1 / 24

Information Systems Security and You

Information Systems Security and You. What is Information Systems Security?. Protecting your data – usually referring to your online or electronic data. Every Day Information Systems Security. How do we protect our data?. Passwords

jonk
Download Presentation

Information Systems Security and You

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Systems Security and You

  2. What is Information Systems Security? • Protecting your data – usually referring to your online or electronic data.

  3. Every Day Information Systems Security

  4. How do we protect our data? • Passwords • Traditional Passwords – a string of characters that allows access to a system • PIN – personal number used to gain access to a system. Usually 4-8 digits • Fingerprints – cannot be forgotten, forged, or guessed. • Facial Recognition – cannot be forgotten but can be forged. Machines that aren’t as sophisticated can be tricked by photos of you.

  5. Good vs. Bad Passwords

  6. Good vs.Bad Passwords • https://www.youtube.com/watch?v=opRMrEfAIiI (2 min. 40 sec) Do you think the passwords in the video were good? Why or why not?

  7. What makes a password good? • Using symbols • Having long passwords (at least 12 characters but longer is better) • Not using personal information (like birthday or pet names) • Using a combination of numbers and letters * Handout

  8. Password Game • Split up into 4-5 groups. • Come up with a password that you think will be strong but realistic. (i.e. make sure somebody would be able to use it and remember it in real life). • Present your password to the class. • Check to see which group created the strongest password! • http://password-checker.online-domain-tools.com/

  9. Wifi

  10. Public Wifi Scares • Fake Wifi (“Flyingstar2”) • Password Free Networks (unencrypted data)

  11. Demo - Wireshark • Wireshark is an open source packet analyzer (packet sniffer) that can intercept information that is going across a network and keep track of it. • https://www.youtube.com/watch?v=_WQe36pZ3mA(start at 1 min 10 sec)

  12. Demo – Wireshark

  13. Information Security Lessons for the Film Industry

  14. Physical Security • Protecting your data – usually referring to your online or electronic data, but physical security is an important part too! • How can we protect our physical spaces? • Locks • Secure spaces/vaults • Badges

  15. What’s wrong with this picture?

  16. What would you do? • If you were working on a film what would you want to keep physically safe? • How could you keep those things safe?

  17. Social Engineering • Tricking people into giving you personal or confidential information • https://www.youtube.com/watch?v=zUWlnHPzJcA&t=16s (stop at 1 min)

  18. Social Engineering

  19. Social Engineering • People use social engineering to: • Try to figure out passwords • Get bank information • Learn company or government secrets • Ex. Kane Gable and CIA John Brennan in 2017

  20. Access Controls • Access control is a security technique that regulates who or what can view or use resources in a computing environment. Can be physical or logical. • Why do you think having access controls is important? • Note that this protects data not only from attackers, but also from employees who may make mistakes.

  21. Toy Story 2 and Access Control

  22. Summary • Protecting personal and proprietary information is important! • Passwords should be strong and unique. • Be careful when using public wifi. • Keep physical areas and information secure. • Make use of access controls when necessary.

  23. Thank you! • Questions?

  24. Sources • https://www.makeuseof.com/tag/lock-methods-android-phone/ • https://www.bayometric.com/eliminate-password-fingerprint-password-manager/ • https://searchsecurity.techtarget.com/definition/password • https://www.computerhope.com/jargon/p/pin.htm • https://www.technologyreview.com/s/542576/youve-been-misled-about-what-makes-a-good-password/ • https://www.usatoday.com/story/tech/2013/07/01/free-wi-fi-risks/2480167/ • https://blog.lookout.com/spoofed-wifi-60-minutes • https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering • https://www.telegraph.co.uk/news/2018/01/19/british-15-year-old-gained-access-intelligence-operations-afghanistan/ • https://www.helpnetsecurity.com/2018/01/22/hack-social-engineering/ • https://theblast.com/rupauls-drag-race-leaked-episodes-lawsuit/ • https://searchsecurity.techtarget.com/definition/access-control • http://mentalfloss.com/uk/entertainment/27204/how-one-line-of-text-nearly-killed-toy-story-2

More Related