David Brookins Katherine Galang Earron Twitty CSCE 590.

Slides:



Advertisements
Similar presentations
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Advertisements

CHANGE YOUR PASSWORD Visit name] At the “Welcome to KaplanWire” screen, enter: User ID: [Your assigned ID] Password:
Cyber Security Awareness Day October 17, Welcome Dr. Amanda Lee Vice President of Instructional Services.
The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
Technology Plan EDLD 5362 Casey Smith.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Student Orientation for Distance Learning Central Piedmont Community College Distance Learning.
Cash study 5 Chapter 9 Not for Profit Organization Craig Lizotte.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Risk Management Vs Risk avoidance William Gillette.
Microsoft® Software Assurance Program Employee Benefits
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Marketing of Information Security Products. The business case for Information Security Management.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
BoomWare A Simple Interaction Software. Team Members Caitlin Hunter Vincent Maione Danielle Clemson George McHugh.
Models for Estimating Risk and Optimizing the Return on Security Investment.
Chapter 4.  Can technology alone provide the best security for your organization?
1.1 System Performance Security Module 1 Version 5.
Resources to Support Training Programs for CSIRTs.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Data Analysis for Student Learning Using Data to Make a Difference Laura Gallogly MVECA
Computer & Network Security
Introducing Digital Money Coaching September, 2015.
OnlineInset.net Ltd is a non-profit training company limited by guarantee that develops training courses to teach people who support children.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
KSU EDCI 763: ID Fall 2010 Harris Instructional Design Statement of Purpose, Needs Analysis, and Task Analysis.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
Step 4 Presenter: Updated 6/21/2013. Training Overview Introduction Walk Through Step 4 Scheduled FET Trainings & Completion Dates for FET Step(s) Question(s)
OnlineInset.net Ltd is a non-profit training company limited by guarantee that develops training courses to teach people who support children.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
CSCE 548 Secure Software Development Security Operations.
Morris County AARP TaxAide TaxWise Familiarization Class 2.
Security Awareness – Essential Part of Security Management Ilze Murane.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
 The Business Education Department of Pasco High School needs a 3D curriculum that guide/support a diverse group of students to meet the demanding skills.
Assessments Diagnostic Testing This is a short test to determine the learner’s level of computer knowledge prior to taking the class. It will be a computerized.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Using Internet Explorer go to driversalert.com Employees who operate vehicles on department business should use the following instructions to access and.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Technology improves education to a great extent and it has now become a need for revolutionizing education for the better. (Saxena, S. 2013) Teachers.
Joomla Bird ! Joomla Bird is a Web Design, Consultancy and Software Development Company catering to the wide range of clients globally.
Call Us: (Toll Free)
SAS Curriculum Mapping Trainer (SAS CMT) October 2011.
Public Tech Instruction: Internet Safety March 26, 2014.
Information Security in Laurier Grant Li Wilfrid Laurier University.
 Midas PC touch is one of the fastest growing companies that offer 24X7 technical assistance and online computer support services to computer users worldwide.
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
Welcome McAfee Not updating In Windows
Overview of E-Learning Authoring Software
Lesson 3 Safe Computing.
Computer Virus and Antivirus
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Union County Auditor’s Office Budgetary Staff
Project Overview Visit Now:
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
ORIENTATION TO CANVAS.
InLoox PM Web App product presentation
Effective Practitioner: Getting Started…
Protecting Senior Citizens from Phishing s
Learning Link Scotland
People and ICT INFO 2.
How to Stay Safe Online Rollie Edwards.
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: Oracle WebCenter Training
Presentation transcript:

David Brookins Katherine Galang Earron Twitty CSCE 590

 2009 = 12.9% of U.S. population  2030 = 19% of U.S. population

 Create a framework for keeping the elderly safe online  Raising their awareness of threats and arming them with the knowledge of how to respond to them

 Basis of this training program is based off of research from Carnegie Mellon. ◦ Idea is to present current threats, risks, scams, and other dangers in a way that is simple and easy for the elderly to pick up and retain ◦ Use of visuals and the demonstration of parallels to concepts that they are already familiar with to attain and retain information

 Non-Paid Volunteer program  Would range from college students to professionals, to company wide initiatives

 Each would be required to attend one or more training sessions that will instruct them on current  Assigned to 1 of 3 different teams based on their skill set ◦ Advertising ◦ Content ◦ Tech team

 Companies would be in support of the program and donate funds  Companies could provide incentives for the senior citizens who complete the sessions  Partner with companies who have a strong senior based such as AARP

 Help desk style program ◦ Various ways of contact ◦ Preferably face to face so that the user could be walked through the procedures  Several courses and sessions for the seniors to attend in the topic of security

 1 st session ◦ Seniors will take a short proficiency test to help best cater to their experience level ◦ Custom training session will be designed for them 2 nd session ◦ Overview of the computer and other devices ◦ Assessment at the end of course

 3 rd session ◦ Main security course ◦ Description of threats, vulnerabilities and threats  4 th session ◦ Defense course ◦ Installation of antivirus software ◦ Information security(sensitive information, passwords, etc.)

 5 th session ◦ Observation of Internet navigation ◦ Assessment against various internet attacks

 Device that will help seniors navigate the internet and apps (essentially a tablet) ◦ User interface would be designed for the elderly demographic  Application to alter device’s GUI ◦ Alert user if entering a scam website ◦ Antivirus updates ◦ Alert to pop up to ensure that website is safe or recipient is legitimate before entering sensitive data