Download presentation
Presentation is loading. Please wait.
Published byEthan Cobb Modified over 9 years ago
1
Information Security
2
What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training, awareness, and technology. C. The state of being secure D. I don’t know, you haven’t told me yet
3
Information Security “Defending information from unauthorized access.” Bank Accounts, Email, Networks, Devices Protecting assets (organizational or personal) Who cares?
4
Target Credit Card Breach 98 Million Customers Affected –Credit Card Information –Personal Information Emails Address Phone Number What went wrong? Internal Review of Security Systems
5
A bit of History 1930’s/40’s (WWII) –Computer Security (mainframes) –Physical –Permitted Personnel 1960’s (Cold War) –Larry Roberts ARPANET –Founder of the Internet 1970’s/80’s –Popularity Increased Misuse Increased –Ethernet –Department of Defense, Rand Report R-609
6
Rand Report R-609 Securing data Limiting Random and unauthorized access to that data Involving personnel from multiple levels of the organization in matters pertaining to information security
7
A bit of History Continued… 1990’s –Internet was made public 2000- Now –Information Security Personal Use National Defense
8
Today Risks What information can be accessed. How your information can be compromised. Preventative Measures How to prevent your information from being compromised.
9
Approximately how many Global Internet Users are there? A. 5 million B. 10 million C. 2.5 billion D. 5 billion
10
Risks Accessible to anyone –2.5 billion internet users Identity Theft –MTV Catfish Viruses –Virus Protection Software Fraud –Online shopping
11
Social Media U.S. statisticsClass Statistics
12
Which Celeb’s Refuse to Use Twitter? A.George Clooney B.Jennifer Lawrence C.Tina Fey D.Mila Kunis E.All of the above “It could ruin your career.” http://abcnews.go.com/Entertainment/celebrities-twitter/story?id=20866176#5
13
Social Media General Risks Who can see it? What information? Viruses Fraud Your Risks Potential employers, family, friends Location, age, contact information, etc Can access private information Credit cards, social security numbers, identity…
14
Video Systematic Guide to Scary Internet Stuff
15
Which type of program allows for automatic display/download of advertisements? A. Worms B. Trojan C. Spyware D. Adware
16
“This” spreads through the transferring of files and infects as many computers as quickly as possible… A.Worm B.Spyware C.Bot D.Trojan
17
Preventative Measures Strong Passwords Privacy Settings Password Protected Networks Protected Software Firewalls
18
Video Mistakes Even Smart Kids Make Online
19
Passwords Simple –Password1 Easy to Guess –Broncos Known date –Birthday Using the same password –UNM1 –UNM2 What not to do…
20
Passwords What to do… http://www.youtube.com/watch?v=hYyWgPX fx9U
21
Summary Don't drive in bad neighborhoods. If you don't lock your car, it's vulnerable; if you don't secure your computer, it's vulnerable. Reduce your vulnerability, and you reduce the threat. Social Media is incorporated into each of our daily lives. Be smart, be careful.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.