1 / 28

Technology Awareness & Information Security

Technology Awareness & Information Security. Survey Results. 50% class has smart phones 64% class has shared personal info over the internet 71% class has personal info posted on FB 57% class uses check-in feature on FB. Survey Results. 25% class does not use privacy settings on FB

tavon
Download Presentation

Technology Awareness & Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technology Awareness & Information Security

  2. Survey Results • 50% class has smart phones • 64% class has shared personal info over the internet • 71% class has personal info posted on FB • 57% class uses check-in feature on FB

  3. Survey Results • 25% class does not use privacy settings on FB • 61% class add “friends” to social networks that they have only met once or twice • 8% class shares their passwords with others

  4. Survey Results • Do you ever look at or do things on the internet that you wouldn’t want your parents(s)/guardian(s), or friends to know about? • 14% class responded “Yes” • 75% class responded “No” • 11% class responded “Not sure”

  5. What About Your Privacy? • Passwords • Privacy Settings • Location Settings • Scams • Social Engineering • Schools/Employers • MIS, IA, Computer Science

  6. How Do You Use IT? • Calls • Text • Music • Email • Internet • Apps • GPS • Connect • Share • Organize Events • Learn

  7. Brute Force Attacks • Celebrity social media accounts, hacked! • Often victims of brute force attacks • Ex. 2009 President Obama Twitter account • Exploits often reveal weaknesses, in this case there were no limits on login attempts so the attacker was able to repeatedly try to gain unauthorized access

  8. Passwords Video http://abclocal.go.com/kabc/video?id=8361862&pid=8361856

  9. Passwords • Password Competition https://www.grc.com/haystack.htm

  10. Passwords Continued

  11. Protect Your Password • Never share your password • Password length is better than complexity • Use a mixture of upper case, lower case, numbers, and symbols • Change it periodically

  12. Social Media • South Park video • http://www.metacafe.com/watch/4496591/south_park_facebook_friends_episode/

  13. Social Media • Employers want to know if you are active • How do you present yourself? • Just write down your username and password and well get back to you! • For certain positions that require security clearances such as DoE, DoD, Law Enforcement, must forfeit account information and passwords from all sites/blogs you participate in.

  14. Privacy • FB Privacy Settings • http://www.youtube.com/watch?v=HPqwJWm-0tI

  15. Privacy • Keep it personal • Think before you link • Where were you last night? • Sign Out! • Facebook/Twitter privacy settings • Location settings from picture/checking in • Not a good idea to show your location or tell FB that you and your family will be gone on vacation.

  16. Privacy • Privacy video • http://www.youtube.com/watch?v=N2vARzvWxwY

  17. Current Event • General Petraeus

  18. Emails • Create Separate Emails • Too Good To Be True • Curious? • Antivirus Software • Dumpster Diving

  19. Spokeo • Spokeo Video • http://www.youtube.com/watch?v=JPFLagxnDsA

  20. Threats • Scams • Social Engineering • Shoulder Surfing

  21. Online Tattoo • Online Tattoo • http://www.youtube.com/watch?v=ZLLEzErtAX8

  22. Related Degrees • BS in Computer Science • BBA in MIS • MBA in MIS, IA or MOT

  23. CIARE and NMRCFL • Partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and Co-Ops.

  24. NSA • National Security Agency (NSA) and the Department of Homeland Security (DHS) designated a center of academic excellence in IA (CAEIA) at UNM. • Recruit from UNM • Offensive and defensive positions in cyber security. • AC/DC Virus • Handouts

  25. Closing • Final Video • http://www.youtube.com/watch?v=NSGc-TyExIc&feature=endscreen

  26. Sources • UNM Info: http://mba.mgt.unm.edu/forms/pdf/MBAIA.pdf • Password Info: https://www.grc.com/haystack.htm • Whitman, Michael E., and Herbert J. Mattord. Principles of information security. 4th ed. Boston, MA: Course Technology, 2012. Print. • Online Tattoo Video: http://www.youtube.com/watch?v=ZLLEzErtAX8 • SpokeoVideo: http://www.youtube.com/watch?v=JPFLagxnDsA

  27. Sources • SouthPark Video: http://www.metacafe.com/watch/4496591/south_park_facebook_friends_episode/ • Handouts:http://www.nsa.gov/ia/_files/factsheets/Best_Practices_Datasheets.pdf • President Obama Video: • http://www.youtube.com/watch?v=NSGc-TyExIc&feature=endscreen

  28. Sources • Wikipedia: General Petraeus • http://en.wikipedia.org/wiki/David_Petraeus • News Article: Twitter exploits • http://www.zdnet.com/twitter-hack-details-revealed-3039588628/

More Related