Download presentation
Presentation is loading. Please wait.
1
Information Systems Security and You
2
What is Information Systems Security?
Protecting your data – usually referring to your online or electronic data.
3
Every Day Information Systems Security
4
How do we protect our data?
Passwords Traditional Passwords – a string of characters that allows access to a system PIN – personal number used to gain access to a system. Usually 4-8 digits Fingerprints – cannot be forgotten, forged, or guessed. Facial Recognition – cannot be forgotten but can be forged. Machines that aren’t as sophisticated can be tricked by photos of you.
5
Good vs. Bad Passwords
6
Good vs.Bad Passwords (2 min. 40 sec) Do you think the passwords in the video were good? Why or why not?
7
What makes a password good?
Using symbols Having long passwords (at least 12 characters but longer is better) Not using personal information (like birthday or pet names) Using a combination of numbers and letters * Handout
8
Password Game Split up into 4-5 groups.
Come up with a password that you think will be strong but realistic. (i.e. make sure somebody would be able to use it and remember it in real life). Present your password to the class. Check to see which group created the strongest password!
9
Wifi
10
Public Wifi Scares Fake Wifi (“Flyingstar2”)
Password Free Networks (unencrypted data)
11
Demo - Wireshark Wireshark is an open source packet analyzer (packet sniffer) that can intercept information that is going across a network and keep track of it. (start at 1 min 10 sec)
12
Demo – Wireshark
13
Information Security Lessons for the Film Industry
14
Physical Security Protecting your data – usually referring to your online or electronic data, but physical security is an important part too! How can we protect our physical spaces? Locks Secure spaces/vaults Badges
15
What’s wrong with this picture?
16
What would you do? If you were working on a film what would you want to keep physically safe? How could you keep those things safe?
17
Social Engineering Tricking people into giving you personal or confidential information (stop at 1 min)
18
Social Engineering
19
Social Engineering People use social engineering to:
Try to figure out passwords Get bank information Learn company or government secrets Ex. Kane Gable and CIA John Brennan in 2017
20
Access Controls Access control is a security technique that regulates who or what can view or use resources in a computing environment. Can be physical or logical. Why do you think having access controls is important? Note that this protects data not only from attackers, but also from employees who may make mistakes.
21
Toy Story 2 and Access Control
22
Summary Protecting personal and proprietary information is important!
Passwords should be strong and unique. Be careful when using public wifi. Keep physical areas and information secure. Make use of access controls when necessary.
23
Thank you! Questions?
24
Sources
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.