Cyber Security

The cyber threat has become one of the most serious economic and national security challenges of the 21st century.

  • Approximately 80% of all cyber crime is the result of insider attacks from people with firsthand knowledge of the network they are attacking.
  • Organized crime and terrorist groups actively recruit telecommunications workers to use telephone networks for committing fraud, piracy and money laundering.
  • The FBI estimates that cyber crime now totals approximately $67 billion annually
  • E-mail is the most common route (nearly 75%) by which cyber criminals make contact with their victims.
  • Common cyber crimes include theft of service, financial fraud, unauthorized access, malicious code and cyberstalking.
  • Learn more about cyber security here.
  • Terms

    Familiarize yourself with these terms to help identify cyber security threats.

    • Phishing - The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information
    • Spear Phishing - A type of phishing attack that focuses on a single user or department within an organization, addressed from someone within the company in a position of trust and requesting information such as login IDs and passwords.  Spear phishing scams will often appear to be from a company's own human resources or technical support divisions and may ask employees to update their username and passwords. Once hackers get this data  they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can thieve data.
    • Card Skimming - The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. This information, copied onto another blank card's magnetic stripe, is then used by an identity thief to make purchases or withdraw cash in the name of the actual account holder. Skimming can take place at an ATM. Be aware of attachments, cameras, or anything that does not seem right with an ATM.  Skimming can also occur at restaurants, taxis, or other places where a user surrenders his or her card to an employee. 
    • Virus - A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.
    • Worm -  program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. A worm, unlike a virus, has the capability to travel travel without human action and does not need to be attached to another file or program.
    • Trojan Horse - A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer