Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Cyber Safety Assessment Review
Don’t be bullied, or be a bully.
The Internet.
SOCIAL ENGINEERING AND INFORMATION PROTECTION BEST PRACTICES.
How to keep your kids safe online
Using internet and cell phones safely
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
How to protect yourself Hacked Construction Sign: MIT, April 2007 at intersection of Vassar & Main Streets Information Security:
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Parent talk Thursday 15 th November pm-7pm Speakers: Mrs Toni Sambrook, Mrs Claire Crew, Mr Tim Webber and Mr Andrew Hatherley. E-Safety.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Facebook, Cyber-bullying & Catfishing: Could you be a victim
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
 NYS Internet Crimes Against Children Task Force Online Safety for Middle and High School Version 5.0 – 8/
1 Safely Using Shared Computers Amanda Grady December 2013.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Protecting Your Personal Information November 15, 2013.
Federal Bureau of Investigation Cyber Program Cyber Online Resources and Training Links FBI Boston UNCLASSIFIED.
Living In The Information Age. Keeping your Information Safe Secure ways to access the internet. Posting personal information on Facebook and other social.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
What You Need to Know About Your Personal Information.
Social Media and Security. Introduction Who am I & Why am I here? –MBA Program at UNM –For my Information Assurance class –To inform about technology.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Safety Safely Navigating Uncharted Waters.
INTRODUCTION & QUESTIONS.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
What Would You Do? The Risks of Behavior on the Internet.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
BEACHLINK WEBINAR. WELCOME TO BEACHLINK BeachLink is the exciting new social network designed for members of the Redondo Beach Chamber of Commerce & Visitors.
Technological Awareness for Teens and Young Adults.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Internet Safety.
Safety.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Internet Safety & Acceptable Use Standards
Cybersecurity Awareness
Information Security Awareness 101
Cybercrime and YOU.
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program
Keeping Our Data Secure
TALKING POINTS Introduce yourself
Presentation transcript:

Technology Awareness & Information Security

Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class has personal info posted on FB 57% class uses check-in feature on FB

Survey Results 25% class does not use privacy settings on FB 61% class add “friends” to social networks that they have only met once or twice 8% class shares their passwords with others

Survey Results Do you ever look at or do things on the internet that you wouldn’t want your parents(s)/guardian(s), or friends to know about? 14% class responded “Yes” 75% class responded “No” 11% class responded “Not sure”

What About Your Privacy? Passwords Privacy Settings Location Settings Scams Social Engineering Schools/Employers MIS, IA, Computer Science

How Do You Use IT? Calls Text Music Internet Apps GPS Connect Share Organize Events Learn

Brute Force Attacks Celebrity social media accounts, hacked! Often victims of brute force attacks Ex President Obama Twitter account Exploits often reveal weaknesses, in this case there were no limits on login attempts so the attacker was able to repeatedly try to gain unauthorized access

Passwords Video

Passwords Password Competition

Passwords Continued Password Length Maximum Number of Operations (guesses) Maximum Time to Crack 8208,827,064,5767 seconds 95,429,503,678,9763 minutes 10141,167,095,653, hours 113,670,344,486,987,78034 hours 1295,428,956,661,682, days 132,481,152,873,203,740, years 1464,509,974,703,297,200, years 151,677,259,342,285,730,000,0001,772.9 years 1643,608,742,899,428,900,000,00046,094.1 years Password Length Maximum Number of Operation (guesses) Maximum Time to Crack 82,044,140,858,654, hours 9167,619,550,409,708, days 1013,744,803,133,596,100, years 111,127,073,856,954,880,000,000 1,191.3 years 1292,420,056,270,299,900,000,000 97,687.4 years 137,578,444,614,164,590,000,000,000 8,010,363.4 years 14621,432,458,361,496,000,000,000, ,849,799.6 years 1550,957,461,585,642,700,000,000,000,000 53,861,683,563.4 years 164,178,511,850,022,700,000,000,000,000,000 4,416,658,052,197.2 years

Protect Your Password Never share your password Password length is better than complexity Use a mixture of upper case, lower case, numbers, and symbols Change it periodically

Social Media South Park video south_park_facebook_friends_episode/ south_park_facebook_friends_episode/

Social Media Employers want to know if you are active How do you present yourself? Just write down your username and password and well get back to you! For certain positions that require security clearances such as DoE, DoD, Law Enforcement, must forfeit account information and passwords from all sites/blogs you participate in.

Privacy FB Privacy Settings Wm-0tIhttp:// Wm-0tI

Privacy Keep it personal Think before you link Where were you last night? Sign Out! Facebook/Twitter privacy settings Location settings from picture/checking in –Not a good idea to show your location or tell FB that you and your family will be gone on vacation.

Privacy Privacy video vWxwYhttp:// vWxwY

Current Event General Petraeus

s Create Separate s Too Good To Be True Curious? Antivirus Software Dumpster Diving

Spokeo Spokeo Video xnDsAhttp:// xnDsA

Threats Scams Social Engineering Shoulder Surfing

Online Tattoo rtAX8http:// rtAX8

Related Degrees BS in Computer Science BBA in MIS MBA in MIS, IA or MOT

CIARE and NMRCFL Partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and Co-Ops.

NSA National Security Agency (NSA) and the Department of Homeland Security (DHS) designated a center of academic excellence in IA (CAEIA) at UNM. Recruit from UNM Offensive and defensive positions in cyber security. AC/DC Virus Handouts

Closing Final Video TyExIc&feature=endscreenhttp:// TyExIc&feature=endscreen

Sources UNM Info: Password Info: Whitman, Michael E., and Herbert J. Mattord. Principles of information security. 4th ed. Boston, MA: Course Technology, Print. Online Tattoo Video: Spokeo Video:

Sources SouthPark Video: cebook_friends_episode/ cebook_friends_episode/ Handouts: ractices_Datasheets.pdfhttp:// ractices_Datasheets.pdf President Obama Video: TyExIc&feature=endscreenhttp:// TyExIc&feature=endscreen

Sources Wikipedia: General Petraeus News Article: Twitter exploits / /