Computers a Necessary Evil: Know the Risks. Introduction The importance of information security Security Smarts –Computers –Smartphones –Social media.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
What do I need to know?.   Instant Messages  Social Networking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Society & Computers PowerPoint
INTRODUCTION & QUESTIONS.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Safety.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Information Security.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
ICT Communications Lesson 3: Internet Life and Privacy
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Introduction-Cyber Safety
Presentation transcript:

Computers a Necessary Evil: Know the Risks

Introduction The importance of information security Security Smarts –Computers –Smartphones –Social media –At work

Information Security - Overview Information assurance: the measures to avoid compromise to data and systems. The three main threats: –Viruses – a program that attaches itself to other programs and files. –Worms – copy themselves from one computer to another using a network –Trojan Horses – a software that appears to do something else

Other Threats Phishing – fake messages and addresses and websites that appear to be legit that are used to obtain sensitive information. Evil twins – wireless networks that seem to be legit (airports, hotels, etc.) Social engineering – using social skills to convince people you are to be trusted with sensitive information ( team of-4.html) team of-4.html

Computer Security Virus protection – –Run scans frequently –You get the protection you pay for –Many softwares now have the ability to scan facebook walls and search results. Firewalls - Any barrier that is intended to thwart the spread of a destructive agent. You – You have the ability to identify the potential threats and avoid them.

Computer Safety Do not open s from unknown senders Do not click on links without verifying the URL –Sometimes the displayed URL is not the same as the embedded URL (unm.edu)unm.edu –Before entering information verify you are at the correct site (that you are at amazon.com not anazon.com)

Smartphone Threats Smartphones are vulnerable to the same threats as regular computers, but they are much easier targets. –Apps –Loss or theft –Lack of virus protection –Saved passwords and other personal information 82% have their own smartphone

Top 10 Smartphone Threats 1.Smishing - text messages to trick victims into calling a fake bank or credit card company and divulging his/her account information under the pretext of needing to confirm a purchase or update security settings. 2.War Texting - a hacking technique that sniffs out the codes used to communicate between a smartphone and a car. 3.Wi-Fi Hijacking - some hackers set up free Wi- Fi hotspots in public places such as parks, cafes and airports.

Top 10 Smartphone Threats (cont.) 4. Open Hot Spot - hackers may be able to gain instant access to your connection and your communications using your own created hotspot. 5. Baseband Hacking- intercepting cellular calls 6. Bluetooth Snooping - Using Bluetooth device- pairing default passcodes can give an attacker access to all your messages and contacts. 7. Hidden URLs - shortened URLs are being used to hide malicious sites and software

Top 10 Smartphone Threats (cont.) 8. A Few Bad Apps - Hackers used a Trojan known as Droiddream and hid in it as many as 50 different rogue apps. 9. The One-Minute Attack - smart hacker can attack quickly and get out before the victim is aware anything is wrong 10. Message Forwarding - A weak password enables a hacker to automatically forward all incoming and outgoing s to him. (October 26, 2012)

Marketing Class Notable Statistics 76% have their own computer 100% use the internet and social media and have an addresses –94% have a facebook account –24% have an instagram account 65% use different passwords for different accounts 94% have posted a picture of yourselves

Marketing Class Concerning Statistics 18% have posted something they didn’t want their parent or employer to see 6% don’t know what privacy settings are 47% have had their or social media account hacked 24% don’t know the strength of their password 12% aren’t aware of security policies at their place of employment

Social Media Use privacy settings Share information sparing Read privacy/policy updates Don’t add apps or add-ons without knowing what information it will access Don’t added people you don’t know Don’t “like” unverified pages

Facebook Risks Fake product/organization/company pages Spam Applications access account information Fake people Fake posts – Joe Bob just watch a monkey kick a dog click here. Advertisements

Instagram Vulnerability “Friendship Vulnerability” –Anyone can add themselves as your friend –Can view photos set as private –Can view profile information your-photos / your-photos / (7/12/2012) Inappropriate pictures Geotagging (location of picture) has-risks #.UI6dQIYoo3Rhttp:// has-risks #.UI6dQIYoo3R (9/19/2012)

Social Media Posting Risks College Recruiters, parents, and potential employers look at these sites Computer administrators at work, school, or on public computers can access the information Application publishers and their affiliates also have the rights to view your content, and post as you The promote feature allows your post to be associate with a brand

LAHS 2013 on Facebook Type of information I was able to find: –Clubs/activities –Statuses –Places –Pictures –Relationship information (status, date, person, etc.) –Family –“Likes” including: “Having Sex”, “Smoking Weed”, movie titles, band names, etc. Check your privacy settings!!!

At Work Security policies are in place to protect data All companies deal with protected data Companies may block a site if they deem it unnecessary or a security risk Backdoor routes into blocked sites could cause extreme potential harm to the system Follow the policies and procedures

Questions

Bonus Questions What percent use facebook?

Bonus Questions What is social engineering?

Bonus Questions What are the three main computer threats?

Bonus Questions In relationship to other countries in 2011 where did the US rank for Online Virus Threats Detected and what was it percentage? (on handout)

Bonus Questions What is phishing?