Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

Digital Citizenship Cyber bullying Answers. 1.What is a Cyber bully? a. A bully that intimidates over the internet and is 17 years old or younger b. A.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Time 3 rd grade. Personal Information -Don’t post your , address, or your cell phone number. -Don’t share your last name online. -Don’t post.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
What is the Internet & Why is it important to be safe?
How to keep your kids safe online
e-safety and cyber bullying
Information for Students and Families
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.

Cyber bullying Aj Newman Per 2 Jan/26/11. Cyber bullying  Cyber bullying is everywhere and its true.  Cyber bullying is horrible and there are multiple.
How To Protect Your Privacy and Avoid Identity Theft Online.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Internet Safety Christopher M. Sattele PLS: SP10 ENGOL P. Hutton.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
How To Protect Your Privacy and Avoid Identity Theft Online.
Protecting Yourself Online (Information Assurance)
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Anti- bullying week Year 4.
“It is like, totally anonymous, so no one worries about getting in trouble. Lots of kids would never do this stuff in the ‘real world.’” —13 year old boy.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 4.0 – 10/
Controlling Your Social Networking Privacy Settings Stay safe online!
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Safe Use of Social Media Cadets – Air Force’s Future.
Protecting Your Personal Information November 15, 2013.
Internet Safety & Online Citizenship
Living In The Information Age. Keeping your Information Safe Secure ways to access the internet. Posting personal information on Facebook and other social.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
28 th January 2008 The Jitty. Why do we use the Internet? Communication Information Entertainment Escapism Attention seeking Genuinely seeking help Showcasing/promoting.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
The Dangers and Usefulness of Social Communication.
Cyber Safety. Privacy What is safe to talk about online?
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
What Would You Do? The Risks of Behavior on the Internet.
Special Project Cyber bullying Issues By: Abby Heim.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Cybersafety 4 Kids: Smart Moves in an Online World.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
Internet Safety.
Fraud Protection.
Fraud protection.
8 online danger tips By: kailee bariring.
Cyberbullying BY LORD MUSHANGO.
Information Security.
I Can Stay Safe Online! Read the title slide with the students or have the group read it aloud. Introduce the lesson by saying that we can use the computer.
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Social Media Safety Freshman Seminar.
Anti bullying Week VMG What does bullying mean to you?
Safer computing week Create, connect and share respect.
Social Media Dangers.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Information System Security

Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice

Survey Results

Social Media Scandals In March of 2009, 22-year old Connor Riley was offered a job at Cisco. A Cisco employee responded to her tweet offering to pass her sentiments along to the hiring manager. Her job offer was then retracted

Social Networks 71% of you said you accept friend requests from people you do not know Risks associated with: Accepting friend requests from strangers Communicating with people you don’t know Answering personal questions (i.e. location, vacations, personal info, etc.)

Social Networks Location Services can be very convenient but also very dangerous Turn off GPS unless you really need it

Social Networks Importance of Privacy Settings 64% of you said that you keep your social networks set to private What information can friends/strangers see on your profile? What does the information you post say about you? –Future employers –Media –Strangers –Teachers

Social Networks: Wrap-up Become familiar with privacy policies Remember that the internet is a public resource Be skeptical: do not believe everything you read online Evaluate your privacy settings and how much information you allow others to see

Multi-Factor Authentication

Password Protection 57% of you said that you share passwords Passwords ensure the security and confidentiality of data that is stored Sharing passwords compromises your own confidentiality 95% of methods used to compromise computer security start with trying to figure out the password Game:

Passwords What makes a strong password? –Longer passwords stronger (12 char.) –Complexity Upper & Lowercase Numbers Symbols –Computer generated passwords

Password Manager: LastPass

Apple

Hacking: Phishing Schemes Only 44% of the class was confident that they have not opened attachments from strangers

Phishing Tips for recognizing phishing schemes: –Poor spelling/grammar –URL does not match hyperlinked address –Message asks for personal information –Offer seems too good to be true –You did not initiate the action –Message does not address you by name –Message comes from strange address

Phishing Activity

Answers

Cyber Bullying

Statistics More than half of you know someone who has been the victim or perpetrator of Cyber Bullying Girls are about twice as likely as boys to be victims/perpetrators Victims are 2 to 9 times more likely to consider committing suicide

What to do about Cyber Bullying Video

Thank you! Any questions???