Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

SOCIAL ENGINEERING AND INFORMATION PROTECTION BEST PRACTICES.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Johnson Logistics Solutions Office of Systems and Information Technology.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst.
Internet Security In the 21st Century Presented by Daniel Mills.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
K A R A Creations ARLIARLI Topic: Why facebook can be dangerous!!
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Security. Survey Results Question What do you think Information Security is?
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Information Security 101 Richard Davis, Rob Laltrello.
Importance of Privacy Internet Safety
Cybersecurity Awareness
Information Security Awareness 101
Lesson 2: Epic Security Considerations
Bethesda Cybersecurity Club
Internet Safety – Social Media
Presentation transcript:

Information/Internet Safety

MBA Candidates at UNM Anderson School of Management This is our homework

Overview Personal Internet Security Social Engineering safeguards Passwords Mobile Devices Social Media

Personal Internet Security

Personal Internet Security Keep anti-virus and anti-malware software up-to-date Use a spam filter Activate system’s firewall Update OS and Browser automatically Complex passwords and change frequently

Personal Internet Security Physical security Unfamiliar links Open wi-fi for personal business Use privacy and security settings on social networks BACK UP! BACK UP! BACK UP! WHAT IS THE WEAKEST LINK IN SECURITY?

Safeguards Spam Filter Unfamiliar links

Safeguards

Detecting Spam Strange Addresses Misspelt Words Don’t Click on Unknown Links If it Sounds to Good to be True, it Probably is.

Safeguards

Passwords

Types of password attacks –Brute Force Attack –Dictionary Attacks How to protect against these attacks –Change passwords regularly –Choose a good password Which one is better? –password –Pa$3O!d –Pa$3O!dS!

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: password

Password Strength Standard alphabet set without numbers and no special characters How long will it take to randomly guess the password? (A.K.A Brut Force Attack) Example: password

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brut Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Standard alphabet set with numbers, special characters, and case sensitive How long will it take to randomly guess the password? (A.K.A Brute Force Attack) Example: Pa$s3O!d (password)

Password Strength Minimum of 8 characters Better not to have any logical sequence –I.E. Pet Names, favorite place, mother’s maiden name, names, etc. If you do use a logical sequence substitute letters with special characters and case sensitive letters –I.E. albuquerque = A1bU9er6u3 Not sure if it is good?

Password Strength How long until a brute force attack is successful? letyouin 7.0 seconds letyouandmein 2.6 years L37$oU!n 18.9 hours 8,010,363.4 years

Mobile Device Security

Physical Security Use a Case Buy screen protectors to prevent scratches Don’t leave it in extreme temperatures Personalize your device Mobile Device Security

Securing Information Use a PIN Disable auto complete features & Password memory Be careful about what permission apps have Backup your data

Social Engineering

What is Social Engineering? –“…the art of manipulating people into performing actions or divulging confidential information.” (Wikipedia) Examples? –White Collar –Burn Notice

Social Engineering Who was the victim? How could this have been prevented?

Social Engineering How to protect yourself –Pay attention to what questions you are being asked –Stop and think about what someone is asking you to do or divulge –Always follows rules, policy and guidelines –NEED TO KNOW (NTK) What is Social Engineering?

Social Networking

Who has a Facebook account? –1–1.01 Billion people (1,010,000,000) What is the World’s population? –7–7.05 Billion people

Who looks at you posts, statues, and likes? –1,099,999,999 other Facebook users Should we be careful on what we post online? –YES!

Social Networking How to protect yourself –Check you security settings

Social Networking

Review Personal Internet Security Social Engineering safeguards Passwords Mobile Devices Social Media