1 / 25

Information Security

Information Security. Who Are We?. Game time. What devices can get hacked?. (Clue) What Tech Do You Use?. Survey Analysis. The introduction paragraph was meant to bore you. Similar setup to many terms and conditions. The first question was optional.

beckham
Download Presentation

Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security

  2. Who Are We?

  3. Game time What devices can get hacked?

  4. (Clue) What Tech Do You Use?

  5. Survey Analysis • The introduction paragraph was meant to bore you. • Similar setup to many terms and conditions. • The first question was optional.

  6. What is considered sensitive information? Any way to uniquely identify you. • High risk (1 identifier): • Social Security Number (SSN) • Identification card • License, Passport, School ID, etc. • Credit Card information Medium Risk (multiple identifiers): • First Name, Last Name, Date of Birth, Address • Phone Number • Login information (username & password)

  7. What is considered sensitive information? Any way to uniquely identify you. • High risk (1 identifier): • Social Security Number (SSN) • Identification card • License, Passport, School ID, etc. • Credit Card information Medium Risk (multiple identifiers): • First Name, Last Name, Date of Birth, Address • Phone Number • Login information (username & password) Medium/HighRisk High Risk Low Risk

  8. Don’t Give Out Your Personal Information • Why? • Companies that collect data such as your name, address, phone number, and other data about you can be compromised. • Don’t give out your real information unless you completely trust the source/company. • Personal information is Sensitive Information.

  9. The Cloud • Companies own the cloud. • Companies own your data • Applications use the cloud. • Your login, photos, about sections, credit card info are saved on the cloud. • The cloud needs an internet connection to store data • Ever tried logging into YouTube or uploading anything without the internet?

  10. DEFCON

  11. Hacking • Benefits: • Companies can learn entry points. • Increase our skills at protecting information • There are professional jobs that pay you to find security vulnerabilities. (professional hackers exist) • Downfalls: • Hackers sell your information • Hackers use your information against you • Hackers steal from you if there is a way to make money

  12. Types of Hackers • White Hat – Ethical Hacker • Black Hat – Stereotypical Hacker • Red Hat – Vigilante Hacker

  13. What are we really downloading? • Downloading apps that seem secure may not be the case • Remember the required terms and conditions? Not everything is required. • Some apps have a legitimate reason to access your files, some don’t. Use logic and reason. • Pay attention to your downloaded files to see if it appears familiar.

  14. Mobile Security • Android Security issue • When mobile players downloaded Fortnite it allowed the phone to become vulnerable to outside entities. • A rogue app had access to the device’s settings and other areas for malware to be installed. • It may not be your fault • Sometimes a friend or relative can expose your sensitive data. link

  15. Social Media • TIKTOK • Formally known as musical.ly. • Was the most downloaded application (globally) in Sept. • TIKTOK compilations are posted on YouTube • Are Vine complications still on YouTube? • Your posts from popular apps doesn’t actually get deleted even when they are no longer available.

  16. Guess this Screenshot Who is this? • How do we recognize this screenshot? Details: • December 31, 2017 • Maverick Apparel lawsuit Why does it matter what we post on the internet?

  17. Phishing • Phishing is the fraudulent attempt to obtain sensitive information, (such as usernames, passwords, credit card details, etc.), by disguising as a trustworthy entity in an electronic communication.

  18. Phishing • Fake websites • False logins • Authentication • Emails

  19. Phishing Email • Sender’s email address is not consistent to the content of the email. • Contain a generic introduction. • Pay attention to grammar • If there is a link hover over it and verify the URL. . fake.LinkhasMalware.uk/948ur93u Ctrl + Click to follow link

  20. Encryption

  21. Be More Paranoid • Open networks • Hackers use open networks • Online Shopping • Be careful where you input data such as credit card information, SSN, etc. • Hack occurs every 39 seconds!!

  22. Password Game Rules: Groups of 5 Group decide on a secure password Most secure password gets a prize! Consists of letters, numbers, etc.

  23. Game results Password Cracking Password Generator

  24. Password Tip:Try to remember your passwords as phrases • Woo! The Packers won the Super Bowl! • 2 Chainz likes PB & J • Cheese pie at 7th street, 2:30pm • Dumbledore is a wizard • #I hate hashtags 2018 • WOO!TPwontSB • 2ChnzL!k$Pbj • chZp!@7St230 • DuMbLd0R!s@w7D • #iHt3hsHtg$2018

  25. Conclusion Be careful what you download in the first place Understand your privacy settings on all your devices and how you secure those devices Be weary of what information you give out to others Pay attention to what you post in the long run

More Related