LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and.

Slides:



Advertisements
Similar presentations
CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Network Security of The United States of America By: Jeffery T. Pelletier.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
COUNTERINTELLIGENCE TRENDS
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Yourself Online (Information Assurance)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Export Control Presented by Research and Graduate Studies Elizabeth Peloso.
1 Corporate Overview CIC Luncheon Feb 15, Industry Leader Lockheed Martin #1 Aerospace and Defense Company with Revenue Greater than $20 Billion.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Information Warfare Playgrounds to Battlegrounds.
7 Information Security.
Cyber Security & Fraud – The impact on small businesses.
Cyber Security Nevada Businesses Overview June, 2014.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Information Warfare Playgrounds to Battlegrounds.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Export Control Processes For Sponsored Projects. Proposal Phase.
Cybersecurity Test Review Introduction to Digital Technology.
Chapter 17: Foreign Policy and National Defense Section 2.
Issues for Computer Users, Electronic Devices, Computer and Safety.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Tomorrow’s Battleground Nicholas Jabbour Alice Culbertson.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
Ways to protect yourself against hackers
Overview 1. Phishing Scams
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cybersecurity Awareness
GSBS IT Resources and Security
Unit 4 IT Security Kerris Davies.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

LOST DATA RESULTS IN LOST

….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and innovation. UNMs Research Mission – Untapped Potential (May 16, 2012) In this new vision of economic development, business leaders must work with government and with the university to find new solutions. The new world is one of public/private partnerships, and in that world, the most successful outcomes will include UNM. One unique resource we have here in New Mexico is our access to National Laboratories, Los Alamos, Sandia and the Air Force Research Lab. Down I-25, we have the White Sands Test Facility and White Sands Missile Range. These facilities offer us significant opportunities for scientific partnerships. Their proximity also distinguishes us from other research universities. The Installation Address of Robert G. Frank, 21st President of the University of New Mexico (November 18, 2012)

FSO RESPONSIBILITIES Classified Contracts Security Clearances Information Protection (Intellectual Property, Trade Secrets, Classified, Export Controlled) They dont only want classified. Unclassified information helps them fill in pieces to the puzzle Counterintelligence Briefings Travel Briefings Visit Requests Security Training Ensure your personal information stays personal

UNIVERSITIES ARE A TOP TARGET TO STEAL U.S. TECHNOLOGY Technology Semiconductors Lasers, Sensors, & Optics Robotics UAVs (Unmanned Aerial Vehicles) Information Systems Navigation Systems Aeronautics Marine and Space Systems Cryptography Areas of Concern Electrical and Computer Engineering Chemical and Nuclear Engineering Manufacturing Engineering Computer Science Physics and Astronomy Biology Earth and Planetary Sciences Mathematics

Your Ideas = Your Future Losing your research not only has national security implications, but ruins your potential to patent and publish.

ONLINE THEFT OF INTELLECTUAL PROPERTY The greatest transfer of wealth in history is happening and it's happening quietly right now" Cyber Command Chief General Keith Alexder

250,000 Twitter Accounts Hacked CNN reports that the Twitter attack follows major security breaches at the New York Times and the Wall Street Journal. Both of those attacks were attributed to Chinese hackers. compromised-usa-university-computers-attack-us

Cyber Warfare Defense Secretary Leon Panetta and other senior DoD officials have called cyber-attacks one of the greatest threats to Americas national security, and an area in which the U.S. military is the farthest behind. It is becoming increasingly clear that countries like China and Russia have no misgivings about using cyber warfare as a highly effective and inexpensive means to obtain information and improve their national superiority. Most people in the U.S. are oblivious to the threat of cyber-attacks and therefore create opportunities for cyber spying and hacking, using weak passwords to protect confidential information and opening documents without knowing the sender. CYBER CRIME COST CONSUMERS $110 BILLION LAST YEAR! 6 BILLION scams sent out monthly! Remember: YOU HAVE TO DO SOMETHING TO BE ATTACKED

INDUSTRIAL VS FOREIGN SPIES

ARE THESE MORE IMPORTANT…

THAN THESE? KEEP AMERICAS SECRETS

International Travel Concerns If at all possible dont take laptops and smartphones Only take data that is necessary for your trip If you plug thumb drive into another computer overseas, throw it away Do not install software updates requested by any public Wi-Fi or your hotel internet If laptop is stolen report it to local Police and UNM Ensure IT Dept. examines laptop before plugging back into university network Beware of thumb drives Reasonable suspicion is not needed for customs officials to search a laptop computer or other personal electronic storage devices at the border.

SECURITY TIP OF THE DAY Virus can infect the computer you are using Hacker can obtain every document stored on the computer/network - Research - Personal information -

LAPTOP SECURITY

OTHER TRAINING OFFERED Cyber Security – Phishing: How Not To Become a Victim of Fraud Social Networking Security Laptop and Cell phone Security International Travel Security Workplace Violence

CONTACT: DEB KUIDIS MANAGER OF INDUSTRIAL SECURITY /FSO 1717 ROMA, RM