Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Security and You

Similar presentations


Presentation on theme: "Information Systems Security and You"— Presentation transcript:

1 Information Systems Security and You

2 What is Information Systems Security?
Protecting your data – usually referring to your online or electronic data.

3 Every Day Information Systems Security

4 How do we protect our data?
Passwords Traditional Passwords – a string of characters that allows access to a system PIN – personal number used to gain access to a system. Usually 4-8 digits Fingerprints – cannot be forgotten, forged, or guessed. Facial Recognition – cannot be forgotten but can be forged. Machines that aren’t as sophisticated can be tricked by photos of you.

5 Good vs. Bad Passwords

6 Good vs.Bad Passwords (2 min. 40 sec) Do you think the passwords in the video were good? Why or why not?

7 What makes a password good?
Using symbols Having long passwords (at least 12 characters but longer is better) Not using personal information (like birthday or pet names) Using a combination of numbers and letters * Handout

8 Password Game Split up into 4-5 groups.
Come up with a password that you think will be strong but realistic. (i.e. make sure somebody would be able to use it and remember it in real life). Present your password to the class. Check to see which group created the strongest password!

9 Wifi

10 Public Wifi Scares Fake Wifi (“Flyingstar2”)
Password Free Networks (unencrypted data)

11 Demo - Wireshark Wireshark is an open source packet analyzer (packet sniffer) that can intercept information that is going across a network and keep track of it. (start at 1 min 10 sec)

12 Demo – Wireshark

13 Information Security Lessons for the Film Industry

14 Physical Security Protecting your data – usually referring to your online or electronic data, but physical security is an important part too! How can we protect our physical spaces? Locks Secure spaces/vaults Badges

15 What’s wrong with this picture?

16 What would you do? If you were working on a film what would you want to keep physically safe? How could you keep those things safe?

17 Social Engineering Tricking people into giving you personal or confidential information (stop at 1 min)

18 Social Engineering

19 Social Engineering People use social engineering to:
Try to figure out passwords Get bank information Learn company or government secrets Ex. Kane Gable and CIA John Brennan in 2017

20 Access Controls Access control is a security technique that regulates who or what can view or use resources in a computing environment. Can be physical or logical. Why do you think having access controls is important? Note that this protects data not only from attackers, but also from employees who may make mistakes.

21 Toy Story 2 and Access Control

22 Summary Protecting personal and proprietary information is important!
Passwords should be strong and unique. Be careful when using public wifi. Keep physical areas and information secure. Make use of access controls when necessary.

23 Thank you! Questions?

24 Sources


Download ppt "Information Systems Security and You"

Similar presentations


Ads by Google