1 / 13

Cyber Security Awareness

Cyber Security Awareness. Kelley Goldblatt Michigan State Police Michigan Cyber Command Center (MC3). Cyber’s Impact. Cyber touches everything Critical Infrastructure Power, water, gas, banking, transportation Military and industry Personal lives School, work, and home

jasonv
Download Presentation

Cyber Security Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Awareness Kelley Goldblatt Michigan State Police Michigan Cyber Command Center (MC3)

  2. Cyber’s Impact Cyber touches everything • Critical Infrastructure • Power, water, gas, banking, transportation • Military and industry • Personal lives • School, work, and home Reliance on cyber has helped create vulnerabilities

  3. Criminal Cyber Investigation Computer and Network Forensics Cyber Intelligence – Gathering & Sharing Cyber Assessment Services Dark Web Analysis Services Michigan Cyber Command Center (MC3)

  4. Threat Components Destruction: Physical destruction of information or communications systems rendering them unusable Corruption: The changing of information such that it is no longer accurate or useful Removal: The removing of information so that it cannot be accessed, but is not destroyed Disclosure: Unauthorized release of confidential or sensitive information to the detriment of owner and said data Interruption: Interfering with communications such that legitimate users cannot send or receive messages

  5. Examples • Destruction • Brick the machine • Part failure • Corruption • Personal information • Erode trust • Removal • Espionage • Credit card data

  6. Examples Cont. • Disclosure • Personal data • Organization’s secrets • Interruption • Keep you from accessing what you need • Keep others from accessing you

  7. What can I do?

  8. Do…. • When making purchases online, use HTTPS whenever possible • Keep your passwords private and use a separate password for each account • Utilize anti-virus, anti-malware, and other security software • Keep all of your software patched and updated • Limit your use of public wi-fi networks

  9. Do…. • Safely dispose of personal information • Permanently deleting personal information from electronic devices such as phones and computers before getting rid of them • Monitor your credit score • Check one credit bureaus every four months • Utilize features such as credit freezes when possible • Monitor your financial accounts frequently

  10. Don’t…. • Overshare on social networking sites • Make purchases when on public Wi-Fi • Click on links or attachment found in unsolicited emails • Give out personal information over the phone, internet, or mail unless you have initiated the contact

  11. Contact:Kelley Goldblatt Michigan state police Michigan cyber command center (MC3)MC3@Michigan.gov877-MI-CYBER

More Related