How to protect yourself Hacked Construction Sign: MIT, April 2007 at intersection of Vassar & Main Streets Information Security:

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Cyber Safety Assessment Review
Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Social media threats. Warning! May contain mild peril.
Technological Awareness for Teens and Young Adults.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Do you know how to keep yourself safe?
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
Protecting Yourself Online (Information Assurance)
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
INTERNET SAFETY Tips for becoming a “surfer” dude!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
“Antibiotics don't work against viruses.” - Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8 th, 2013 University of.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Safe Use of Social Media Cadets – Air Force’s Future.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
E-safety Quiz. What is E-safety? E-safety is keeping safe online. It is very important to know how to do this now as there is more and more social networking.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
INTERNET: The Good, The Bad and The Ugly
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
E-Safety, CSE and Prevent. THINK you know about ONLINE & SOCIAL MEDIA SAFETY?
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Cyber Safety Jamie Salazar.
Cyber Safety. Privacy What is safe to talk about online?
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Cybersafety 4 Kids: Smart Moves in an Online World.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Technological Awareness for Teens and Young Adults.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Internet Safety.
Safety.
Cyber Safe – WGC Wellness Day
Information Security.
How to use the internet safely and How to protect my personal data?
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
E-safety and what you need to know!
Social Media Safety Freshman Seminar.
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Lesson 2- Protecting Yourself Online
Presentation transcript:

How to protect yourself Hacked Construction Sign: MIT, April 2007 at intersection of Vassar & Main Streets Information Security:

What is Information Security? Why is InfoSec Important? Threats Are you protected? Can You Crack My Password? Creating a Strong Password | How Many Possibilities? Program Your Own Brute Force Password Example: TI-83 Coming Up…

Information Security Is… protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Source: What information do you have?

Information Security is not just for companies

Information Security Protects You

Why is InfoSec Important? Protect yourself –Your good name (Identity) –Financial Credit –Safety Protect your family & friends Privacy Stalking Bullying Harrassment

Threats “Facebook Posting Leads to Student’s Arrest” – Shelby Coates 41NBC.com (WMGT) 11/2/09 “Friday the student was arrested for a post he made on his Facebook page. School officials found out about the posting and called Macon Police.” The posting was most likely a joke.

Threats “Cyber criminals lurk on social networking sites” – Larry Magid, Mercury News (San Jose) 11/23/09 “Threats on those sites include applications and quizzes, as well as malware, worms and viruses. …information you post yourself that can jeopardize your privacy and your security. "we have a tendency on social networks to share more information that we need to. While you may need to reveal which schools you went to and where you worked to connect with old school mates or colleagues, "you don't need to share your date of birth, phone number and address.” Quiz results texted to your cell: What information could be compromised?

Threats “Oklahoma Gangs Turn to Social Media to Boost Recruiting” – Michael McNutt, NewsOK.com (Oklahoma) 11/29/09 “Gang members in Oklahoma have begun using cell phones and text messaging to conduct criminal activities, and Internet social media such as Facebook and YouTube to recruit members as young as second-graders, according to a survey of gang activity in the state.” recruiting/article/

Threats “Social network Facebook plagued with new worm threat” – Jonathan Ong, International Business Times 11/28/09 “Security researchers have identified a new worm affecting popular social networking site Facebook. The worm is said to be responsible for luring people out to adult web sites and automatically replicating itself across profile pages.” threat.htm

Threats Embarrassment: Information can last a long time Future Employer Scholarship Recipient Future In Laws?

MESD 2009

MESD 2001

MESD 2004

Would you hire me?

Are You Protected? What strategies do you use to protect your information?

Strategies to Protect Your ID Online 1.Clam Up – for Registration only provide necessary information 2.Lie -- Don’t provide real information unless necessary 3.Look for the Lock – https encrypts your information 4.Sniff out Phish -- beware of scams 5.Search Safely -- Use safe search settings 6.Use Strong Passwords 7.Trust, but Verify Sources:

Resources

Can You Crack My Password? You find the following information about me online: Live in Edgewood Work at UNM Dog named after my favorite ghost town, Bodie Fan of old Mercedes-Benz What’s my password?

Creating a Strong Password Each additional character increases password strength (how much?) Complexity (how much?) Easy to Remember, Hard to Guess Real world Math: Factorials! & Percentages%

Create a Strong Password Task #1 Create a strong password Guidelines: Between 4-8 characters Letters & numbers only Task #2 What is the probability of cracking your password?

TI-83 Password Attack Brute Force Attacks – What are they? TI-83 simple example:

Program your TI-83 1.PRGM 2.Arrow Right to NEW 3.ENTER 4.Name = PASSWORD 5.ENTER 6.PRGM 7.#4

Program your TI-83 8.ALPHA “P,1, 100) PROGRAM:PASSWORD :For(P,1,100) 9.ENTER 10.PRGM

Program your TI Arrow right to I/O 12. Select #3 13. ALPHA “P” 14.ENTER 15.PRGM 16. Select # nd Quit

Run Your Program! 18.PRGM 19.ENTER 20.ENTER What was the result? How does this simulate a brute force attack?

Thank you!