Information Security. Survey Results Question What do you think Information Security is?

Slides:



Advertisements
Similar presentations
Privacy: Facebook, Twitter
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
Ethical Hacking by Shivam.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
How To Protect Your Privacy and Avoid Identity Theft Online.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Today’s Objective: I will create a strong, private password.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Internet Safety.
Internet safety By Lydia Snowden.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
8/1/2015. Please Ask Questions! 2 Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Protecting Your Personal Information November 15, 2013.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Presented By: Allan Clapp. Is all of this “security stuff” necessary? Different website “security” measures. Ways to choose User IDs. Ways to choose strong.
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Get Safe Online Expert advice for everyone In association with.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Issues for Computer Users, Electronic Devices, Computer and Safety.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
SOCIAL NETWORKING SAFETY & SECURITY. 2 CLASSROOM ETIQUETTE Please turn off all cell phones Leave food & drink outside Water bottles are okay “Respect/
Creating your online identity
Common Methods Used to Commit Computer Crimes
Ways to protect yourself against hackers
Internet Basics.
Social Media: What You Should Know
Digital $$ Quiz Test your knowledge.
Social Media Safety Freshman Seminar.
Introduction to Computers
Lesson 2: Epic Security Considerations
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Internet Safety – Social Media
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Presentation transcript:

Information Security

Survey Results

Question What do you think Information Security is?

What is Information Security? Information Security is: –To protect the confidentiality, integrity and availability of information assets –It includes the systems and hardware that use, store, and transmit the information

Survey Results

Information Security in the News Snowden NSA Leaks –Who: Edward Snowden –When: May 2013 –What: Espionage Target Data Breach –Who: Unknown –When: December 2013 –What: Unauthorized access to credit/debit card information

Why is Information Security Important? Usage of computer/technology to store and transmit information Increase of cybercrimes –Hacking Securing private information Daily use of technology and information systems

How Does this Pertain to You? Private information –Personal information Daily use of technology –Computers/smart phones/tablets Social networking –Facebook –Twitter –Instagram –And more!

Survey Results

What is Personal Information? Personal information –Date of birth –Social security number –Passwords –Pin numbers –Addresses –Bank information –Answers to security questions Mother’s maiden name, place of birth, etc.

Question How can you protect your personal information on social networking sites?

Protecting Your Information Protecting your information –Privacy settings exist for a reason Know how to secure information you don’t want public (i.e. pictures, personal info, school/work info, etc.) Sensitive information on secure websites only

Question Even though your privacy settings are properly set, what do you still have to be careful of on social networking sites?

Privacy Settings are Properly Set but… Privacy settings are set but you still have to be careful… –Who are your friends? Do you know them? Catfish –Are your Friends/Followers really who they say they are?

Social Networking Sites Accessing information is easy Friending/following people Information on social networking sites are searchable on search engines

Social Networking Safety Don’t give out personal information Know what you’ve posted about yourself Location updates Be selective about who you accept as friends/followers Assume everything you post is PERMANENT Be careful about installing extras

Webcams Miss Teen USA 2013 Laptop webcam hacked by former classmate Hacker had as many as 150 “slave computers” Began threatening victims

How Does it Work? RATs: Remote Administration Tools –Hackers can remotely access a person’s computer without the owner knowing –The camera light will not always be on!

Question How can you make sure that no one watches you on your webcam?

Choosing Strong Passwords If your password is in the dictionary, it’s pretty much useless! –Dictionary attacks utilize software that scan a dictionary until the password is cracked A strong password consists of –At least 8 characters –Upper and lowercase letters –Numbers –Special characters ($, etc.) –Password Generators, password crackingPassword Generatorspassword cracking If a hacker can’t crack your password within a few seconds or minutes, they will likely move on!

Question What are the four components of a strong password?

Survey Results

Security-Related Careers Security Crime Investigator/Forensics Expert –Figure out how systems were hacked System, Network, or Web Penetration Tester –Find vulnerabilities and test them (aka legal hacking!) Federal government Security services Healthcare Banks Pretty much anywhere!

Technology Degrees Information Assurance Management Information Systems Management of Technology Computer Science Computer Engineering Cybersecurity

Question Name two industries that hire people with security-related degrees

Questions?