By Margaret Kidd and Mary Rayme
IS 585, Fall 2013
1
What is
Cybercrime?
Crime committed by use of a computer.
2
• cyberbullying
• cyberstalking
• cyberwarfare
• child pornography
• extortion
• fraud
• hacking
What is Cybercrime?
3
What is Cybercrime?
• identity theft
• phishing
• phreaking
• ransomware
• spam
• theft and embezzlement
• viruses
4
What are the most
prevalent cybercrimes
in an information
environment?
5
Published child pornography arrests
in US libraries, 2011-2013
Alaska, Anchorage Loussac Public Library
California, Auburn...
Other Top Cybercrimes in an
Information Environment
• stolen data/altering data
• identity theft
• info stolen over wifi
•...
Who polices cybercrime?
8
The Secret Service was the first law enforcement entity to
police cybercrime. Since then the res...
A Brief History of
9
1986, The Cuckoo’s Egg
1988, The Morris Worm
1994, Citibank
1998, Back Orifice
1999, The Melissa Virus
2000, Web Denied
20...
11
Who are cybercriminals?
1. US
2. Russia
3. Germany
4. Romania
5. Ukraine
6. Thailand
7. Vietnam
8. Netherlands
9. Lithu...
12
Can Prevent Cybercrime!
http://en.wikipedia.org/wiki/File:Smokey3.jpg
Cyber Security Tips
for Library Staff and Users
13
• Our library users expect to have a safe
computing environment.
• To provide this we must
 Be knowledgeable about cyb...
14
Some steps that libraries can
take to prevent cybercrime:
• Perform regular anti-virus and
anti-malware scans
• Use fir...
15
• Secure browsing: Does not save browser
history, search history, download history, or
temporary internet files.
• Exam...
16
Protect and strengthen
passwords:
• Never share your passwords with
anyone.
• Have patrons use passwords to login
• Use...
17
https://www.microsoft.com/security/pc-security/password-checker.aspx
• Use a password generator for strong passwords
• ...
18
Two part authentication:
 Additional layer of security using password &
verification code
 Even if password is cracke...
19
• Modify behavior: Be careful about
information that you post on social media
as such information could be used to
hack...
20
 Public Wifi
 Use caution on a public wifi network.
 Do not use unsecured wifi for financial or
sensitive transactio...
21
The Future of Cybercrime and
Cybercrime Prevention
• Cyber criminals are continually finding new ways to exploit
weakne...
22
What does this mean
for libraries?
• Be aware of how cybercriminals are
evolving and keep up with the latest
trends in ...
2323
Any questions?
All vintage mag covers from: http://www.coverbrowser.com
of 23

Preventing Cybercrime in Libraries

This is a project I completed with classmate Margaret Kidd. I did most of the layout work and enjoyed PhotoShopping public domain True Crime Detective book covers to suit our needs.
Published on: Mar 4, 2016
Published in: Internet      
Source: www.slideshare.net


Transcripts - Preventing Cybercrime in Libraries

  • 1. By Margaret Kidd and Mary Rayme IS 585, Fall 2013 1
  • 2. What is Cybercrime? Crime committed by use of a computer. 2
  • 3. • cyberbullying • cyberstalking • cyberwarfare • child pornography • extortion • fraud • hacking What is Cybercrime? 3
  • 4. What is Cybercrime? • identity theft • phishing • phreaking • ransomware • spam • theft and embezzlement • viruses 4
  • 5. What are the most prevalent cybercrimes in an information environment? 5
  • 6. Published child pornography arrests in US libraries, 2011-2013 Alaska, Anchorage Loussac Public Library California, Auburn Library California, Foothill Ranch Public Library California, Fresno County Public Library California, Main Street Library, Santa Monica Florida, Florida Atlantic University Library Florida, Harrell Memorial Library Florida, South East Wimberly Library Illinois, Bloomingdale Public Library Illinois, Orland Park Public Library Illinois, Southwest Illinois College Library Indiana, Lawrenceburg Library Kentucky, Louisville Free Public Library Maryland, Queen Anne Public Library Michigan, Kent District Library Missouri, Jefferson College Library Missouri, Metropolitan Community College Library Nevada, Western Nevada College New Jersey, North Plainfield Library New Jersey, Plainsboro Township Public Library Oregon, Monroe County Public Library South Carolina, Oconee County Library South Dakota, Rapid City Public Library Tennessee, First Regional Library Tennessee, Nashville Public Library Tulsa City-County Library, Oklahoma West Virginia, Clay County Public Library West Virginia, Randolph County Public Library West Virginia, Parkersburg-Wood County Public Library 6
  • 7. Other Top Cybercrimes in an Information Environment • stolen data/altering data • identity theft • info stolen over wifi • pirated music, audiobooks, ebooks • malware, viruses 7
  • 8. Who polices cybercrime? 8 The Secret Service was the first law enforcement entity to police cybercrime. Since then the responsibility has spread to include: • FBI • CIA • Department of Homeland Security
  • 9. A Brief History of 9
  • 10. 1986, The Cuckoo’s Egg 1988, The Morris Worm 1994, Citibank 1998, Back Orifice 1999, The Melissa Virus 2000, Web Denied 2003, Blaster Worm & Blackout 2007, Pentagon 2007, Israel Air Defense Kill Switch 2007, Zeus Botnet 2009, China Attacks Google 2010, Stuxnet 2012, Unlimited Operation 2013, Bitcoin 2014, ? Cybercrime Timeline 10
  • 11. 11 Who are cybercriminals? 1. US 2. Russia 3. Germany 4. Romania 5. Ukraine 6. Thailand 7. Vietnam 8. Netherlands 9. Lithuania 10. Ireland From “Top 50 Bad Hosts and Networks”, HostExploits’s Worldwide Cybercrime Series. Second Quarter, 2012 – Report.
  • 12. 12 Can Prevent Cybercrime! http://en.wikipedia.org/wiki/File:Smokey3.jpg Cyber Security Tips for Library Staff and Users
  • 13. 13 • Our library users expect to have a safe computing environment. • To provide this we must  Be knowledgeable about cybercrime  Educate users
  • 14. 14 Some steps that libraries can take to prevent cybercrime: • Perform regular anti-virus and anti-malware scans • Use firewalls • Block users from downloading programs onto public computers • Routinely evaluate and update security measures as needed
  • 15. 15 • Secure browsing: Does not save browser history, search history, download history, or temporary internet files. • Examples: Firefox Private Browsing & Chrome Incognito Browsing • Caution: Files that are downloaded and bookmarks saved will be kept. The ISP and employer can still track the pages you visit. 15
  • 16. 16 Protect and strengthen passwords: • Never share your passwords with anyone. • Have patrons use passwords to login • Use guest passwords that are frequently changed. 16
  • 17. 17 https://www.microsoft.com/security/pc-security/password-checker.aspx • Use a password generator for strong passwords • Example: LastPass a product to generate and manage passwords. • Use a password checker to evaluate password strength.
  • 18. 18 Two part authentication:  Additional layer of security using password & verification code  Even if password is cracked the account still cannot be accessed without the code
  • 19. 19 • Modify behavior: Be careful about information that you post on social media as such information could be used to hack your account by guessing passwords or challenge questions. • Click with caution: Do not click on links or open emails that you are unfamiliar with. They could potentially be source of malware. Be aware of phishing scams; do not provide sensitive information.
  • 20. 20  Public Wifi  Use caution on a public wifi network.  Do not use unsecured wifi for financial or sensitive transactions  Check the network name  Turn off sharing  Turn off wifi capability when not in use  Use a virtual private network. • Clean up Consolidate or close old accounts that could be used by someone to gain access.
  • 21. 21 The Future of Cybercrime and Cybercrime Prevention • Cyber criminals are continually finding new ways to exploit weaknesses. • Per Project 2020 report: Cyber crimes in 2020 will be adaptations of existing crimes to the technological developments of the next seven to eight years. • New challenges will also emerge such as threats to critical infrastructure and human implants. These will increasingly blur the distinction between cyber and physical attack. https://www.europol.europa.eu/sites/default/files/publications/2020_white_paper.pdf 21
  • 22. 22 What does this mean for libraries? • Be aware of how cybercriminals are evolving and keep up with the latest trends in cyber security. • Part of our mission as information professionals is to educate people. • Be more proactive in educating our users on how to protect their information.
  • 23. 2323 Any questions? All vintage mag covers from: http://www.coverbrowser.com

Related Documents