UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Computer Security at HomeSlide 1 Computer Security Major Security and Privacy Threats Using The Internet At Home.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET SAFETY FOR EVERYONE
INTERNET SAFETY FOR STUDENTS
Viruses & Destructive Programs
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Reliability & Desirability of Data
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Computer security By Isabelle Cooper.
Internet Security and Your Computer Welcome to Boot Camp.
All about viruses, hacking and backups By Harriet Thomas.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Cyber Security and Computer Safety
Safety.
Cyber Info Gathering Techniques
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Risk of the Internet At Home
Staying safe on the internet
Cyber Security and Computer Safety
Lesson 2: Epic Security Considerations
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Presentation transcript:

UT Wing Civil Air Patrol

Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social Engineering

Social Media Do you know how much information an individual can collect about you? You are probably already sharing more data than you think Tagged pictures can show famous landmarks helping to identify hometown You might already be sharing hometown, job, school with everyone

Info Gleaned from Facebook Job listed School listed Residence listed Family info listed Hometown listed What can someone do with that info?

Modern Concern for Members Bad guys are looking for Military members and their families, be aware of how to post pictures.

Metadata Data on data Can have GPS coordinates imbedded in the image: 34 pictures in SLC, UT. Hmmm, probably lives there… Remember: It is easy to do a reverse lookup of someone’s name online to find an address if I can already narrow the search down to a City or State

Social Media Solution: Lock down privacy settings to only share with friends Be careful on how you affiliate yourself with different entities; if someone doesn’t like that group you may become a target

Man in the Middle Attacks: MITM A hacker can intercept data going from your computer to the router You do not have security on an unsecure network! Unsecure networks include Coffe Shops, Hotels, Airports Your passwords and usernames can be seen by a hacker, even if using HTTPS when on an unsecure network Always do online banking, and sensitive web use on a secure network that is trusted WEP encryption does not make your network very secure, may be time to upgrade to WPA2 Disable WPS is on your router, this can be brute-forced and compromise your network

Malware Hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs 30% of households in the U.S. are infected with Malware SLC ranks 5 th in the U.S. for most computer infections A hacker can gain access to your computer to steal passwords, steal documents, use your webcam or microphone, or use your computer to attack another Most malware is installed by opening attachments.

Malware Continued Phishing is done by either attaching a bad file that you have to open, and in SOME cases install Could be opened by having a URL link that takes you to a site that looks like the expected site but the URL name is wrong. Anti-virus use will NOT stop you from installing malware or a virus! The computer usually asks YOUR permission to install a piece of software that you have to agree to – unknowingly. NEVER download anything unless you know exactly what it is! Never go to a webpage unless you know exactly what it is!

Social Engineering A hacker will have full access to your computer if the can have physical access Never use a USB thumb drive, disc, or open an attachment from anyone you don’t trust. Never download anything unless you know exactly what it is If a bad person can have a few minutes alone with your computer, they can easily get full access A bad person will try to trick you (socially engineer you) and get you to use a thumbdrive, disc, or file that is corrupted