cybersecurity managment and Governance week 1 v2.pptx

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] YOU ARE WELCOME. YOU ARE WELCOME.

Scene 2 (5s)

[Audio] BB YOUR CYBERSECURITY MENTOR_01 ◼ Bolaji Bankoles' Bio ◼ Bolaji Bankole is an esteemed cybersecurity mentor with over 14 years of extensive experience as a cyber forensics and information security expert. His expertise spans cybersecurity solution implementation, governance risk and consulting, IT risk engineering, IT auditing, digital risk, and cybersecurity auditing. Bolaji Bankole possesses a unique proficiency in application security penetration testing, network penetration testing, cloud security, and mobile application penetration testing. ◼ Bolaji Bankole's versatile skill set encompasses technical, managerial, and leadership skills, which sets him apart as a dynamic figure among cybersecurity experts. His ability to develop and implement enterprise security solutions and policies, particularly within the financial institution, mobile payment, e-commerce, and other industries, ".

Scene 3 (1m 13s)

[Audio] BB YOUR CYBERSECURITY MENTOR_02 ◼ Bolaji Bankoles' Bio ◼ Bolaji is a certified ISO 27001 lead auditor and trainer and an ISO 27032 senior lead cybersecurity manager and trainer. He stands as a beacon of expertise. and his track record of leading numerous ISO 27001 and PCI/DSS projects and seamlessly integrating various management systems with banks attests to your prowess. ◼ In addition to his technical acumen and proficiency in PCI audit, security consulting, threat management, bug bounty program implementation, and management, among other skills, he exemplifies your unwavering commitment to fortifying organizations against cyber threats. Your mentorship undoubtedly stands as a guiding light for aspiring cybersecurity professionals.".

Scene 4 (2m 15s)

[Audio] PROFESSIONAL CERTIFICATION PROFESSIONAL CERTIFICATION.

Scene 5 (2m 21s)

[Audio] BB YOUR CYBERSECURITY MENTOR_03 3 Reasons Why I Enjoy Mentoring Others: Passing on Knowledge: Having spent over 14 years as a Cyber Forensic and Information Security Expert, I find immense satisfaction in sharing my extensive experience and insights with aspiring professionals. It's incredibly fulfilling to see them grow and excel in the field. Fostering Innovation: Through mentoring, I get the opportunity to guide individuals in thinking critically and innovatively in the realm of cybersecurity. Witnessing their creative solutions to complex challenges is truly inspiring. Contributing to a Secure Digital Future: By mentoring, I play a role in shaping the next generation of cybersecurity experts. Knowing that I'm contributing to a more secure digital landscape gives me a strong sense of purpose and fulfillment..

Scene 6 (3m 18s)

BB YOUR CYBERSECURITY MENTOR_03 3 Reasons Why I Enjoy Mentoring Others: •Passing on Knowledge: Having spent over 14 years as a Cyber Forensic and Information Security Expert, I find immense satisfaction in sharing my extensive experience and insights with aspiring professionals. It's incredibly fulfilling to see them grow and excel in the field. •Fostering Innovation: Through mentoring, I get the opportunity to guide individuals in thinking critically and innovatively in the realm of cybersecurity. Witnessing their creative solutions to complex challenges is truly inspiring. •Contributing to a Secure Digital Future: By mentoring, I play a role in shaping the next generation of cybersecurity experts. Knowing that I'm contributing to a more secure digital landscape gives me a strong sense of purpose and fulfillment..

Scene 7 (3m 23s)

[Audio] BB YOUR CYBERSECURITY MENTOR_04 3 Areas of Expertise I Want to Mentor Others In: Vulnerability assessment and penetration testing (Application security testing, network, cloud, and mobile application security testing), Cybersecurity Solution Implementation: Guiding individuals in effectively implementing cybersecurity solutions is crucial for safeguarding organizations against evolving threats. Governance Risk and Consulting: I aim to mentor in this area to instill a deep understanding of governance, risk management, and the critical role they play in cybersecurity strategies. IT Auditing and Compliance: I find it essential to mentor in IT auditing to ensure professionals are equipped with the skills to assess and enhance the security posture of organizations, and to comply with industry standards and regulations..

Scene 8 (4m 19s)

[Audio] BB CYBERSECURITY LEADERSHIP AND MENTORSHIP PROGRAM PRESENTS.

Scene 9 (4m 26s)

[Audio] CYBERSECURITY MANAGEMENT AND GOVERNANCE. CYBERSECURITY MANAGEMENT AND GOVERNANCE.

Scene 10 (4m 32s)

[Audio] CONTENT ◼ Introduction to Cybersecurity ◼ Understand the fundamentals of cybersecurity, ◼ Common cyber threats, ◼ Ethical and legal considerations..

Scene 11 (4m 45s)

[Audio] CONTENT Introduction to Cybersecurity: Gain an overview of the essential concepts and principles of cybersecurity. Fundamentals of Cybersecurity: Learn the foundational elements and key components that form the basis of cybersecurity practices and protocols. Common Cyber Threats: Explore the various types of threats that individuals and organizations face in the digital landscape, including malware, phishing, and DDoS attacks. Ethical and Legal Considerations: Understand the moral and legal frameworks surrounding cybersecurity, including privacy rights, compliance, and ethical responsibilities in protecting digital assets..

Scene 12 (5m 31s)

[Audio] MEET AND GREAT & STUDENTS EXPECTATION ◼ Phone on silence ◼ 100 percent Concentration.

Scene 13 (5m 40s)

[Audio] VISION ◼ Vision: Creating a world with empowered and knowledgeable cybersecurity professionals..

Scene 14 (5m 48s)

[Audio] MISSION ◼ Mission: Providing leadership skills, mentorship, and education in cybersecurity..

Scene 15 (5m 56s)

[Audio] GOAL ◼ Train 10,000 students globally every month..

Scene 16 (6m 3s)

[Audio] WHY ARE WE HERE ?. WHY ARE WE HERE ?.

Scene 17 (6m 9s)

[Audio] One of the ways to learn is LAST WEEK CYBERSECURITY NEWS REVIEW.

Scene 18 (6m 17s)

[Audio] KEY HACKING STATISTICS FOR 2023 ◼More than 22 billion corporate records were leaked in 2022. ◼Ransomware attacks happen every 2 seconds. ◼43% of cyber attacks are targeted at small businesses. ◼The average cost of a corporate data breach will reach $5 million by 2023. ◼95% of cyberattacks are due to human error. ◼Approximately 30,000 websites get hacked each day globally. ◼Every day, some 300,000 new malware instances are produced. ◼Phishing emails are responsible for about 91% of cyber attacks against large corporations..

Scene 19 (6m 58s)

[Audio] HISTORICAL ANALYSIS OF THE TOP 10 & BIGGEST CYBER ATTACKS OF ALL TIME.

Scene 20 (7m 6s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_1 ◼ Estonia was hit by a series of cyber attacks in 2007, believed to be orchestrated by Russia, which targeted banks, online services, media outlets, broadcasters, and government bodies. Collapse ◼ Estonia faced a series of cyber attacks in 2007, believed to be orchestrated by Russia, which took down banks, online services, media outlets, broadcasters, and government bodies..

Scene 21 (7m 40s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_2 ◼ Cyber attacks caused power outages in Ukraine and NASA shutdown in 1999, highlighting the vulnerability of critical infrastructure to hacking. ◼ A cyber attack caused a power outage in Ukraine, with hackers sending phishing emails to energy distribution companies, and experts warn that other countries could also be vulnerable to such attacks, while in 1999, a 15-year-old hacker named Jonathan James caused a 21-day shutdown of NASA computers..

Scene 22 (8m 15s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_3 ◼ Sony Pictures was hacked by Guardians of Peace in 2014, resulting in the leak of confidential data and the cancellation of the movie, The Interview. ◼ In late November 2014, the hacker group Guardians of Peace leaked confidential data from Sony Pictures, including information about employees, emails, unreleased films, and future propositions, and demanded that Sony withdraw its upcoming movie, The Interview, which led to the film's cancellation..

Scene 23 (8m 51s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_4 ◼ TJX, a US retailer, suffered a massive cyber attack resulting in the theft of 45.6 million debit and credit card details due to weak web encryption at two of its Marshall stores in Miami. ◼ TJX, a US retailer company, experienced one of the largest ever cyber attacks resulting in the theft of 45.6 million debit and credit card details by a group of hackers led by Albert Gonzalez due to weak web encryption at two of its Marshall stores in Miami..

Scene 24 (9m 33s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_5 ◼ Stuxnet worm targeted Iran's nuclear infrastructure, while Home Depot cyber attack compromised millions of payment cards and customer email addresses. ◼ Stuxnet was a deadly computer worm that targeted Iran's nuclear infrastructure, infecting over 200,000 computers and damaging centrifuges, while the Home Depot cyber attack compromised 56 million payment cards and 53 million customer email addresses.

Scene 25 (10m 8s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_6 ◼ Sony's Playstation network suffered a major cyber attack in 2011, leading to a 23-day outage and $170 million investment in network security, while another dangerous attack occurred in 2017. _6 ◼ Sony's Playstation network was compromised in 2011, affecting 77 million users and resulting in a 23-day outage, leading to a $170 million investment in network security, while in 2017, a dangerous cyber attack occurred..

Scene 26 (10m 50s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_7 ◼ The WannaCry ransomware attack infected 200,000+ computers in 150 countries, causing billions in damages and demanding ransom payment via bitcoin. ◼ The WannaCry ransomware attack infected over 200,000 computers in 150 countries, causing billions of dollars in damages, and was spread through an exposed vulnerable SMB port, locking users out of their systems and demanding a ransom payment via bitcoin..

Scene 27 (11m 25s)

[Audio] TOP 10 CYBER ATTACKS IN HISTORY & THE BIGGEST CYBER ATTACKS OF ALL TIME_8 ◼ The Melissa virus in 1999 caused major email disruptions and $80 million in damages. ◼ In 1999, the Melissa virus caused significant network traffic and disrupted almost 1 million email accounts worldwide, resulting in nearly $80 million worth of damages..

Scene 28 (11m 50s)

Mail - Bolaji Bankol... rtinet.com/content/dam/fortinet/assets/reports/2023-cybersecurity-skills-gap-report.pd Register of Worker... @ PLR Products I PLR... * WordStream I Goog... Resell Rights Weekl... — assp Exam - Free How I Made A Facel... Data Protection - O... 2023-cybersecurity-skills-gap-report.pdf 7 / 25 Breaches are More Frequent and More Costly As predicted by Fortinet's FortiGuard Labs, cyberthreats of all kinds became increasingly ubiquitous in 2022. This pervasiveness resulted in more breaches than during the previous year, and at a higher total cost of breaches for many organizations. A high number of leaders also attribute those breaches, at least in part, to a lack of cybersecurity skills among IT professionals The majority view seems to be that the threat landscape will only get worse. In the next 12 months, 65% of the survey respondents expect the number of cyberattacks to increase. This prediction aligns with FortiGuard Lab projections, which anticipate the growth of many attack types and cybercrime business models, including the Crime- as-a-Service (CaaS) market. 100% + 81% of cyberattacks were in the form of phishing, password, and malware attacks. Phishing is the most common attack method In 2022, respondents reported that phishing, malware, and password attacks together formed the bulk (81%) of attack types encountered by surveyed organizations in 2022. Notably, these three attacks can target not only systems but also individual users directly. Phishing schemes are especially insidious as they often deliver the other attack types: malware and social engineering that can lead to password and web attacks. Organizations in North America saw significantly more phishing attacks than their counterparts in Latin America, while Latin America faced significantly more password attacks than peers in Europe, the Middle East, and Africa. What types of cyberattacks did your organization experience? ENG 29 c Partly sunny 13:25 07/09/2023.

Scene 29 (12m 55s)

[Audio] THEWORLDNEEDSMORECYBERSECURITYEXPERTS&CONSULTANTS.

Scene 30 (13m 2s)

C weforum.org/agenda/2023/05/the-cybersecurity-skills-gap-is-a-real-threat-heres-how-to-address-it/ Register Of Worker... PLR Products I PLR... * WordStream I Goog... e Mail - Bolaji Bankol... Resell Rights Weekl... G 19 How I Made A Facel... Data Protection - wok LD EC NOMIC F RUM Listen to the article — assp Exam 8 min listen Join us Sean Doyle Lead, Cybercrime Atlas Initiative, World Economic Forum Natasa Perucica Research and Analysis Specialist, Cybersecurity Industry Solutions, World Economic Forum Share: partly sunny • The rapid expansion of the digital economy— and our growing reliance on it — make cybersecurity an absolutely critical profession. • The world needs 3.4 million cybersecurity experts to support today's global economy, but the industry is struggling to fill that gap. • The World Economic Forum is convening a multistakeholder initiative to help fill the global cybersecurity skills gap. We're investing billions in digitalising our economies. This spurs ENG Sign in 12:59 07/09/2023.

Scene 31 (13m 39s)

Cybersecurity Workforce Demand 1.8 Million MORE cybersecurity will be needed to accommodate the predicted by 2022 Sure: 20/ 7 Vetekforce Stt-ey The most invottant attributes of a quaffed 550/0 0 Refereoceeersonal O Endorsement O/ Certification 10 Skills Source: SACA State of Cybesecwity 2017: Curent Trerd5 Hörkforce Cyfmsacurity . lemnVki On average, of IT professionals strveytli stated fewer than 25% of all a"icants were qudlfied Scorce: JSACA Stre oi Cy±etsecunty 2017: Curent trends bp indißties for cybersecurity job openilgs Inülstries Managing ConMnner Data Prue "Brui and Source: 2017. Bwrmg Gloss rechootgus.

Scene 32 (14m 0s)

C google.com/imgres?imgurl Mail - Bolaji Bankol... Register of Worker... =https%3A%2F%2Fimg2.helpnetsecurity.com%2Fposts2018%2Fisc2-102018-1 .jpg&tbnid =h4q_Fz... G @ PLR Products I PLR... * WordStream I Goog... Resell Rights Weekl... = CISSP Exam How I Made A Facel.. _ Free... Current Cybersecurity Staffing & Level of Risk Caused by Staff Shortage We have a significant shortage of staff dedicated to cybersecurity We have a slight shortage of staff dedicated to cybersecurity We have the right amount of staff dedicated to cybersecurity We have too many staff dedicated to cybersecurity Don't know 63 Any Shortage Net 28% 650 x 449 Visit The global cybersecurity workforce gap is widening - Help Net Security Images may be subject to copyright. Learn more https://www.helpnetsecurity.com/2018/10/19/2018- isc2 -cybersecurity-workforce-study/ Data Protection - O... ENG 240C Cloudy p Search Update 02:42 09/09/2023.

Scene 33 (14m 31s)

C spiceworks.com/it-security/security-general/news/cybersecurity-workforce-gap-isc2/ Mail - Bolaji Bankol... Register of Worker... @ PLR Products I PLR... * WordStream I Goog... Resell Rights Weekl... — assp Exam - Free The cybersecurity workforce gap has increased by 26.2% in 2022 compared to last year. This is despite the addition of 464,000 professionals to the cybersecurity industry, according to the International Information System Security Certification Consortium or (ISC)2. Cybercriminals have kept the global infosec community busy this past year, considering an 11% increase (464,000) in the cybersecurity workforce, from 4.183 million to 4.7 million between 2021 and 2022, is way too inadequate compared to the 26.2% increase in the demand for security talent. (ISC)2's assessment revealed that the cybersecurity workforce gap has risen from 2.7 million in 2021 to 3.4 million in 2022. As such, 70% of respondents (mainly cybersecurity workers) in (ISC)2's 2022 Cybersecurity Workforce Study said their organizations are understaffed. Respondents said this has directly hampered multiple functional and operational elements of cybersecurity, including the slower patching of critical systems, p Search Update How I Made A Facel... Data Protection - O... vercau IOUS o NIST Cybersecurity Framework vs. CIS Controls Version 8 Cloud Help Desk NO server procurement. setup, or maintenance. Just sign up and you are ready to go. Sgn up NOW ENG Mostly cloudy prÄ Terms 02:46 09/09/2023.

Scene 34 (15m 26s)

285,681 cybetsæudty job openings 746, 858 employed *ersecuity workforce Source: CyberSea August 20 7 13.50/0 Growth arri nuthematical occupatiors will grow mo&l taster than fie average during 2016-2026 Source Qteau of Labor Sütstics US. Deportment of Labor NICE Education and Experience Requirements in cybersecurity job openings • Sub-Bacheloes -15% • Bachelor's - 64 % • Graduate - 0-2 Years 3-5 Years 6-8 Years Years Approximately of the current cyb«security workforce are comprised of women in lob Cybersecurity Jobs, 20 7 Top Cybersecurity Job Titles • Wberæcunty Engjneer • Cyberæcurtty Nem•orx En.newrctutect • qt»eræcunty Manager • sonware DewoiVJ'E11*uer • sygems BWneer Source. Ciba-Seek A-q.Bt 20' 7 Hardest to fill skills in cybersecurity job postings %urce.• Wr€et 207 j. gwrmg Ghss o software Engjneerng Fkcovery Network Erotpertnq Software Devenpment Network MmirtsratÉn IMormatj1N1 Aswrance RiSk Wna*rnent Fratngwm Wwort security NISr nist.gov/nice.

Scene 35 (15m 55s)

Too Many Too Professionals INCREASE IN BREACHES IN 20131 IIN5 ORGANIZATIONS HAVE EXPERIENCED AN APT ArrACK TRILLION TOTAL GLOBAL IMPACT OF CYBERCRIME3 OF ORGANIZATIONS HAVE NOT INCREASED SECURITY TRAINING IN 20146 1 öF3 SECURITY PROS ARE NOT FAMILIAR WITH ADVANCED PERSISTENT THREATS7 2.5 BILLION EXPOSED RECORDS AS A RESULT OF A DATA BREACH IN THE PAST 5 YEARS GRADUATING SWDENTS HOLD COMPUTER SCIENCE DEGREES8 8 MONTHS 31 IS THE AVERAGE TIME AN ADVANCED THREAT UNNOTICED ON VICTIM'S NETWORK MILLION UNFILLED SECURITY JOBS WORLDWIDE9 830/0 OF ENTERPRISES CURRENTLY LACK THE RIGHT SKILLS AND HUMAN RESOURCES TO PROTECT THEIR IT ASSETSIO.

Scene 36 (16m 12s)

C premiumtimesng.com/news/more-news/569388-shortage-of-personnel-with-tech-skills-big-threat-to-58-of-businesses-in-nigeria-su... 12 Mail - Bolaji Bankol... Home @ PLR Products I PLR... * WordStream I Goog... Register of Worker... 2023 Elections Investigations Business v News v Resell Rights Weekl... Opinion Health CISSP Exam - Free... How I Made A Facel... Agriculture Arts/Life Sports Data Protection - Shortage of personnel with tech sldlls big threat to 58% of businesses in Nigeria — Survey Despite having one of the youngest populations and workforces in the world, 58% of IT decision makers in Nigeria view a shortage of personnel with IT skills as one of the main threats to their business. By Premium Times — December 7, 2022 Reading Time: 3 mins read A Nigerian business survey has shown that 58 per cent of IT decision makers in Nigeria view a shortage of personnel with IT skills as one of the main threats to their business. The survey also found that 34 per cent of tech decision makers in Nigeria are planning to move to a new region and 33 per cent into a new country, while 58 per cent view a shortage of personnel with IT skills as one of the main threats to their business..

Scene 37 (16m 57s)

[Audio] OUREXPECTATIONFORCYBERSECURITY MANAGEMENT AND GOVERNANCETRAINING.

Scene 38 (17m 4s)

[Audio] OUR EXPECTATION FOR CYBERSECURITY MANAGEMENT AND GOVERNANCE TRAINING ◼ Definition of Cybersecurity ◼ You will become a Cybersecurity consultant ◼ You will be equipped to become a CEO- You can own cybersecurity company ◼ You will understand how to make money as a cybersecurity consult ◼ You can have multiple stream of income as a cybersecurity consultant-Trainer.

Scene 39 (17m 32s)

[Audio] WHAT IS NEXT AFTER TRAINING ◼ Be certified ◼ Make money as an expert.

Scene 40 (17m 40s)

[Audio] WHAT IS THE VALUE WILL THIS TRAINING ADD TO YOU.

Scene 41 (17m 48s)

[Audio] A bug bounty program rewards independent researchers and ethical hackers when they find a bug or a security vulnerability in a service/website. A bug bounty program is a perfect place for security researchers or hackers to put their skills to the test. It gives the feel of a public competition and a run for the money with your skills. HOW MUCH IS COMPANIES WILLING TO PAY CYBERSECURITY CONSULTANTS AND EXPERTS As per your activities, it could end up being a full-time job for you. And, for some, it can be a rewarding side gig. WHAT IS A BUG BOUNTY PROGRAM? Generally, these platforms offer huge prize money if you report a severe problem in their service. It is also important to note that there are two different bug bounty platforms. Some companies prefer to build their platform, while others use existing third-party bug bounty platforms to add objectives/tasks for the mentioned reward..

Scene 42 (18m 42s)

[Audio] https://geekflare.com/tech-companies-bug-bounty-pro grams/ HOW MUCH IS COMPANIES WILLING TO PAY CYBERSECURITY CONSULTANTS AND EXPERTS https://www.microsoft.com/en-us/msrc/bounty WHAT IS A BUG BOUNTY PROGRAM? https://www.facebook.com/whitehat.

Scene 43 (18m 58s)

[Audio] Visit LinkedIn to search for cybersecurity jobs LAB2 CHATGPT fix this prompt ''List top 10 website with cybersecurity consultant jobs, number of job, date pasted and links'' top 10 websites with cybersecurity consultant jobs, number of jobs, date posted, and link in Nigeria.

Scene 44 (19m 17s)

[Audio] LAB2 Lab 1 –YouTube video Lab 2 –Realt time cyberattack Lab 3 –LinkedIn job- need for cybersecurity Lab 4 -Cybersecurity attack news analysis Lab 5 - PII –LinkedIn.

Scene 45 (19m 39s)

[Audio] CYBER ATTACK IN REAL TIME ◼ https://www.spamhaus.com/threat-map/ ◼ https://cybermap.kaspersky.com/ ◼ https://threatmap.fortiguard.com/ ◼ https://threatmap.bitdefender.com/ ◼ https://securitycenter.sonicwall.com/m/page/worldwide-attacks ◼ https://threatbutt.com/map/ ◼ https://securitycenter.sonicwall.com/m/page/worldwide-attacks.

Scene 46 (20m 3s)

C consultancy.uk/news/16068/majority-of-companies-now-hit-by-a-cybersecurity-skiIls-gap Mail Bolaji Bankol... Register of Worker... @ PLR Products I PLR... * WordStream I Goog... e Resell Rights Weekl... lill II II II lili — CISSP Exam Projects Services Rankings Jobs Career Consulting Industry Partners How I Made A Facel... Data Protection O... United Kingdom Join the platform Consultancy.uk News Consulting firms Cybersecurity has the largest demand as well as the largest gap between demand and supply Percentage of organizations that acknowledge that demand for a hard digital skill is high in their organization today and percentage of employees who are proficient in that hard digital skill 68% 64% 64% 62% 62% 61% 61% 61% Employer: Demand for this digital skill is high in my organization today Employee: Proficiency level of skill.

Scene 47 (20m 33s)

TOP 10 TYPES OF CYBER ATTACKS 01 Malwue 02 PSshing 04 05 Wectin ittEk 06 07 09 10 frß$•9te Rtgst Pass—rd.

Scene 48 (20m 39s)

TYPES OF CYBER-ATTACKS PHISHING • Sc•o• SOL INJECTON THRCAT CROSS-Sfft SCRIPTING A1-POWERED ATTACKS EAVESDROPPING ATTACK MAN.tN.THE.MtDDLE ATTACK • Se•s.o,.••. 05 SERVICE ATTACK (DOOS) PASSWORD ATTACK ontvr-•y ATTACK RANSOMWARE ATTACK.

Scene 49 (20m 49s)

Network Communication Work Work Work.

Scene 50 (20m 55s)

In-depth, Independent Research Tips to Protect Your Identity Online Identity then is on the rise, with the of victims stead1_W climbing year after year , according to a Javelin research gtu(y. Since the rtga tn personal and social media leads to increased vulnerability tn users' personal tnformatton, it ts the consumer's job to stay aware and take preventative action. Here are some tips on how to prevent becoming a victim of Identtty theft: CREATE STRONG PASSWORDS Make them long, include special characters, change often and don't use the same one for multiple accounts MOST POPULAR PASSWORDS OF 2011 D PROTECT YOUR SMARTPHONE Dm•t keep any personal informnion on your phone, especially without a password lock SMARTPHONE USERS 32% 32% update OS put • pass word Password 123456 12345678 abc123 qwerty monkey letmein DRAGON basebalV 70/0 h i gh" rat. th•r• iS no on it. KNOW WHAT INFO YOU SHARE Know the personal information you're sharing on social media and manage your account's privacy settings PEOPLE WITH PUBLIC PROFILES Shared their birthday information Shared 180/0 Shared their high school name 63% Shared trwir pet's name.