Title: National Cybersecurity Awareness Campaign
1National Cybersecurity Awareness Campaign
CyberWatch C3 Conference October 7, 2011
2October is National Cybersecurity Awareness Month
- This year a different critical cybersecurity
issue will be featured each week in October - Week One emphasizes general cybersecurity
awareness with events highlighting the
Stop.Think.Connect. Campaign. - Week Two showcases the urgent need to develop
cyber education programs to train the
next-generation cyber workforce. - Week Three focuses on national and local efforts
to prevent identity theft and other cyber crimes.
- Week Four highlights strategies small- and
medium-sized business owners can use to bolster
their own cybersecurity defenses.
3Stop.Think.Connect. Background
- In May 2009, President Obama issued the
Cyberspace Policy Review, which recommends the
Federal government initiate a national public
awareness and education campaign informed by
previous successful campaigns. - The Stop.Think.Connect. Campaigns overarching
goal is to help Americans understand not only the
risks that come with using the Internet, but also
the importance of practicing safe online behavior
4Stop.Think.Connect. Partners
5Stop.Think.Connect. Public Service Announcement
6Issues Affecting You
7Cyberbullying
8Stop.Think.Connect. Public Service Announcement
9Cyberbullying
- Cyberbullying is bullying that happens online. It
can happen in an email, a text message, an online
game, or on a social networking site. It might
involve rumors or images posted on someones
profile or passed around for other people to see. - Dont stand for bullyingonline or off. Treat
others the way you want to be treatedwhether
youre interacting with them online, on your
phone or in person. - Speak up. If you see something inappropriate on a
social networking site or in a game or chat room,
let the website know and tell an adult you trust.
Using Report Abuse links can help keep sites
fun for everyone. - Tell the bully to stop. Most kids dont bully,
and theres no reason for anyone to put up with
it. This mean behavior usually stops pretty
quickly when somebody stands up for the person
being bullied.
10Cyber Predators
11Cyber Predators
- Cyber predators are people who search online for
other people in order to use, control, or harm
them in some way. - Cyber predators target teens and young adults
both male and female on a regular basis,
regardless of whether or not the victims are 18
or above. - Social networking sites enhance a predators
ability to target young Americans, especially if
they share personal information in their profile. - 91 of young adults say they are social
networking friends with people they dont know
well - Protect yourself and your personal information,
you never know who is behind the screen - Notify your family and the proper authorities
immediately if you are being targeted or
harassed online
Source http//www.staysafeonline.org/sites/defa
ult/files/resource_documents/Cyber20Education205
.3.1120PDF.pdf
12Social Media Tips
- US-CERT suggests ten steps that you can take to
protect yourself on social networks -
- Limit the amount of personal information you post
- Remember that the internet is a public resource
- Be wary of strangers
- Be skeptical Dont believe everything you read
online. - Evaluate your settings dont stick with the
defaults! - Be wary of third-party applications
- Use strong passwords
- Check privacy policies
- Keep software, particularly your web browser, up
to date - Use and maintain anti-virus software
Source The United States Computer Emergency
Readiness Team (US-CERT) www.us-cert.gov
13Identity Theft
14Identity Theft
- Identity theft is the illegal use of someone
else's personal information in order to obtain
money or credit. - Every 3 seconds an identity is stolen- so for the
length of this training session over 2,400
identities may have been stolen. - Every year, 500,000 kids have their identity
stolen. - Here are some simple tips to prevent identity
theft - Dont use the same password twice.
- Choose a password that means someone to you and
you only. - If you have been compromised, report it to the
Federal Trade Commission. - Lock your computer and cell phone.
- Dont share personal information without knowing
exactly who is on the receiving end.
15Stop.Think.Connect. Public Service Announcement
16Fraud Phishing
17Fraud Phishing Tips
- Fraud is the intentional perversion of truth in
order to induce another to part with something of
value or to surrender a legal right. - Phishing is a scam by which an email user is
duped into revealing personal or confidential
information that the scammer can use illicitly or
fraudulently. - Most organizations banks, universities,
companies, etc. - dont ask for your personal
information over email. Beware of requests to
update or confirm your personal information. - Dont open emails from strangers and dont click
on unfamiliar sites if you think an offer is too
good to be true, then it probably is. - Make sure you change your passwords often and
avoid using the same password on multiple sites. - Always enter a URL by hand instead of following
links. - Reporting of suspicious or unsolicited e-mails
from unknown sources is key to preventing and
mitigating the impacts of these attacks. Report
any suspicious emails or links to US-CERT,
Internet Crime Complaint Center, and the Federal
Trade Commission.
18Stop.Think.Connect. Website
www.dhs.gov/ stopthinkconnect
19Toolkit
- Chatting with Kids
- Heads Up
- Spread the Word
- Brochure
- Bookmark
- Poster
- PowerPoint
20Chatting with Kids About Being Online
- Chatting with Kids is a guide that instructs you
how to talk to kids about online safety - The guide also covers hot button issues, such as
sexting and cyberbullying - Use the guide to talk to kids directly or when
you train parents how to talk to their kids.
21Chatting with Kids About Being Online Tips
- Have regular conversations about using the
Internet. - Talk to kids about online manners.
- Ask kids who they are in touch with online and
what sites they visit. - Use parental control options that allow you to
block and filter content, filter outgoing content
and limit kids time online. - Develop computer and cell phone rules, such as no
cell phone use at the dinner table, during
homework or sleeping hours.
22Heads Up Stop.Think.Connect.
- Heads Up is an online safety guide you can hand
out to kids during cyber safety presentations or
within the community at schools, recreation
centers, libraries and other community centers. - Heads Up is designed specifically for kids on how
and why to stay safe online, including a word
search activity. - The guide provides Dos and Donts of online
behavior.
23Heads Up Tips
- Stop before you post something and think about
how you will feel if your family, teachers,
neighbors or coaches see it. - Limit your online friends to people you actually
know. - Speak up if you feel uncomfortable or threated by
something you see online.
- Reply to text, email or pop up messages that ask
you for personal information. - Open attachments or click on links that are
suspicious or come from strangers. - Stand for bullying online or off.
- Post videos or photos of someone without their
approval.
24Spread the Word Community Outreach Guide
- This guide shows you how to use all of the
materials in the Toolkit to give effective
presentations on cyber safety. - It also provides tips on how to get the word out
about Internet safety online and offline. - Spread the word to your family, colleagues, and
communities.
25Ice-Breaker Questions
- Do you sleep with your cell phone in reach?
- Raise your hand if you post pictures online. Have
you ever posted anything youve regretted? - Raise your hand if you or one of your friends
have ever received a mean text message. - Have you ever talked to your parents about
something that bothered you online?
- Raise your hand if you think your child knows
more about the Internet and technology than you
do. - Do your kids have their own computers? Do they
have their own cell phones? - Do you set rules for Internet use? If so, what
are they? - What are your main concerns about your children
using the Internet?
26Supporting Documents
- Stop.Think.Connect. brochure, bookmark and poster
included - CD including Chatting with Kids, Spread the Word
and Heads Up Guides and PowerPoint presentation - The PowerPoint presentation may be customized to
suit your needs - Toolkit materials may also be found on the
Stop.Think.Connect. website
27If you have been exposed to a cyber threat
- You can report Internet -related frauds, scams
and suspicious activity with the following
organizations - National Center for Missing Exploited Children
This nonprofit organization has a
Congressionally-mandated Cyber Tipline as a means
for reporting crimes against children. Reports
may be made 24-hours a day, 7 days a week online
at www.cybertipline.com or by calling
1-800-843-5678 - Department of Justice (DOJ) The DOJs Computer
Crime Intellectual Property Section (CCIPS)
tells you where to go to report hacking, password
trafficking, SPAM, child exploitation and other
Internet harassment. For more information visit
http//www.justice.gov/criminal/cybercrime/ - The Internet Crime Complaint Center (IC3) The
IC3 (http//www.ic3.gov/) is a partnership
between the FBI, the National White Collar Crime
Center, and the Bureau of Justice Assistance,
whose mission is to serve as a vehicle to
receive, develop, and refer criminal complaints
related to cyber crime
28Call to Action
- Cybersecurity is a shared responsibility
- Visit our website and become a Friend of the
Campaign - Use our Toolkit materials at your own cyber
safety presentations - Spread the word about Stop.Think.Connect. to your
peers
29Remember to Stop.Think.Connect.
- Stop
- Stop hackers from accessing your accounts- set
secure passwords - Stop sharing too much information- keep your
personal information personal - Stop- trust your gut, if something doesnt feel
right, stop what you are doing - Think
- Think about the information you want to share
before you share it - Think how your online actions can affect your
offline life - Think before you act- dont automatically click
on links - Connect
- Connect over secure networks
- Connect with people you know
- Connect with care and be on the lookout for
potential threats
30Securing cyberspace starts with YOU