Want to create interactive content? It’s easy in Genially!
Cyber Security 2024-25 School Year
Justin Webb
Created on October 2, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Practical Presentation
View
Smart Presentation
View
Essential Presentation
View
Akihabara Presentation
View
Pastel Color Presentation
View
Modern Presentation
View
Relaxing Presentation
Transcript
Welcome! UHS Students CyberSafety 101
Mr. Webb Director of Technology
Agenda
- Welcome
- Cybersecurity Awareness
- Understanding Cybersecurity Risks
- Protecting Your Credentials
- Password Management
- Recognizing and Avoiding Phishing Scams
- VPNs
- Social Media
- Closing Remarks
History
- History of CyberCrime
History
- CyberCrime is the #1 Crime in the World!
History
- No Longer Networks -
What hat should I be wearing during this presentation?
- How you can be safe in your personal life
- How can you be safe in your professional life
What do you think is the biggest risk in 2024 to a company related to Cyber Security Attacks?
A: IT departments not doing what is needed to protect systems and computers?
B: Companies not investing into Cyber Security tools/utilities and training?
C: Human Error
What do you think is the biggest risk in 2024 to a company related to Cyber Security Attacks?
A: IT departments not doing what is needed to protect systems and computers?
B: Companies not investing into Cyber Security tools/utilities and training?
C: Human Error
Why is Cybersecurity awareness important?
go!
It's not if you'll be hacked.... it's when.
- Robert Mueller - Former FBI Director
Awareness is training is important because....
- Technology alone *cannot* protect you from everything
- Attackers go where security is weakest
- People ----> a link in the chain and the last first line of defense
- Cybersecurity awareness is for ....
- Everyone
But an attacker is not interested in me...
You are exactly what an attacker wants - Why?
Steal Your Identity- Clean Credit to Steal
Your credentials - Send SPAM as you - Gets access to much more - Reset other accounts
Credit Card and financial data
But an attacker is not interested in me...
You are exactly what an attacker wants - Why?
Steal Your Identity- Clean Credit to Steal
Access to internal systems - Gateway to more information
Access to tons of other email addresses
All About Passwords
291 Saved Passwords
Passwords
go!
Managing Passwords
- Keep your passwords in a secure location
- DO NOT use paper or sticky notes
- DO NOT store password in clear-text on your computer
- Utilize a password manager
- Bitwarden
- KeePass
- Chrome
- Apple Keychain
- Benefits of a password manager
- One strong password to access them all
- Passwords are stored securely
- Auto-fill username/passwords on websites
- Sync between devices
Managing Passwords
- Keep your passwords in a secure location
- DO NOT use paper or sticky notes
- DO NOT store password in clear-text on your computer
- Utilize a password manager
- Bitwarden
- KeePass
- Chrome
- Apple Keychain
- Benefits of a password manager
- One strong password to access them all
- Passwords are stored securely
- Auto-fill username/passwords on websites
- Sync between devices
Source: Comparitech
Top 20 Passwords by rank & year
Source: NordPass
Password length <-> time to crack
Time it will take for a hacker to brute force passwords Are you in the Yellow or Green?
Source: Hive Systems
Just a Little Click
go!
Is the link safe in 4 steps
4. Click Does it pass all three tests?Still use caution When in doubt, throw it out!
1. VerifyWere you expecting a link?
- Not just email!
- Social Media
- Text Messages
- Instant Messaging
04
01
03
3. Sniff TestIs it a site you recognize? Does it feel "familiar" to you? Be skeptical
2. Hover Hover over the link to ensure that it leads to where it says it does
02
Phishing Example
Partnership?
Phishing Example
Phishing Example
https://nfpromos.at-us.therelayservice.com/service/nrOVR5_St_sE0wTWOVhJ_yI3-hpbylescTCM5O7iJ2LvbtKBWgD8ecD9duixf_whxH-PmxCaXcPBybBwQsQY8jbdMDsPNJOknZ0FZmQ_Lk5Wq3lqQNhsxv03P-TH7jdrQN-SvD5QGI3TUAMEXkKdKEbzpotuIUozUBbfGyglvnGyIYuRRdkP2Bqs3EE4sYLEEhrUUhlrSkjHDkH8PhkZ7lhbu7DKbSza0CjdrPWqOdszV1P5xkCzZqC0wBdLkrciUiRZSM8eBxLoB24S76yBdFueLPRk_hYAmCUDCNxQ0t5zA2VN4mD64JQWd_eiqxj_A73pLctP-Wvl5csqGUV6Eru9x4LpuJ634tlSibtIXYzCBpVDWhKSfWX041dTFw3V
Phishing Example
https://nfpromos.at-us.therelayservice.com/service/nrOVR5_St_sE0wTWOVhJ_yI3-hpbylescTCM5O7iJ2LvbtKBWgD8ecD9duixf_whxH-PmxCaXcPBybBwQsQY8jbdMDsPNJOknZ0FZmQ_Lk5Wq3lqQNhsxv03P-TH7jdrQN-SvD5QGI3TUAMEXkKdKEbzpotuIUozUBbfGyglvnGyIYuRRdkP2Bqs3EE4sYLEEhrUUhlrSkjHDkH8PhkZ7lhbu7DKbSza0CjdrPWqOdszV1P5xkCzZqC0wBdLkrciUiRZSM8eBxLoB24S76yBdFueLPRk_hYAmCUDCNxQ0t5zA2VN4mD64JQWd_eiqxj_A73pLctP-Wvl5csqGUV6Eru9x4LpuJ634tlSibtIXYzCBpVDWhKSfWX041dTFw3V
12th Grade Class - 319 Students Clicked the Link 11th Grade Class - 261 Students Clicked the Link
Phishing Example
noreply@instant-promos.com
Phishing Example
Phishing Example
noreply@securecommunications.com
Phishing Example
https://musicfest.at-us.therelayservice.com/service/XOSWqebQPfDATJgs_43cVRJ_Ky4MqDVG8UTZ0Km8SSuVwtt3EBXLkUWa4bWcksJUwQxdH7wbpgNBWP_gEeIi3UwPEu6-3qgqzZx6CahchmOoe4mR3kM2aF_Imx-eToL2r4Ki0sA5guu1E8N0EyWZaURM19pPh-ewcrsnAWACi93Ok2sZVLO9SvlP6DPW96W1NfNiTansJN4LOD_yRTp9Utt8DzoQ8PkP1WiVS1tET1LizJQh_eZcbJvicLteRkHDaly5qC-OlDQhsvfhAAVXSJBDWPrBseraAx406ItXlXUbnWXICjbc4nGjXJZ4erPRTuRPyUGTrJl2cr1oDpwY0m45WHYWJnjKVyl5EP62I9w7elM0BnzR3vguQ-mzhXth
Phishing Example
Phishing Example
Phishing Example
12th Grade Class - 328 Students Clicked the Link 11th Grade Class - 326 Students Clicked the Link
Types of Phishing
- Phishing
- Spear Phishing
- Vishing
- Smishing
Phishing
go!
What is Phishing?
Phishing is a type of online scam where cybercriminals try to trick you into giving them your personal information, such as passwords, credit card numbers, or other sensitive data. They often do this by pretending to be someone you trust, like a bank, a popular website, or even a friend.
go!
Emotional Response
Imagine you're checking your email on a typical morning. Among the usual messages, you see an alarming email from your bank. The subject line reads, "Urgent: Your Account Has Been Compromised." Your heart skips a beat. In a panic, you open the email. It looks legitimate, with the bank's logo and professional language, warning you that if you don't act now, you could lose access to your account.
go!
Emotional Response based on the tone of the email
go!
Phishing
go!
Spear Phishing
go!
What is Spear Phishing?
Spear phishing is a more targeted and personalized form of phishing. While regular phishing scams are sent out to large numbers of people, spear phishing focuses on specific individuals or organizations.
go!
go!
Types of Phishing we see today
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
Phishing Example
What is the #1 Emotion used in a Phishing Attack?
What is the #1 Emotion used in a Phishing Attack?
Emotional Response
Vishing
go!
What is Vishing?
Vishing (short for "voice phishing") is a type of scam where cybercriminals use phone calls to trick people into giving away personal information, such as bank details, social security numbers, or passwords. Unlike phishing, which typically uses emails or messages, vishing relies on voice communication.
go!
go!
Smishing
go!
What is Smishing?
Smishing (short for "SMS phishing") – a type of scam where criminals use text messages to trick you into giving away personal information or installing malicious software on your phone.
go!
Social Engineering bypasses all technologies, including firewalls
- Kevin Mitnick
2-Factor OR Multifactor Authentication
go!
🔐 Why Two-Factor Authentication (2FA) Matters
- Extra layer of protection
- Even if someone steals your password, they still can’t get in without your second factor.
- Stops hackers in their tracks
- Most account hacks happen because of weak or reused passwords — 2FA helps block those.
- Helps prevent phishing damage
- If you accidentally click a fake login link and enter your info, 2FA might still save you.
- It’s fast and easy to use
- Usually just a quick text, app notification, or code — worth the few seconds it takes.
- Required by many platforms
- Colleges, banks, and jobs are starting to require 2FA — it's becoming the norm.
🔐 Why Two-Factor Authentication (2FA) Matters
- You’re protecting more than just yourself
- A hacked account could be used to spam or scam classmates, teachers or co-workers.
- Think of it like a second lock on your door
- Would you trust a single lock on your front door? Probably not — your digital life is no different
VPNs & Social Media
go!
⚠️ The Truth About VPNs: What Students Should Know
- Not all VPNs are safe — especially free ones
- Many free VPNs sell your data to third parties to make money.
- False sense of security
- Just because you're using a VPN doesn’t mean you're anonymous or protected from threats like malware or phishing.
- Many VPNs install risky software
- Some include adware or even spyware that can steal your information or slow down your device.
- You might be sharing your data through other countries
- Some VPNs route your traffic through unregulated or unsafe regions, exposing your personal info.
⚠️ The Truth About VPNs: What Students Should Know
- “Free” often means you are the product
- If you're not paying for the service, your data is probably being harvested.
- Fake VPNs exist
- Some apps are labeled as VPNs but are actually just scams or malware in disguise.
- Using VPNs to cheat or hide behavior is traceable
- Tech teams can detect VPN usage patterns, and consequences can follow if it's against policy.
⚠️ The Truth About VPNs: What Students Should Know
💡 Think Before You Post: Social Media & Your Future
- Colleges and employers do check social media
- Admissions officers or hiring managers may search your name to get a sense of your character.
- You are your digital footprint
- What you post (or are tagged in) can follow you forever, even if deleted.
- Private doesn’t always mean private
- Screenshots, reposts, and leaks can make private posts public in seconds.
- Red flags that can hurt opportunities
- Hate speech, bullying, illegal behavior, excessive partying, inappropriate photos, or discriminatory content.
- You represent more than just yourself
- Teams, schools, and organizations can be impacted by your posts.
💡 Think Before You Post: Social Media & Your Future
- Good posts can help you stand out
- Volunteering, accomplishments, leadership, creativity—those things can impress colleges and employers.
- A single post can go viral… for the wrong reason
- Always ask: Would I be okay if this showed up in a college application or job interview?
- Clean up your digital brand
- Google yourself. Review old posts. Untag from things that don’t reflect who you are today.
- Use social media as a portfolio
- Share your passions, hobbies, and achievements to show off the best version of yourself.
💡 Think Before You Post: Social Media & Your Future
What can you do to help yourself?
- Education!
- Be Skeptical
- Use Strong Passwords - Length Matters!
- Use a Password Manager
- Avoid Reusing Passwords
- Verify a Link before clicking
- Use Two Factor Authentication
Thank you!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!
Got an idea?
Use this space to add awesome interactivity. Include text, images, videos, tables, PDFs... even interactive questions! Premium tip: Get information on how your audience interacts with your creation:
- Visit the Analytics settings;
- Activate user tracking;
- Let the communication flow!