Professional Documents
Culture Documents
CYBERSECURITY AWARENESS
MONTH 2021
What Is
Cybersecurity
Awareness Month?
Cybersecurity Awareness
Month raises awareness
about the importance of
cybersecurity across
our Nation.
Did You Know?
Antivirus software is available for
Cybersecurity “So What?” mobile devices, which are an easy,
common target for hackers and
other bad actors.
3
Do Your Part.
#BeCyberSmart
Cybersecurity starts with
YOU and is everyone’s
responsibility. There are currently an estimated
5.2 billion internet users or
63% of the world’s population.
4
CYBERCRIME
What is it?
Cybercrime is any crime which is committed
electronically.
This can include…
Examples
Theft
Identity theft
Fraud
Child sexual abuse materials
Sometimes even murder
Financial theft
Intellectual property violations Why should you care?
Malware Crime is a danger offline and on!
Malicious social engineering
Cyber self-defense basics can go a long way to
keeping you and your data out of the hands of
bad actors.
5
MALWARE
What is it?
Any software intended to…
Damage
Disable
Examples
Or give someone unauthorized access to your
Ransomware computer or other internet-connected device
Adware
Botnets Why should you care?
Rootkits Most cybercrime begins with some sort of
Spyware malware. You, your family, and your personal
Viruses information is almost certainly at risk if malware
Worms finds its way onto your computer or devices.
6
RANSOMWARE
What is it?
Malware designed to make data or hardware
inaccessible to the victim until a ransom is paid.
Examples
Cryptolocker Why should you care?
Winlock Often downloaded as malicious email links
Cryptowall
Damage to both financial stability and
Reveton reputation
Bad rabbit
No guarantee that you will get your data back,
Crysis even if you pay
Wannacry
Often used as a decoy for other malicious
activity
7
BOTS
What is it?
Bots are a type of program used for automating
tasks on the internet.
8
PHYSICAL CYBER ATTACKS
What is it?
Physical cyber attacks use hardware, external storage
devices, or other physical attack vectors to infect, damage, or
otherwise compromise digital systems. This can include…
Did You Know? USB storage devices
CD/DVD
Anything connected to the
Internet of Things (IoT)
internet is potentially
vulnerable, from e- Why should you care?
scooters to laptops to Easy to overlook
cargo ships. Difficult to identify and detect
Extremely difficult to remove
Can do anything from installing ransomware, to sending
copies of or modifying information systems, to
dismantling networks
9
SOCIAL ENGINEERING
What is it?
Cybercriminals can take advantage of you by using
information commonly available through…
Social media platforms
Examples Location sharing
Phishing In-person conversations
Pretexting
Baiting
Why should you care?
Quid pro quo Your privacy isn’t just a luxury – it’s a security
measure
Tailgating
Attacks can be successful with little to no
Inside job programming knowledge or ability
Swatting Technological security measures can only protect
you so much – you are your best defense
10
PHISHING
What is it?
Fake messages from a seemingly trusted or reputable
source designed to convince you to…
Reveal information
Examples
Give unauthorized access to a system
Emails
Text messages Click on a link
Phone calls Commit to a financial transaction
Social media messages
and posts
Why should you care?
Suspicious hyperlinks Extremely common
Can have severe consequences
Devil‘s in the details
11
From Legitimate-Looking-Source@notquiteyourworkemail.com
Would This Subject Ugent IT Update: Software Vulnerability
Email Fool You? Software Update
REPLY
12
SWATTING
What is it?
An attack centered around location sharing in which bad actors
call the police claiming the victim has committed a crime…
Bomb Threat
Examples Armed Intruder
Your location is embedded Violent Incident
as metadata in every
picture you take with your Why should you care?
phone. Turn location Physical and immediate consequences
services off when you aren’t Sometimes was intended merely as a prank
using them to make it more Arrest and serious injury can result
difficult for bad actors to Reduce risk by sharing your location only with trusted
view this information. individuals, and share vacation photos only after you’ve
returned safely home
13
OTHER AVENUES OF ATTACK
What is it?
Internet of everything
Any device connected to your network
Information collection
Examples Remote access
Smart devices Bluetooth
Open ports
Mobile phone
Thermostat Why should you care?
Vehicles Your network can be used to attack someone else
Gaming consoles Any device that stores information or is connected
Printers to the internet can be a vulnerability
Medical equipment Assume that you are vulnerable, and take measures
to understand and mitigate risk
Industrial systems Don‘t be the “low-hanging fruit”
14
How Can You Better
Protect Yourself Online?
15
****** Use different passwords on different
systems and accounts
Password Tips
****** Use the longest password allowed
Did You Know?
Password or credential stuffing is a
cyberattack that tries “stuffing” ****** Use a mix of uppercase and lowercase
already comprised username and letter, numbers, and symbols
passwords from one site into
another site in hopes that the user ****** Reset your password every few months
uses the same login information
across platforms.
****** Use a password manager
16
Cybersecurity
Awareness
Month Theme
Theme:
Do Your Part.
#BeCyberSmart.
17
Cybersecurity Awareness Month 2021 Schedule
18
Week 1:
Be Cyber Smart.
19
Week 2:
Fight the Phish!
20
Week 3:
Explore.
Experience.
Share.
Cybersecurity
Career Awareness
Week
21
Week 4:
Cybersecurity
First.
22
Raise Awareness Become a Cybersecurity Month Champion
Visit cisa.gov/cybersecurity-awareness-month or
staysafeonline.org/cybersecurity-awareness-month/
for more resources.
24