Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE-1303269 Any opinions, findings, conclusions.

Slides:



Advertisements
Similar presentations
Module: 201 Create and Manage Your Agent Account.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Automation of the home, housework or household activity. Linked systems/appliances to centralized control. Remote monitoring of the home from a tabletop.
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
KHS iPad Day iHomeroom Wednesday, August 20, 2014.
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
DATING VIOLENCE, SEXUAL ASSAULT, & STALKING POLICY AND ULM Robert Hanser & Pamela Saulsberry VIOLENCE PREVENTION AND INTERVENTION PROGRAM (VPIP)
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
IPads Everywhere! Management Considerations for the Enterprise Bill Morrison Director of Technology, Rapides Parish School District
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
 How Safe Are Smart Phones? By Sean Breslin. Can We Trust Our Phones?  Our cell phone, for most of us, is always by our side  If it is always with.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Smartphone based multi-channel emergency alerting Jaana Kuula University of Jyväskylä Department Of Mathematical Information Technology Finland
Do you know how to keep yourself safe?
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
EMERGENCY COMMUNICATION AND PLANNING March 25,
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
A+ Certification Guide Chapter 10 Mobile Devices.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
DUE Router and Switch Configuration Software Installation Module 2.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
Wireless Security: Protect yourself when you’re mobile.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
AUTOMATION IN MANUFACTURING 1 of 12 MADE IN FLORIDA - INDUSTRY TOURS.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Welcome Utree Phone Manual. Intro Thankyou for purchasing our Utree mobile This user-guide has been specially designed to help you get to know the functions.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
QUALITY MEASURES: METROLOGY MADE IN FLORIDA - INDUSTRY TOURS 1 of 12.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
E - safety By Jacob Jack Luca. How to stay safe on the internet.  Only speak to people that you know and if you don’t know them don’t contact them in.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Physical security By Ola Abd el-latif Abbass Hassan.
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
The graph shows how questions that I have asked the people around me. Every one that I asked has a cell phone and they text a lot. Most of them text a.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Brighton & Hove Healthy Schools Team E-safety and Cyberbullying Information for Parents and Carers.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
User Guide DCT Retail Mode for SMART CAMERA Mobile Application SAMSUNG ELECTRONICS DI IMC.
Android and IOS Permissions Why are they here and what do they want from me?
Small steps to prepare your community for emergencies
Instructor Materials Chapter 6 Building a Home Network
Information Security.
The Binary Number System
Discussion and Conclusion
Emergency Call With Team on the Run, users can make emergency PTT calls to a preset list of recipients, informing them about critical situations. The feature.
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Clemson University: Jill Gemmill
Title of Poster Site Visit 2017 Introduction Results
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Online Safety Evening 2019.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation

Disaster and You What is your plan for when disaster strikes? -How will you communicate with others ? -Where will you get the information you need to stay safe? -How will you contact family?

How Do We Communicate? Mobile phones -Voice calls -Texting Social media sites Others?

Damage to cell towers. Damage to the POTS (Plain old telephone service) and cable service equipment. Power outages. Communication Problems from Natural Disasters

Man-Made Disasters Physical terrorist acts. Cyber attacks. Failures or errors resulting in Power Outage.

What can you do? If communication systems are completely down, not much. Often, though the cellular and Wi-Fi systems are working but become overloaded. -Overloaded with all the emergency personnel utilizing these resources. -Overloaded with a huge surge of the general public attempting to use them. Don’t add to the overload.

This is what you can do: Use communication devices sparingly. Text. Switch to VOIP.

How can you help before these disasters strike? Know where your devices are. Upon loss of a mobile device, disable until located. -Use a locator app to locate your device. -Power off, if never located.

Options of the locator app: Sending a message or playing a sound. Performing remote security measures. -Remote lock. -Remote wipe.

Passcode Locking One simple method to protect your mobile device. Many types: -None -Slide -Face Unlock -Pattern -Password -Simple Passcode.

Types of Passcode Locks None – removes any other type of passcode lock if one is set. Slide – User slides an icon to unlock the device – this is least secure. Face Unlock - Uses camera to recognize face. Pattern – Locks the device when user slides a finger over the screen in a certain pattern. Same pattern must be used to unlock. Password – Uses a password to unlock the device. Simple Passcode – iOS devices only – 4 digit number.

How does this tie into CIP? The smallest actions can make a difference in how we protect individuals, our communities and our entire nation. -Loading a passcode lock. -Locating the mobile device. -Performing various secure techniques.

Conclusion The point is: One little crack may be all it takes for someone to do major harm to you, or your family, or something much bigger. We all need to do our part.