated is was reported to have netted over $100m worldwide
What is Ransomware
• Ransomware is a strain of malware (malicious software) that encrypts or
locks all of the files on your computer or server, and then demands a
payment (or ransom) to unlock your files.
• It takes many forms, including its most infamous incarnation,
Cryptolocker.
• Other strains include Locky, Teslacrypt, and Cryptowall.
• In some instances, ransomware’s presence can be betrayed by a .EXE
file extension - but cyber criminals are getting more and more
sophisticated, so this often isn’t the case.
How Does Ransomware Spread ?
• Like many viruses, the most common source of infection is from emails,
when a user opens contaminated attachments or clicks a malicious link.
However, there are many other sources, like rogue USB sticks, or even
joining free WiFi networks.
How can I Remove it ?
• Unfortunately, there’s no sure-fire way to remove Ransomware.
• Even paying up doesn’t always work; criminals have been known to ask
for higher and higher sums, or claim to have lost the ‘key’.
• The best approach is to access your backups.
What can I do to avoid Ransomware?
• There are three major forms of protection:
• Preventative measures,
• Anti-virus & backup.
• Preventative measures are the first lines of defence against Ransomware:
education can ensure that staff are aware of the risks and know what to
look out for, and changing system permissions can lower the risk of
infection.
• Anti-virus is a must for all businesses, and can detect and deflect a high
percentage of attacks.
What can I do to avoid Ransomware? Cont’d
• However, due to the ever-changing nature of Ransomware, these steps
aren’t 100% effective. That’s when you need a backup and business
continuity solution. This allows you to roll back to a point prior to infection.
Who would want to hack us ?
• What have we got that can't be found elsewhere more easily
• Credit/Debit Card Details
• Online Account Details such as Pay Pal
• Scanning of passports or credit cards
Who would want to hack us ?
• There are basic kinds of phishing
• Blanket
• Spear Phishing
• Whaling
Types of attacks?
Example of Social Engineering
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
Example of Blanket Attack
• They will ring you up to inform you , “you have an issue with Internet Traffic from
your connection “ you may have spyware
• Call reference you Credit Card being used
• Scammers who pretend to be tech support from Microsoft
Tech Support Scammers
• Crypto Locker , CryptoDefense and CryptoWall
• 5 Stages of Crypto Ransomware
1. Installation
2. Contacting Headquarters
3. Hand Shake and Keys
4. Encryption
5. Extortion
Most Commonly known attack !
• You don’t get calls from your Bank about the Balance in your account
• You don’t get phone calls from Microsoft Technical Support or other support
agents
• You don’t get emails from HMRC “ You are owed credit and to contact them”
• You probably don’t have a long lost Relative in the Congo who has Millions that
they need you to hold for them just short term
• Passwords should be changed regularly and not use common ones
How Do we Protect Ourselves
Educating our users on the Do’s and Don'ts is a Major factor in
reducing he impact to your Business

More Related Content

PPTX
Cyber Security 03
PPTX
PPTX
CyberSecurity
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber Crime and Cyber Security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cyber security presentation
PPTX
Cyber crime & security
Cyber Security 03
CyberSecurity
Cyber crime-140128140443-phpapp02 (1)
Cyber Crime and Cyber Security
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber security presentation
Cyber crime & security

What's hot (20)

PPT
Cyber Crime and Security
PPTX
Cyber crime and security
PPTX
CYBER SECURITY
PPTX
Cybercrime and Security
PPTX
Introduction to cyber security amos
PDF
Cyber security
ODP
Cyber security awareness
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber Security in Society
PPTX
Social engineering
PPTX
Introduction to cyber security
PPTX
Cyber security presentation
DOC
Cybersecurity
PPTX
Cyber security system presentation
PPTX
Cyber security
PPTX
Cyber threats
PPT
PPTX
Cyber security
PPTX
Cyber crime and security
PPTX
Cyber security
Cyber Crime and Security
Cyber crime and security
CYBER SECURITY
Cybercrime and Security
Introduction to cyber security amos
Cyber security
Cyber security awareness
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber Security in Society
Social engineering
Introduction to cyber security
Cyber security presentation
Cybersecurity
Cyber security system presentation
Cyber security
Cyber threats
Cyber security
Cyber crime and security
Cyber security
Ad

Viewers also liked (20)

PPTX
Cyber security presentation
PPTX
Cyber crime and security ppt
PPTX
Cyber crime ppt
PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
PPT
Introduction to Cyber Security
PPTX
Cybercrime.ppt
PPTX
Cyber-crime PPT
PPTX
Cyber security
PPTX
Cyber security
PPTX
Presentation on Cyber Security
PDF
The Future of Cyber Security - Matthew Rosenquist
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
PDF
Cyber Security_Presentation_KTH
PDF
Securing Mobile & Online Identity in the Cyber World
PDF
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PPTX
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
PPTX
Phising a Threat to Network Security
PDF
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
PPTX
Cyber crime and security
PDF
Cyber crime
Cyber security presentation
Cyber crime and security ppt
Cyber crime ppt
NACCTFO Cyber Security Presentation 2014 New Orleans
Introduction to Cyber Security
Cybercrime.ppt
Cyber-crime PPT
Cyber security
Cyber security
Presentation on Cyber Security
The Future of Cyber Security - Matthew Rosenquist
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Cyber Security_Presentation_KTH
Securing Mobile & Online Identity in the Cyber World
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Phising a Threat to Network Security
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
Cyber crime and security
Cyber crime
Ad

Similar to Cyber Security Presentation "It Will Never Happen To Me" (20)

PDF
NCERT Ransomeware and malware attacks.pdf
PPTX
Web Security.pptx
PPTX
Introduction to intelligence cybersecurity_3
PPT
Cyber-Security-CIT good for 1st year engineering students
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPTX
2nd Class PPT.pptx
PDF
Cyber Security Guide
PPT
Cyber Security-Foundation.ppt
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PDF
fundamentals of Cybersecurity Lesion 1.pdf
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PDF
Ransomware ly
PDF
Ransomeware : A High Profile Attack
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPT
Cyber-Security-20211013105857.ppt
PPTX
Ransomeware and malware power point presentation
PPT
Cyber-Security.ppt
PDF
Cybercrime - An essential guide from Thawte
PDF
Information cyber security
PDF
Information & cyber security, Winter training ,bsnl. online
NCERT Ransomeware and malware attacks.pdf
Web Security.pptx
Introduction to intelligence cybersecurity_3
Cyber-Security-CIT good for 1st year engineering students
Guest Lecture-Computer and Cyber Security.pptx
2nd Class PPT.pptx
Cyber Security Guide
Cyber Security-Foundation.ppt
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
fundamentals of Cybersecurity Lesion 1.pdf
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware ly
Ransomeware : A High Profile Attack
Week3-CyberSecurity 8th Semester important.pdf
Cyber-Security-20211013105857.ppt
Ransomeware and malware power point presentation
Cyber-Security.ppt
Cybercrime - An essential guide from Thawte
Information cyber security
Information & cyber security, Winter training ,bsnl. online

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Cyber Security Presentation "It Will Never Happen To Me"

  • 1. Cyber Security Seminar “It Will Never Happen To Me”
  • 2. What is Cyber Crime Webopedia Definition • Cyber crime encompasses any criminal act dealing with computers and networks(called hacking) • Additionally, cyber crime also includes traditional crimes conducted through the internet • For example; hate crimes, telemarketing and Internet fraud, identity theft, • Credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 3. Cyber Crime Statistics *Crime rate in England and Wales soars as cybercrime is included for first time • The sharp rise in the headline figures is due to the inclusion of an estimated 5.1m online fraud incidents and 2.5m cybercrime offences for the first time • The detailed figures for online fraud show 14% of victims lost less than £20, 27% lost less than £100 and a further 37% lost less than £500. One per cent lost more than £5,000. • The virus or malware, known as Dridex netted criminals £20m in funds from UK Banks in 1 heist • Report also stated is was reported to have netted over $100m worldwide
  • 4. What is Ransomware • Ransomware is a strain of malware (malicious software) that encrypts or locks all of the files on your computer or server, and then demands a payment (or ransom) to unlock your files. • It takes many forms, including its most infamous incarnation, Cryptolocker. • Other strains include Locky, Teslacrypt, and Cryptowall. • In some instances, ransomware’s presence can be betrayed by a .EXE file extension - but cyber criminals are getting more and more sophisticated, so this often isn’t the case.
  • 5. How Does Ransomware Spread ? • Like many viruses, the most common source of infection is from emails, when a user opens contaminated attachments or clicks a malicious link. However, there are many other sources, like rogue USB sticks, or even joining free WiFi networks. How can I Remove it ? • Unfortunately, there’s no sure-fire way to remove Ransomware. • Even paying up doesn’t always work; criminals have been known to ask for higher and higher sums, or claim to have lost the ‘key’. • The best approach is to access your backups.
  • 6. What can I do to avoid Ransomware? • There are three major forms of protection: • Preventative measures, • Anti-virus & backup. • Preventative measures are the first lines of defence against Ransomware: education can ensure that staff are aware of the risks and know what to look out for, and changing system permissions can lower the risk of infection. • Anti-virus is a must for all businesses, and can detect and deflect a high percentage of attacks.
  • 7. What can I do to avoid Ransomware? Cont’d • However, due to the ever-changing nature of Ransomware, these steps aren’t 100% effective. That’s when you need a backup and business continuity solution. This allows you to roll back to a point prior to infection.
  • 8. Who would want to hack us ?
  • 9. • What have we got that can't be found elsewhere more easily • Credit/Debit Card Details • Online Account Details such as Pay Pal • Scanning of passports or credit cards Who would want to hack us ?
  • 10. • There are basic kinds of phishing • Blanket • Spear Phishing • Whaling Types of attacks?
  • 11. Example of Social Engineering
  • 17. • They will ring you up to inform you , “you have an issue with Internet Traffic from your connection “ you may have spyware • Call reference you Credit Card being used • Scammers who pretend to be tech support from Microsoft Tech Support Scammers
  • 18. • Crypto Locker , CryptoDefense and CryptoWall • 5 Stages of Crypto Ransomware 1. Installation 2. Contacting Headquarters 3. Hand Shake and Keys 4. Encryption 5. Extortion Most Commonly known attack !
  • 19. • You don’t get calls from your Bank about the Balance in your account • You don’t get phone calls from Microsoft Technical Support or other support agents • You don’t get emails from HMRC “ You are owed credit and to contact them” • You probably don’t have a long lost Relative in the Congo who has Millions that they need you to hold for them just short term • Passwords should be changed regularly and not use common ones How Do we Protect Ourselves Educating our users on the Do’s and Don'ts is a Major factor in reducing he impact to your Business