1 / 26

Information Security

Information Security. Survey Results. Question. What do you think Information Security is?. What is Information Security?. Information Security is: To protect the confidentiality, integrity and availability of information assets

guida
Download Presentation

Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security

  2. Survey Results

  3. Question What do you think Information Security is?

  4. What is Information Security? • Information Security is: • To protect the confidentiality, integrity and availability of information assets • It includes the systems and hardware that use, store, and transmit the information

  5. Survey Results

  6. Information Security in the News • Snowden NSA Leaks • Who: Edward Snowden • When: May 2013 • What: Espionage • Target Data Breach • Who: Unknown • When: December 2013 • What: Unauthorized access to credit/debit card information

  7. Why is Information Security Important? • Usage of computer/technology to store and transmit information • Increase of cybercrimes • Hacking • Securing private information • Daily use of technology and information systems

  8. How Does this Pertain to You? • Private information • Personal information • Daily use of technology • Computers/smart phones/tablets • Social networking • Facebook • Twitter • Instagram • And more!

  9. Survey Results

  10. What is Personal Information? • Personal information • Date of birth • Social security number • Passwords • Pin numbers • Addresses • Bank information • Answers to security questions • Mother’s maiden name, place of birth, etc.

  11. Question How can you protect your personal information on social networking sites?

  12. Protecting Your Information • Protecting your information • Privacy settings exist for a reason • Know how to secure information you don’t want public (i.e. pictures, personal info, school/work info, etc.) • Sensitive information on secure websites only

  13. Question Even though your privacy settings are properly set, what do you still have to be careful of on social networking sites?

  14. Privacy Settings are Properly Set but… • Privacy settings are set but you still have to be careful… • Who are your friends? • Do you know them? • Catfish • Are your Friends/Followers really who they say they are?

  15. Social Networking Sites • Accessing information is easy • Friending/following people • Information on social networking sites are searchable on search engines

  16. Social Networking Safety • Don’t give out personal information • Know what you’ve posted about yourself • Location updates • Be selective about who you accept as friends/followers • Assume everything you post is PERMANENT • Be careful about installing extras

  17. Webcams • Miss Teen USA 2013 • Laptop webcam hacked by former classmate • Hacker had as many as 150 “slave computers” • Began threatening victims

  18. How Does it Work? • RATs: Remote Administration Tools • Hackers can remotely access a person’s computer without the owner knowing • The camera light will not always be on!

  19. Question How can you make sure that no one watches you on your webcam?

  20. Choosing Strong Passwords • If your password is in the dictionary, it’s pretty much useless! • Dictionary attacks utilize software that scan a dictionary until the password is cracked • A strong password consists of • At least 8 characters • Upper and lowercase letters • Numbers • Special characters ($, %, @, etc.) • Password Generators, password cracking • If a hacker can’t crack your password within a few seconds or minutes, they will likely move on!

  21. Question What are the four components of a strong password?

  22. Survey Results

  23. Security-Related Careers • Security Crime Investigator/Forensics Expert • Figure out how systems were hacked • System, Network, or Web Penetration Tester • Find vulnerabilities and test them (aka legal hacking!) • Federal government • Security services • Healthcare • Banks • Pretty much anywhere!

  24. Technology Degrees • Information Assurance • Management Information Systems • Management of Technology • Computer Science • Computer Engineering • Cybersecurity

  25. Question Name two industries that hire people with security-related degrees

  26. Questions?

More Related