Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.

Similar presentations


Presentation on theme: "Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security."— Presentation transcript:

1 Protecting Information

2 Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security as part of an outreach program to educate younger people in the community

3 Overview Passwords tips Phishing Keeping your computer safe

4 Passwords Question: –What percentage of students, grades 7-12, share their passwords with someone else? According to a study by Wired Safety.org, 66% of students, grades 7-12, said they shared their password with someone else.

5 Password – Safety Tips Use different passwords Use strong passwords Do not reveal to others Try not to write down passwords Do not type passwords on computers that you do not control Never provide passwords over email or in response to an email request

6 Passwords Are Great, but… While the use of different and strong passwords are great, they still may not be enough. July 2012 – Yahoo hacked –450,000 passwords posted online For increased security, the following can be used in addition to passwords: –Fingerprint reader –Retina Scanner –Voice recognition

7 Phishing Attack Phishing: the act of attempting to acquire information such as usernames, passwords, and credit card details or any sensitive information by portraying a trustworthy entity in an electronic communication.

8 Recent Phishing Attack NBC News reported, at the beginning of this year, a 14-person gang of cyber- criminals tricked an elderly woman into sending her bank account information by sending fake emails from her bank. They stole her life savings of $1.6 million dollars.

9 Recognizing Phishing Attacks Unknown/questionable sender Sense of urgency Questionable subject line Beware or links in email Threats to shut down your account

10 Phishing Example

11 Keeping Your Computer Safe Computer Virus: a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Summer 2012 http://www.youtube.com/watch?v=XiE57dFo0mAhttp://www.youtube.com/watch?v=XiE57dFo0mA Good Solutions? –Anti-virus software –Self-awareness

12 Anti-Virus Software What is anti-virus software? –Protective software designed to defend your computer against malicious attacks, such as viruses. Popular anti-virus software –Norton –McAfee –Bitdefender –Avast

13 Online Searching Fact Most Dangerous Celebrity to Search in 2012?? According to CBS News, Emma Watson was named McAfee's 2012 most dangerous celebrity to search for online. Searching for Emma Watson pictures and downloads had a 12.6% chance of landing on a website that poses online threats

14 Conclusion We live in a digital world that is becoming more reliant on the internet and everything that comes along with it each and every day. Without the knowledge of security threats and safe practices against these threats, our digital world is more dangerous and at risk.

15 Questions


Download ppt "Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security."

Similar presentations


Ads by Google