Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Awareness

Similar presentations


Presentation on theme: "Information Security Awareness"— Presentation transcript:

1 Information Security Awareness
Assurance? Example: Warranty on a toy, where the warranty guarantees that anything wrong with the toy can be reimbursed for a new one. Assurance is that guarantee for information to be secure. Demand for information assurance skills is strong due to the need of organizations to secure their information systems and data. Look into this concentration later down the road…

2 Overview Social Networks Examples Questions Privacy Passwords Phishing
Social Engineering Examples Questions I’m going to talk about Social Networks, explain what they are to those of you that don’t already know and show how they involve some security issues. (list) We’ll look at some real examples of these topics And I’ll take questions at the end

3 Social Networks Facebook Myspace Twitter Youtube And many more…
Definition: A social network is a web-based service that provides ways for users to interact, such as file sharing, blogging, and discussion groups, to build communities of people who have common interests How many? Why? And what do you do?

4 Privacy What are some examples of what you think should be kept private? Why? Before I talk about it, Tell me some things that you guys keep private. Examples: Getting ready for school Taking tests Journal/diary Point: its embarrassing and many of you may not realize the long term effects.

5 Would you post embarrassing pictures of yourself?
Privacy Remember, Vanessa Hudgens from High School Musical? She had embarrassing photos of herself that became public. It affects getting a Job, applying to Colleges, doing Volunteer work, anything requiring a background check can easily find embarrassing things if you post them to your social networks. Would you post embarrassing pictures of yourself?

6 Privacy FACE BOOK :Terms of Use User Content Posted on the Site
“…By posting User Content to any part of the Site, you automatically grant… to the Company an irrevocable right…to use, copy, publicly perform, publicly display, reformat, translate…distribute such User Content for any purpose…” “…You may remove your User Content from the Site at any time… however you acknowledge that the Company may retain archived copies of your User Content…” Who has Facebook? Irrevocable=Permanent, you can’t go back and change it… Acknowledge=Accept, once you sign up and post pictures up, they aren’t just yours anymore. Did you know that ? Now would you post embarrassing pictures of yourself? Set Settings to private will help reduce the possibility of leaked photos

7 Passwords Cracking Passwords Is it your favorite word in a dictionary?
Do you protect it like your life depends on it? Dictionary attack, uses commonly used password from word in the dictionary. How many people know your password? Why? Change it

8 What makes a good password?
It contains upper/lower case letters It has letters and numbers It isn’t short. Combination of letters, not words. Try initials, words without vowels. Include numbers. Have numbers in between letters. Good length is 7 to 12 characters.

9 Phishing What is it? Definition: What does this mean?
An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate entity. What does this mean? Attackers want your information and will create a fake website/ /etc. to gain it. Let’s look at an example. Sometimes having too good of a password can have attackers try different ways to get it, like Phishing.

10 Phishing: Example You notice a good friend of yours posted a bulletin and check it out. You trust the fake post because its your friend.

11 Phishing: Example You think, maybe it’s a cool music video, a great gaming site, or something funny. So you click on it without thinking.

12 Phishing: Example Then later it says your not logged in, without even thinking twice you may log in again. But wait! This is a phishing site, not Myspace. Now your information is compromised and the attacker has your login info and password and access to all your information. What did you learn? If it seems wrong, it probably is. If it kicks you out, think why would it do that? Ask your friend what they posted? Sometimes they are not aware that their account has been hacked. Notice at the url*** great indicator its not real

13 Social Engineering Social engineering is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. Attackers will pretend to be someone else and lie, lie, lie. Let’s look at an example. Defined term Basically this means there are attackers and they aren’t nice.

14 Social Engineering: Example
Attackers hijack a person's social network account to deceive others. Facebook and Myspace Create fake profiles Sabotage personal page Twitter Expose phone numbers You tube Blackmail personal videos If someone got a hold of your phone number, would like everyone to know it? And if you think embarrassing baby pictures were bad? What if attackers get a hold of embarrassing home videos of you?

15 Social Engineering: Example
Article: Mom: Girl killed herself over online hoax Link

16 Social Engineering Social Engineering is very serious
It takes less time and effort More successful Protect yourself from an attack DON’T GIVE INFORMATION TO SOMEONE WHO DOESN’T NEED IT! Tell others not to share information. Use common sense. Serious in comparison to other forms of attacks (ie. Cracking passwords) Stress- Don’t Do It! -Aware Others -Think about it before acting on it -Ask yourself, does this seem right?

17 QUESTIONS Any questions or comments


Download ppt "Information Security Awareness"

Similar presentations


Ads by Google