ITC's Cybersecuirty Logo - Chip

Week 4 October 23-27, 2017

@STOPTHNKCONNECT. How do we improve the security culture in our organizations? And our personal lives? Reply to San Juan College’s Facebook page with your suggestions.

TechBeacon defines security culture as “what happens with security when people are left to their own devices. Do they make the right choices when faced with whether to click on a link? Do they know the steps that must be performed to ensure that a new product or offering is secure prior to ship?” *

Video: Cybersecurity Video: It’s a Behavior Change Problem (3:29 minutes)

*TechBeacon blog: 6 ways to develop a security culture from top to bottom

ITC's Cybersecuirty Logo - Chip

Week 3 October 16-20, 2017

@STOPTHNKCONNECT. What advice can you give people to avoid having malware on their devices? Reply to San Juan College’s Facebook page post with your suggestions.

Malware stands for ‘malicious software’. It is any type of code or program cyber attackers use to perform Malware includes viruses, trojans, spyware, adware, works and broser hijackermalicious actions. Traditionally there have been different types of malware based on their capabilities and means of propagation, as we have listed below. However these technical distinctions are no longer relevant as modern malware combines the characteristics from each of these in a single program.

  • Virus: A type of malware that spreads by infecting other files, rather than existing in a standalone manner. Viruses often, though not always, usually spread through human interaction, such as opening an infected file or application.)
  • Worm: A type of malware that can propagate automatically, typically without requiring any human interaction for it to spread. Worms often spread across networks, though can also infect systems through other means, such as USB keys. An example of a worm is Conficker, which infected millions of computer systems starting in 2008 and is still active today.
  • Trojan: A shortened form of “Trojan Horse”, this type of malware appears to have a legitimate or at least benign use, but masks a hidden sinister function. For example, you may download and install a free screensaver which actually works well as a screensaver. But that software could also be malicious, it will infect your computer once you install it.
  • Spyware: A type of malware that is designed to spy on the victim’s activities, capturing sensitive data such as the person’s passwords, online shopping, and screen contents. One popular type of spyware, a keylogger, is optimized for logging the victim’s keyboard activity and transmitting the captured information to the remote attacker.

ITC's Cybersecuirty Logo - Chip

Week 2 October 9-13, 2017

@STOPTHNKCONNECT. What advice can you give people to avoid being phished? Reply to San Juan College’s Facebook page post on phishing with your suggestions.

Phishing is a social engineering technique where cyber attackers attempt to fool you into taking an action in response to an email. Phishing was a term originally used to describe a specific attack scenario. Attackers would send out emails pretending to be a trusted bank or financial institution, their goal was to fool victims into clicking on a link in the email. Once clicked, victims were taken to a website that pretended to be the bank, but was really created and controlled by the attacker. If the victim attempted to login thinking they were at their bank, their login and password would then be stolen by the attacker. The term has evolved and often means not just attacks designed to steal your password, but emails designed to send you to websites that hack into your browser, or even emails with infected attachments.

UNM has a list for their know phish:

UCLA has a list for their know phishing attacks:

Week 1 October 2-6, 2017

Top-Three Threats Facing Kids

@STOPTHNKCONNECT. What’s your top tip for helping our children stay safe and safe ITC's Cybersecuirty Logo - Chiponline? #CyberAware Post your answers to San Juan College’s Facebook Page:

Lance Spitzner, Director, SANS – Securing the Human, provides an overview of the basic challenges parents face in securing today’s online kid, and how to avoid the pitfalls of:

  • Strangers (predators, sextortion, fraud)
  • Friends (sexting, griefing, cyber-bullying)
  • Themselves (sexting, social media, sharing personal information)

Week 1 Video (12:03 minutes):

For more in-depth information (57:36 minutes):