Information Systems Security and You

Slides:



Advertisements
Similar presentations
Hows Your Privacy? Social Networks & Cellphones Lt. Michael J. Kozak, Ret. X4 Echelon.
Advertisements

Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Online banking Using the internet for your banking.
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
What is E-commerce Safety Precautions Password Strengths
Protecting Yourself Online (Information Assurance)
Staying Safe Online Keep your Information Secure.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Signing On General Lesson 2. Objectives Following completion of this lesson you will be able to:. Open the Meditech application. Sign on to Meditech.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
This is the IT website. Submit a service request, find out hours and locations, reset your password and search for help. IT has service points across campus.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Communicating safely and appropriately online. Why do we need passwords?
Communicating safely and appropriately online
Computer Security.
3.6 Fundamentals of cyber security
Key words: Secure | Password | Character
Digital Citizenship.
Dove science academy Cyber Club
System Access Authentication
Safe and Secure: Choosing a Safe Screen Name
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
3.6 Fundamentals of cyber security
Password Management Limit login attempts Encrypt your passwords
PASSWORDS Unique is Good.
Safe and Ethical Use of Technology
Jim Barton Librarian Glenside Public Library District
Protecting your personal information and privacy
Lesson 2- Protecting Yourself Online
Huntington Beach Public Library
© EIT, Author Gay Robertson, 2017
Instructor Name Instructor Title Library Name
Cybersecurity Awareness
Little work is accurate
Information Technology Services Education and Awareness Team
DOVE SCIENCE ACADEMY CYBER CLUB
entrance survey Why are you completing an entrance survey?
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Setting up an online account
What you can do to support people to be safe online
Unit 1.6 Systems security Lesson 4
Internet safety By DAGAS YACMAS team.
Introduction to Computers
Lesson 2: Epic Security Considerations
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Keep It Safe! Secure Your Secrets
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
start to finish – November 20181
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Security Issues with Wireless Protocols
Information Technology Services Education and Awareness Team
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Lesson 2- Protecting Yourself Online
Chapter Goals Discuss the CIA triad
Communicating in the IT Industry
Presentation transcript:

Information Systems Security and You

What is Information Systems Security? Protecting your data – usually referring to your online or electronic data.

Every Day Information Systems Security

How do we protect our data? Passwords Traditional Passwords – a string of characters that allows access to a system PIN – personal number used to gain access to a system. Usually 4-8 digits Fingerprints – cannot be forgotten, forged, or guessed. Facial Recognition – cannot be forgotten but can be forged. Machines that aren’t as sophisticated can be tricked by photos of you.

Good vs. Bad Passwords

Good vs.Bad Passwords https://www.youtube.com/watch?v=opRMrEfAIiI (2 min. 40 sec) Do you think the passwords in the video were good? Why or why not?

What makes a password good? Using symbols Having long passwords (at least 12 characters but longer is better) Not using personal information (like birthday or pet names) Using a combination of numbers and letters * Handout

Password Game Split up into 4-5 groups. Come up with a password that you think will be strong but realistic. (i.e. make sure somebody would be able to use it and remember it in real life). Present your password to the class. Check to see which group created the strongest password! http://password-checker.online-domain-tools.com/

Wifi

Public Wifi Scares Fake Wifi (“Flyingstar2”) Password Free Networks (unencrypted data)

Demo - Wireshark Wireshark is an open source packet analyzer (packet sniffer) that can intercept information that is going across a network and keep track of it. https://www.youtube.com/watch?v=_WQe36pZ3mA (start at 1 min 10 sec)

Demo – Wireshark

Information Security Lessons for the Film Industry

Physical Security Protecting your data – usually referring to your online or electronic data, but physical security is an important part too! How can we protect our physical spaces? Locks Secure spaces/vaults Badges

What’s wrong with this picture?

What would you do? If you were working on a film what would you want to keep physically safe? How could you keep those things safe?

Social Engineering Tricking people into giving you personal or confidential information https://www.youtube.com/watch?v=zUWlnHPzJcA&t=16s (stop at 1 min)

Social Engineering

Social Engineering People use social engineering to: Try to figure out passwords Get bank information Learn company or government secrets Ex. Kane Gable and CIA John Brennan in 2017

Access Controls Access control is a security technique that regulates who or what can view or use resources in a computing environment. Can be physical or logical. Why do you think having access controls is important? Note that this protects data not only from attackers, but also from employees who may make mistakes.

Toy Story 2 and Access Control

Summary Protecting personal and proprietary information is important! Passwords should be strong and unique. Be careful when using public wifi. Keep physical areas and information secure. Make use of access controls when necessary.

Thank you! Questions?

Sources https://www.makeuseof.com/tag/lock-methods-android-phone/ https://www.bayometric.com/eliminate-password-fingerprint-password-manager/ https://searchsecurity.techtarget.com/definition/password https://www.computerhope.com/jargon/p/pin.htm https://www.technologyreview.com/s/542576/youve-been-misled-about-what-makes-a-good-password/ https://www.usatoday.com/story/tech/2013/07/01/free-wi-fi-risks/2480167/ https://blog.lookout.com/spoofed-wifi-60-minutes https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering https://www.telegraph.co.uk/news/2018/01/19/british-15-year-old-gained-access-intelligence-operations-afghanistan/ https://www.helpnetsecurity.com/2018/01/22/hack-social-engineering/ https://theblast.com/rupauls-drag-race-leaked-episodes-lawsuit/ https://searchsecurity.techtarget.com/definition/access-control http://mentalfloss.com/uk/entertainment/27204/how-one-line-of-text-nearly-killed-toy-story-2