We need a powerpoint slideshow to go with this they just need to enhance your speech

oral citations are given by saying aloud:

According to linda jones in her 2017 article ” go girl go ” 4 to 5 young women have been assaulted on an urban college campus

Intro I. Database leaks II. Phishing III. Malware Conclusion

need at least 3 citations in the speech sources:

  1. Rates of people getting hacked over time graph https://www.statista.com/statistics/267132/total-damage-caused-by-by-cybercrime-in-the-us/
  2. find someone talking about amount of accounts lost to database leaks https://www.idtheftcenter.org/wp-content/uploads/2024/01/ITRC_2023-Annual-Data-Breach-Report.pdf
  3. find someone talking about phishing schemes over time https://docs.apwg.org/reports/apwg_trends_report_q4_2023.pdf
  4. find someone talking about antivirus effectiveness quote eric parker, a known security researcher

bibliography can be underneath outline if you wish to save paper

Intro -

DB Leaks - most common by far, netflix gets hacked, and they did a terrible job storing passwords. Your email for netflix was [email protected], and your password was myPWxx3. Your netflix account won’t be hacked though, you’ll be all good there, because Netflix will realize they have been hacked, and they will force you to reset your password.

A hacker can take the leaked emails and passwords from the netflix hack, and go use a tool called a “checker”, which will try every email on that list, and every email on that password, to login to another website, like for example, spotify. Issue is your spotify account is [email protected] and your password was myPWxx3. This is how account reselling services work, they find emails and passwords, try them on a ton of websites, and then resell the accounts they find that work. This is why using the same password for every website is a terrible idea, and really just repeating passwords ever is a bad idea. The easy solution to this is to use a password manager, and have your passwords randomly generated. This is way more common than any other form of hacking, because it is the easiest to do for the greatest immediate gain.

Phishing - The second most common way people get hacked. You get contacted by what you think is CPCC, saying, you have been automatically removed from your public speaking class because you didn’t complete your EVA. You’re very concerned! that’s no good! You click the link they gave you to dispute this, and it prompts you to sign in. You enter your email and password, and it doesn’t work. You keep trying it over and over, and it just keeps saying invalid password. You give up and open brightspace from your phone, but then you see, you’re still in the public speaking class. You look around, and the EVA is complete, nothing looks too worrying, you move on with your life. You did just get hacked though, because, that email wasn’t from CPCC, it was from [email protected] not [email protected], and that link wasn’t to https://brightspace.cpcc.edu, it was to https://brightspace.cpcc.xyz. You didn’t see that, because it was formatted like this: Click this to Dispute. It is too late now though, as the owner of that cpcc.xyz website now has your username and your password.

Malware - This one is growing less and less common nowadays, because tech is beginning to become more locked down, so the only devices you might own which are at all likely to get malware are windows computers and android phones, and even with android phones the malware is very limited in what it can do. Generally, the goal with malware is to get you to download and the run an executable file of some kind. There are a million ways they can go about this, the common ones are things like “cracked” versions of software, so you can get them without paying, or it can be an email attachment which looks like a pdf but is really an exe, or it can be an excel file with a macro built in which runs malware, but regardless of how they achieve the running of an executable, once they get the ability to execute code, its over. They can grab all of your logins from your browser, and all of your documents, and send those over to a remote command and control server. Antiviruses are a decent option for this, but really, nothing beats just paying attention before you run or open things. Checking file extensions before you open a file, checking where a link goes before you click it, and doing research on the credibility of a source before you download a program from them.