OPSEC & Social Media dd mmm yy Overall Classification of this Briefing is UNCLASSIFIED//FOUO FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
Fleet & Family Support Ombudsman Program & Operations Security
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
NEW YORK NATIONAL GUARD FAMILY PROGRAMS Offered & presented by CW2 Walker Family Programs OPSEC Program Manager.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
OPSEC and Social Networking
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
UNCLASSIFIED VP-4 Skinny Dragons Operations Security (OPSEC) and Social Networking.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Safe Use of Social Media Cadets – Air Force’s Future.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Online Reputation A guide for children aged 7+
Cyber Security and Computer Safety
Safety.
Creating your online identity
OPSEC & Social Networking dd mmm yy
Internet Identity, Safety, & Security
Digital Citizenship Middle School
NSASB FRG Training Code of Conduct & OPSEC.
Command Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Cybersecurity Awareness
OPSEC and Social Media DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Risk of the Internet At Home
JEB – Little Creek (Bldg 1126)
Cyber Security and Computer Safety
Overall Classification of this Briefing is UNCLASSIFIED
CYBERSAFETY & Personal information
Internet Safety – Social Media
OPSEC and Social Media DD MMM YY
Command Indoctrination Operations Security DD MMM YY
Overview OPSEC Threat Critical Information Indicators Data Aggregation
OPSEC & Social Media DD MMM YY
Presentation transcript:

OPSEC & Social Media dd mmm yy Overall Classification of this Briefing is UNCLASSIFIED//FOUO FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET   

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) (757) OPSEC

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    OPSEC is a process that identifies critical information, outlines potential threats, vulnerabilities, and risks and develops counter measures to safeguard critical information Operations Security

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Critical Information  Names and photos of you, your family and co-workers  Usernames, passwords, network details  Job title, location, salary  Home security systems, internet service provider  What kind of pets and how many  Position at work, certifications, physical limitations  Family routines  Vacation and travel itineraries  Social security number, credit cards, banking information  Hobbies, likes, dislikes, etc.  Information we must protect  Information an adversary would need to do you harm

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Threat  Threat: The capability of an adversary coupled with their intention to undertake actions against you or your family.  Conventional Threats Military opponents Foreign adversaries/countries  Unconventional Threats Organized crime Foreign terrorists Home grown terrorism Insiders (espionage) Hackers, phishing scams Thieves, stalkers, pedophiles

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    ISIS Threat Army warns US military personnel on ISIS threat to family members Real or Perceived….or does it matter?

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET     Weakness the adversary/enemy can exploit to get critical information  Vulnerabilities make you susceptible to intelligence/data collection.  Poor security and sharing too much information are common, easily exploited vulnerabilities.  Blogs, posts, s, phone calls and conversations in restaurants, airports and other public places expose important information to potential adversaries and are a very common vulnerability. Vulnerability

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET     Lack of Awareness  Data aggregation  Unsecure communications  Social engineering  Trash  Technology  Internet/social networking  Blogs  Predictable actions & patterns Common Vulnerabilities

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Risk scenario: You are proud of your family. Risk So you prominently display personal information about them on the back of your car for everyone to see. What is the possible risk associated with displaying these indicators??

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Countermeasures  Anything that effectively negates or reduces an adversary's ability to exploit vulnerabilities or collect & process critical information  Hide/control indicators  Protect personal information  Change routines & routes  Differ times you do activities  Countermeasures are intended to influence or manipulate an adversaries perception  Take no action  React too late  Take the wrong action

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Social Networking Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries.

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Pro’s  For the Individual  Entertaining  Maintain Relationships  Network  Centralized Information  Collaborate

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Pro’s  For the military  Recruiting  Public Relations  Connect with AD, family members & the public  Solicit ideas and feedback  Information Warfare “Counter Taliban tactics with speed, accuracy & transparency in our reporting.” USFOR-A

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Con’s  Unsecure, unencrypted communications  Unrestricted access  No user/identity authentication  Easy source of PII & CI  Malicious code/virus’  Prime target for data aggregation  Cybercriminals  Potential to compromise certificates

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    SNS and Your Clearance The following is a security awareness statement signed by the Chief of Security, Pentagon Chief Information Officer, OSD Network Directorate: “Social sites risk security clearance. If you hold a security clearance or if you ever want to apply for one, be mindful of your postings and contacts online, particularly on social networking sites such as Facebook and Twitter. These sites pose risks to gaining and keeping a security clearance. Question 14 of the National Agency Questionnaire (SF-86) asks for names of your relatives and associates. The term associate is defined as any foreign national that you or your spouse are bound by affection, obligation, or close and continuing contact.

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Do’s and Don’ts of Social Networking

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Remember Computer Security Do not be an easy target for computer crimes  Hacking  Theft  Planted code vs.  Antivirus software  Firewalls  Strong Passwords  Permission Settings

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Verify All Friend Requests Social engineering starts with a friend request  Bad people can get data from :  Free people search engines  Other SNS’s  Your posts/profile  Your friends posts/profile Do Not Trust Who You Cannot See

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Utilize All Available Privacy Settings  Customize available settings to be as secure as possible  “Everyone” may be accessed by anyone with access to the internet  How many security settings are available on Facebook? Over 120

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Watch Your Friends Settings Sure your profile is secure, but what about your 115 friends profile settings?

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Be Discrete  Consider the information you make available  What is your digital foot print?  What are your friends & family putting out? “Do’s”

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Closely Monitor Your Children’s Web Use  Cyber-bullying  Kidnapping  “Sexting”  “Sextortion”  Stalking  Pedophiles  500,000+ registered sex Offenders in the USA  95,000 registered sex offenders profiles on Social Media

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Verify Links & Files Before Executing Links and Downloads and Spam Oh My!  Phishing scams  Malicious coding  Viruses  Scareware  Spam Verify before executing!

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Be an Informed User of a SNS  How much personal information do you broadcast?  Are you very careful about what details you post?  Do you understand data aggregation issues?  Are you willing to find and learn all the security settings and keep up with them as they change? Are you willing to accept the risk?

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Do’s” Do: Assume the Internet is FOREVER  There is no true delete on the internet  WWW means World Wide Web  Every Picture  Every Post  Every Detail

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Don’ts” Don’t: Depend on SNS’s Security Settings But it’s set to private … right?  Hackers  Incorrect or incomplete settings  Sale of data  Upgrades / site changes  “Risks inherent in sharing information”  “USE AT YOUR OWN RISK. We do not guarantee that only authorized persons will view your information.”

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    “Don’ts” Don’t: Discuss Details  Never post anything you would not tell directly to a bad guy  Never post private or personal information  Assume the information you share will be made public If It Has To Be Protected, Protect It

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Questions? Contact the NOST for assistance or any of the following:  Computer-based training  FRG/Ombudsman support  OPSEC & other tailored briefs  Videos, posters, brochures & fliers  OPSEC Reminder Cards  Two-day Navy OPSEC Officer course  General OPSEC support  Other Resources Naval OPSEC Support Team

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    Naval OPSEC Support Team (NOST) Naval Information Operations Command (NIOC) (757) OPSEC