Download presentation
Presentation is loading. Please wait.
Published byBerniece Mason Modified over 9 years ago
1
Information Assurance Outreach
2
Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration
3
Survey Results Have you ever communicated with someone you haven’t met face-to-face?
4
Survey Results Have you ever answered personal questions about your age, gender or location in e-mail, IM or online chat? Have you ever answered questions or given out information such as your phone number, address, social security number, etc. over the internet?
5
Password Management In 2009, an 18-year-old hacker used a dictionary attack to gain access to an administrator’s account on Twitter. He used an automated password-guesser that would guess common English words. –The password was “happiness.” He used the administrator’s account to gain access to other accounts including Barack Obama’s account by resetting the account passwords..
6
Password Management Passwords should be strong, unique, and difficult to guess. A strong password should be at least 8-10 characters long and multiple character types. –Lowercase letters –Uppercase letters –Numbers –Special characters A different password should be used for each account to prevent an attacker from gaining access to multiple accounts.
7
Creating a Strong Password Start with a sentence that has at least 8 words. –reading is the most enjoyable thing to do Substitute numbers for words. –reading is the most enjoyable thing 2 do Use the first letter of each word in the sentence to create a new word. –ritmet2d Add some upper case letters. –Ritmet2D Substitute special characters that look like or remind you of letters. –R!tmet2D
8
Email Security Email accounts are common attack targets. In 2011, a man was arrested for hacking the email accounts of celebrities to steal their private photos and confidential documents. He gained access to the email accounts of Mila Kunis, Scarlet Johansson, Renee Olstead and dozens of other celebrities. He used publically available information to correctly answer the security questions needed to reset the passwords. He collected numerous private photographs, business contracts, letters, driver’s license information, and social security numbers.
9
Email Security Use different usernames for each email address. Use different for each email account If the identity of the sender cannot be verified, you should consider deleting the email without opening it. You should never open a links or attachment from a person that you do not know.
10
Using Links It is possible for someone to create links with misleading names. People create these fake links in order to obtain private information such as a password or banking information. In 2013, an employee at a European company was tricked into providing the password for the company’s bank account. –Lost over $160,000
11
Phishing http://www.youtube.com/watch?v=K8lWLwuiDwk
12
Online Predators An 11-year-old girl ran away from home and went to Florence with a 23-year-old man she met on the internet. Julie decided to run-away from home to be with Tim (a much older man). Julie was found three-weeks later, Tim was arrested and is now serving 25-years in prison. Tim sent Julie a letter from prison blaming her for his incarceration and threatened to kill her. People can be forced into things they don’t want to do. Kidnapped Slavery
13
Internet Privacy Certain information should not be shared on the Internet. –Name –Age –Gender –Address –Telephone Number –Social Security Number You should never meet with a stranger that you meet online.
14
Even Smart Kids Make Mistakes http://www.youtube.com/watch?v=zPbm478fD5M
15
Can I get hacked? Celebirties twitter acounts get hacked all the time! – Justin Beiber – Alec Baldwin – Donald Trump – One Direction’s singer Niall Horan
16
Social Media Protect your information through security settings Almost anyone can see your profile information once you are 18 – Facebook provides extra security for minors Bully Block Make sure Google (or other search engines) can’t link people to your profile. Block app invites. Other social media sites have similar security settings, make sure you use them!
17
Social Networking
20
Social Media Attacks http://video.foxbusiness.com/v/2209766731001/
21
Demonstration By visiting a vulnerable web page with an internet browser, hackers can use your webcam to watch you. How can you protect yourself? –Disable webcam when not using it. –Turn off your computer after each use. – Close your laptop.
22
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.