1 / 16

LOST DATA

LOST DATA. RESULTS IN LOST. “…. the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and innovation.” UNM’s Research Mission – Untapped Potential (May 16, 2012).

frieda
Download Presentation

LOST DATA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LOST DATA RESULTS IN LOST

  2. “….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and innovation.”UNM’s Research Mission – Untapped Potential (May 16, 2012) • “In this new vision of economic development, business leaders must work with government and with the university to find new solutions. The new world is one of public/private partnerships, and in that world, the most successful outcomes will include UNM. • “One unique resource we have here in New Mexico is our access to National Laboratories, Los Alamos, Sandia and the Air Force Research Lab. Down I-25, we have the White Sands Test Facility and White Sands Missile Range. These facilities offer us significant opportunities for scientific partnerships. Their proximity also distinguishes us from other research universities.” The Installation Address of Robert G. Frank, 21st President of the University of New Mexico (November 18, 2012)

  3. FSO RESPONSIBILITIES • Classified Contracts • Security Clearances • Information Protection (Intellectual Property, Trade Secrets, Classified, Export Controlled) They don’t only want classified. Unclassified information helps them fill in pieces to the puzzle • Counterintelligence Briefings • Travel Briefings • Visit Requests • Security Training • Ensure your personal information stays personal

  4. UNIVERSITIES ARE A TOP TARGET TO STEAL U.S. TECHNOLOGY Technology Areas of Concern Electrical and Computer Engineering Chemical and Nuclear Engineering Manufacturing Engineering Computer Science Physics and Astronomy Biology Earth and Planetary Sciences Mathematics • Semiconductors • Lasers, Sensors, & Optics • Robotics • UAV’s (Unmanned Aerial Vehicles) • Information Systems • Navigation Systems • Aeronautics • Marine and Space Systems • Cryptography

  5. Your Ideas = Your Future Losing your research not only has national security implications, but ruins your potential to patent and publish.

  6. ONLINE THEFT OF INTELLECTUAL PROPERTY “The greatest transfer of wealth in history is happening and it's happening quietly right now" Cyber Command Chief General Keith Alexder http://defense.aol.com/2012/07/30/dont-wait-for-cyber-pearl-harbor-russia-and-china-are-stealing/

  7. 250,000 Twitter Accounts Hacked CNN reports that the Twitter attack follows major security breaches at the New York Times and the Wall Street Journal. Both of those attacks were attributed to Chinese hackers. http://www.networkworld.com/community/blog/chinese-hackers-use-compromised-usa-university-computers-attack-us

  8. Cyber Warfare • Defense Secretary Leon Panetta and other senior DoD officials have called cyber-attacks one of the greatest threats to America’s national security, and an area in which the U.S. military is the farthest behind. • It is becoming increasingly clear that countries like China and Russia have no misgivings about using cyber warfare as a highly effective and inexpensive means to obtain information and improve their national superiority. • Most people in the U.S. are oblivious to the threat of cyber-attacks and therefore create opportunities for cyber spying and hacking, using weak passwords to protect confidential information and opening documents without knowing the sender. http://www.policymic.com/articles/3645/cyber-warfare-the-war-america-is-losing/featured_writer • CYBER CRIME COST CONSUMERS $110 BILLION LAST YEAR! • 6 BILLION email scams sent out monthly! • Remember: YOUHAVE TO DO SOMETHING TO BE ATTACKED

  9. INDUSTRIAL VS FOREIGN SPIES

  10. ARE THESE MORE IMPORTANT…

  11. THAN THESE? KEEP AMERICA’S SECRETS

  12. International Travel Concerns • If at all possible don’t take laptops and smartphones • Only take data that is necessary for your trip • If you plug thumb drive into another computer overseas, throw it away • Do not install software updates requested by any public Wi-Fi or your hotel internet • If laptop is stolen report it to local Police and UNM • Ensure IT Dept. examines laptop before plugging back into university network • Beware of thumb drives • Reasonable suspicion is not needed for customs officials to search a laptop computer or other personal electronic storage devices at the border.

  13. SECURITY TIP OF THE DAY Virus can infect the computer you are using Hacker can obtain every document stored on the computer/network - Research - Personal information - Email

  14. LAPTOP SECURITY http://video.today.msnbc.msn.com/today/50572646/#50572646

  15. OTHER TRAINING OFFERED • Cyber Security – Phishing: How Not To Become a Victim of Email Fraud • Social Networking Security • Laptop and Cell phone Security • International Travel Security • Workplace Violence

  16. CONTACT: DEB KUIDIS MANAGER OF INDUSTRIAL SECURITY /FSO 1717 ROMA, RM. 204 505-277-0732 dkuidis@unm.edu http://research.unm.edu/industrialsecurity/

More Related