Wireless Security: Protect yourself when you’re mobile.

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
POSSIBLE THREATS TO DATA
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
UNDERSTANDING JAVA APIS FOR MOBILE DEVICES v0.01.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
10 Essential Security Measures PA Turnpike Commission.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
Mobile Computing in Society Jared Sutherland CIS 497
AS ICT.  A portable communication device is a pocket sized device that is carried around by an individual  They typically have a display screen with.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CPS Acceptable Use Policy Day 2 – Technology Session.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PDAs for presentations in the Classroom Caroline Denigan
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Module Common Network Environments, Connectivity and Security Issues.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
HOW-TO guide This tutorial has sound.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
Chapter 7 Mobile Commerce— The Business of Time
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
I.C.T. Terminology UNIT 1: GETTING STARTED. Announcement The content of the presentation contains many terms. You should make a note of any terms appear.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Mobile Device Security Management Leyna Belinsky.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
Security Issues.
Two-factor authentication
Staying Austin College
CompTIA IT Fundamentals Study Guide (FC0-U51)
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Information Technology Services Education and Awareness Team
Technology, Issues, and Solutions by David Clark
GSBS IT Resources and Security
9 ways to avoid viruses and spyware
Information Technology Services Education and Awareness Team
3.3 Mobile Digital Communication
Presentation transcript:

Wireless Security: Protect yourself when you’re mobile

Wireless Security: It’s not Just for Laptops Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax. Wireless security is not just for laptops: consider these wireless devices Cell phones Blackberry Devices PocketPC

Cellular Devices  Cellular phones are not considered secure devices Traditionally do not contain options or features to increase security.  Usually contain valuable information Phone numbers, contact information, calendar functions, photos, voice recording options, etc.  Protect your cellular device from loss or damage  Use whatever security features are possible, including locking your phone with a password or security code.

PDAs (Blackberries, PalmPilots, etc)  Use password protection, if available. Be sure to use a strong password.  Where possible, data transmissions from a PDA should be encrypted.  Ethernet, Bluetooth, and other wireless access to the PDA should be disabled when not in use.  Wireless access should be configured to request the user for confirmation before connecting to anything.  Be cautious when opening any attachments, as they could include software harmful to your PDA.

Laptop Safety and Wireless Guidelines  Password protect your laptop  Follow a security checklist. An example can be found on the SecurePurdue website: mobileDevice.cfm  Do not leave your laptop unattended, and be sure to store it in a secure location when not in use  Wireless access should require user authentication before connecting to the computer  Disable wireless access when not in use  Only use secure wireless connections: a secure wireless connection has a padlock icon next to it

Before you connect…  Only connect to secure wireless networks Secure networks will be noted with the gold lock icon  Connect only to networks you know and trust  Limit what sites you visit when using wireless networks  Don’t access sensitive information on unsecured sites while traveling  There may be “imposter” PAL (Purdue Air Link) 2.0 networks that are not secure, and are not Purdue networks. The non- Purdue 2.0 networks will exist outside/on the border of the area PAL 2.0 reaches

Resources  Mobile Device Security Guidelines actices/mobileDevice.cfm actices/mobileDevice.cfm  Security Checklist ecurityChecklist.pdf ecurityChecklist.pdf  Security While Traveling actices/traveling.cfm actices/traveling.cfm