Download presentation
Presentation is loading. Please wait.
Published byNorma Griffith Modified over 9 years ago
1
Information System Security
2
Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice
3
Survey Results
4
Social Media Scandals In March of 2009, 22-year old Connor Riley was offered a job at Cisco. A Cisco employee responded to her tweet offering to pass her sentiments along to the hiring manager. Her job offer was then retracted
5
Social Networks 71% of you said you accept friend requests from people you do not know Risks associated with: Accepting friend requests from strangers Communicating with people you don’t know Answering personal questions (i.e. location, vacations, personal info, etc.)
6
Social Networks Location Services can be very convenient but also very dangerous Turn off GPS unless you really need it
7
Social Networks Importance of Privacy Settings 64% of you said that you keep your social networks set to private What information can friends/strangers see on your profile? What does the information you post say about you? –Future employers –Media –Strangers –Teachers
8
Social Networks: Wrap-up Become familiar with privacy policies Remember that the internet is a public resource Be skeptical: do not believe everything you read online Evaluate your privacy settings and how much information you allow others to see
9
Multi-Factor Authentication
10
Password Protection 57% of you said that you share passwords Passwords ensure the security and confidentiality of data that is stored Sharing passwords compromises your own confidentiality 95% of methods used to compromise computer security start with trying to figure out the password Game: www.passwordmeter.comwww.passwordmeter.com
11
Passwords What makes a strong password? –Longer passwords stronger (12 char.) –Complexity Upper & Lowercase Numbers Symbols –Computer generated passwords
12
Password Manager: LastPass
13
Apple
14
Hacking: Phishing Schemes Only 44% of the class was confident that they have not opened e-mail attachments from strangers
15
Phishing Tips for recognizing phishing schemes: –Poor spelling/grammar –URL does not match hyperlinked address –Message asks for personal information –Offer seems too good to be true –You did not initiate the action –Message does not address you by name –Message comes from strange e-mail address
16
Phishing Activity
17
Answers
18
Cyber Bullying
19
Statistics More than half of you know someone who has been the victim or perpetrator of Cyber Bullying Girls are about twice as likely as boys to be victims/perpetrators Victims are 2 to 9 times more likely to consider committing suicide
20
What to do about Cyber Bullying Video
21
Thank you! Any questions???
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.