Information Security.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe Online Keep your Information Secure.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Protecting Your Personal Information November 15, 2013.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
A Matter of Your Personal Security Phishing Revised 11/30/15.
How Your Customers Will Pay Online & by Phone
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Important Information Provided by Information Technology Center
How to stay safe using the internet & App’s
IT Security Awareness Day October 19, 2016
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Creating your online identity
How to stay safe using the internet and app’s?
Fraud Protection.
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Fraud protection.
Common Methods Used to Commit Computer Crimes
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
How to use the internet safely and How to protect my personal data?
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
National Cyber Security Month
How to Protect Yourself from ID Theft and Social Engineering
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Information Security Awareness 101
Staying safe on the internet
Lesson 2: Epic Security Considerations
Security in mobile technologies
Company Name | Phone Number | Website | Address
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Information Security

Who Are We? We work at Sandia labs We are graduate students at UNM Our goal? To reach out to the youth

What devices can get hacked? Game time What devices can get hacked?

(Clue) What Tech Do You Use? Choices: Laptop Desktop Cellphone Tablet Fitbit/Smart Watch Bluetooth Speaker Smart TV Other

Survey Analysis The introduction paragraph was meant to bore you. Similar setup to many terms and conditions. The first question was optional.

What is considered sensitive information? Any way to uniquely identify you. High risk (1 identifier): Social Security Number (SSN) Identification card License, Passport, School ID, etc. Credit Card information Medium Risk (multiple identifiers): First Name, Last Name, Date of Birth, Address Phone Number Login information (username & password)

What is considered sensitive information? Any way to uniquely identify you. High risk (1 identifier): Social Security Number (SSN) Identification card License, Passport, School ID, etc. Credit Card information Medium Risk (multiple identifiers): First Name, Last Name, Date of Birth, Address Phone Number Login information (username & password) Medium/High Risk High Risk Low Risk

Don’t Give Out Your Personal Information Why? Companies that collect data such as your name, address, phone number, and other data about you can be compromised. Don’t give out your real information unless you completely trust the source/company. Personal information is Sensitive Information.

The Cloud Companies own the cloud. Applications use the cloud. Companies own your data Applications use the cloud. Your login, photos, about sections, credit card info are saved on the cloud. The cloud needs an internet connection to store data Ever tried logging into YouTube or uploading anything without the internet?

DEFCON Hacking is social engineering DEFCON Example https://www.youtube.com/watch?v=fHhNWAKw0bY

Hacking Benefits: Downfalls: Companies can learn entry points. Increase our skills at protecting information There are professional jobs that pay you to find security vulnerabilities. (professional hackers exist) Downfalls: Hackers sell your information Hackers use your information against you Hackers steal from you if there is a way to make money

Types of Hackers White Hat – Ethical Hacker Black Hat – Stereotypical Hacker Red Hat – Vigilante Hacker

What are we really downloading? Downloading apps that seem secure may not be the case Remember the required terms and conditions? Not everything is required. Some apps have a legitimate reason to access your files, some don’t. Use logic and reason. Pay attention to your downloaded files to see if it appears familiar.

Mobile Security Android Security issue It may not be your fault When mobile players downloaded Fortnite it allowed the phone to become vulnerable to outside entities. A rogue app had access to the device’s settings and other areas for malware to be installed. It may not be your fault Sometimes a friend or relative can expose your sensitive data. link

Social Media TIKTOK Formally known as musical.ly. Was the most downloaded application (globally) in Sept. TIKTOK compilations are posted on YouTube Are Vine complications still on YouTube? Your posts from popular apps doesn’t actually get deleted even when they are no longer available.

Guess this Screenshot Who is this? How do we recognize this screenshot? Details: December 31, 2017 Maverick Apparel lawsuit Why does it matter what we post on the internet?

Phishing Phishing is the fraudulent attempt to obtain sensitive information, (such as usernames, passwords, credit card details, etc.), by disguising as a trustworthy entity in an electronic communication.

Phishing Fake websites False logins Authentication Emails

Phishing Email Sender’s email address is not consistent to the content of the email. Contain a generic introduction. Pay attention to grammar If there is a link hover over it and verify the URL. . fake.LinkhasMalware.uk/948ur93u Ctrl + Click to follow link

Encryption Companies that store sensitive information about you should have the data encrypted. Encryption Example. risky clicky

Be More Paranoid Open networks Online Shopping Hackers use open networks Online Shopping Be careful where you input data such as credit card information, SSN, etc. Hack occurs every 39 seconds!!

Password Game Rules: Groups of 5 Group decide on a secure password Most secure password gets a prize! Consists of letters, numbers, etc.

Game results Password Cracking Password Generator

Password Tip: Try to remember your passwords as phrases WOO!TPwontSB 2ChnzL!k$Pbj chZp!@7St230 DuMbLd0R!s@w7D #iHt3hsHtg$2018 Woo! The Packers won the Super Bowl! 2 Chainz likes PB & J Cheese pie at 7th street, 2:30pm Dumbledore is a wizard #I hate hashtags 2018

Conclusion Be careful what you download in the first place Understand your privacy settings on all your devices and how you secure those devices Be weary of what information you give out to others Pay attention to what you post in the long run Conclusion