Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Security & Privacy

Similar presentations


Presentation on theme: "Digital Security & Privacy"— Presentation transcript:

1 Digital Security & Privacy
Knowledge for the World

2 Privacy Test Privacy Test CC 4/10/2019
Copyright © Carl M. Burnett

3 Outline Introductions Class Outline Review Class Website 4/10/2019
Copyright © Carl M. Burnett

4 Instructor Info Carl Burnett Instructor with MCC since 2007
Military – Corps of Engineers IT Contractor - BAH, GD, Independent 4/10/2019 Copyright © Carl M. Burnett

5 Introduce Yourselves Name Your Previous Job or Current Job
What do you to expect from course? 4/10/2019 Copyright © Carl M. Burnett

6 Outline What is Digital Security & Privacy?
How can I Protect my Digital Assets? How can I Protect my Digital Identity? How can I Protect my Digital Privacy? 4/10/2019 Copyright © Carl M. Burnett

7 Outcomes Explain Digital Security & Privacy. Define Digital Assets.
Identify Threats to your Digital Assets. Define Digital Identity and Privacy. Identify Threats to your Digital Identity and Privacy. Identify measures you can take to protect: Your Digital Assets Your Digital Identity Your Digital Privacy 4/10/2019 Copyright © Carl M. Burnett

8 3 Questions Name: _________________
What are your top 3 questions concerning digital security and privacy? ___________________________________________________________ 4/10/2019 Copyright © Carl M. Burnett

9 What is Digital Security & Privacy?
Digital security and privacy are two significant issues. Digital security pertains to protecting your digital assets. Digital privacy has two parts: How you protect your digital identity. How you protect your digital privacy. 4/10/2019 Copyright © Carl M. Burnett

10 What are my Digital Assets?
$ 4/10/2019 Copyright © Carl M. Burnett

11 What are Digital Threats?
Types of Threats Physical damage Natural events Loss of essential services Compromise of information Technical failures Compromise of functions Threat Origination Deliberate Accidental Environmental Negligence Threat Classification (STRIDE Model) Spoofing of user identity Tampering Repudiation Information disclosure (privacy breach or Data leak) Denial of Service (D.o.S.) Elevation of privilege 4/10/2019 Copyright © Carl M. Burnett

12 How Big is the Threat to Your Digital Assets & Privacy?
The End of Privacy The End of Privacy CC 4/10/2019 Copyright © Carl M. Burnett

13 FBI Most Common Fraud Schemes
Phishing Spoofing Ransomware Tech Support Fraud Account Compromise (EAC) Advance Fee Schemes Identity Theft Internet Auction Fraud Nigerian Letter or “419” Fraud Non-Delivery of Merchandise Online Vehicle Sale Fraud Redemption / Strawman / Bond Fraud Credit Card Fraud Business Fraud Counterfeit Prescription Drugs Fraud Against Seniors Fraudulent Cosmetics and “Anti-Aging” Products Funeral and Cemetery Fraud Health Care Fraud or Health Insurance Fraud Investment Fraud Letter of Credit Fraud Market Manipulation (“Pump and Dump”) Fraud Ponzi Schemes Prime Bank Note Fraud Pyramid Schemes Reverse Mortgage Scams Telemarketing Fraud Contact the FBI Internet Crime Complaint Center (IC3) 4/10/2019 Copyright © Carl M. Burnett

14 4/10/2019 Copyright © Carl M. Burnett

15 *It should be noted that the numbers above will total more than the total numbers of breaches for each industry because each “record exposed” can be comprised of multiple types of information. 4/10/2019 Copyright © Carl M. Burnett

16 2019 Five Data Breach Predictions
5 - Gaming Breach 4 - Cloud Breach 3 - Major Attack on Wireless Carrier 2 - Skimming 1 - Biometric Signature Hacking 4/10/2019 Copyright © Carl M. Burnett

17 RoboCalling & RoboTexts
2017 – 18 Billion Calls 2018 – 26 Billion Calls ????? 4/10/2019 Copyright © Carl M. Burnett

18 What is my Digital Identity?
Programmer Web Developer Program Assistant Project Manager Program Manager Washington DC New York City Los Angeles, CA Dallas, TX Brussels, Belgium 4/10/2019 Copyright © Carl M. Burnett

19 What Threats to My Digital Identity?
Compromised Personal Identifying Information (PII) Name Home address SSN Passport number Vehicle registration plate number Driver's license number Facial Recognition Fingerprints Credit card numbers Date of Birth Birthplace Telephone number Nickname Compromised Digital Credentials Login name address IP address Digital Certificate Screen name Handle Tracking ID Password Compromised Digital Device Identification ESN IP address MAC Address Barcode RFID Serial No 4/10/2019 Copyright © Carl M. Burnett

20 How to Protect Your Digital Assets
What digital security measures can I take to protect my digital assets? Use a strong password (Multi-Factor Authentication) Use a Password Manager Use a separate password for your devices and accounts. Use and Update Antivirus Programs Update your apps regularly Secure Your Cellphone Secure your laptop/tablet Backup your data regularly Monitor your computer activity. Never open attachments or links in , IM’s from unknown people. Watch out for Social Engineering Use online Credit Card for all online purchases. Use a offline Credit Card for all offline purchases. Monitor your financial account (Text Alerts) Receive free credit report monitoring. Freezing and locking your credit file. Free dark web scan. 4/10/2019 Copyright © Carl M. Burnett

21 Credit Freeze Starting Sept. 21, 2018
Free to place or remove a freeze on your credit report. Equifax or   Experian or TransUnion or 4/10/2019 Copyright © Carl M. Burnett

22 How to Protect Your Digital Assets
Password Privacy Protection Policy Asset Value Type of Site Password Strength Low Social Media Medium (5 Level) Medium Site where you pay for something Strong (7 Level) High Medical Site Very Strong (10 Level) Very High Banking Multi-Factor Authentication Develop a password usage policy based on type of asset. Never use the same password for your router/computer/ or online accounts. Avoid information of commonly known information (friends/family/colleagues). Encourage writing down passwords as long as the written password lists are kept in a safe place - (not attached to a monitor - in an unlocked desk drawer – on a mobile device). 4/10/2019 Copyright © Carl M. Burnett

23 How to Protect Your Digital Assets
7 Level Password Policy 7 Level Password Policy 12 to 14 characters lowercase and uppercase 1 numbers 1 symbols (if permitted) Random passwords Avoid using the same password twice Mnemonic Password 4/10/2019 Copyright © Carl M. Burnett

24 How to Protect Your Digital Assets
Mnemonic Password Protection Policy Mnemonic Password Slogan Lyric of Song Passage Part of a poem A Number Sequence. Replace Lower Case with Upper Case. Replace Number with special character. I Can’t Believe I Ate The Whole Thing – IcBIaTwT AlkaSeltzer TV Commercial Imagine there's no countries, It isn't hard to do – ItNcIiHtD Imagine – John Lennon The most beautiful things in the world cannot be seen or touched – tMbTiTwCbSoT Quote from Hellen Keller You may shoot me with your words, You may cut me with your eyes – yMsMwYwyMcMwYe Still I Rise by Maya Angelou 4/10/2019 Copyright © Carl M. Burnett

25 How to Protect Your Digital Assets
Number Sequence Password Use Number Sequence. Old Telephone Number Reversed Old house Number Addresses Graduation Date Other Special Date 1 - ! 2 3 - # 4 - $ 5 - % 6 - ^ 7 - & 8 - * 9 - ( 0 - ) 4/10/2019 Copyright © Carl M. Burnett

26 How to Protect Your Digital Assets
10 Level Password Protection Policy 10 Level Password Policy – Multi Factor Authentication Avoid: character repetition keyboard patterns dictionary words, letter or number sequences Usernames relative or pet names romantic links (current or past) biographical information Avoid information publicly associated with you 4/10/2019 Copyright © Carl M. Burnett

27 How to Protect Your Digital Assets
Multi Factor Authentication Protection Security Token Web-based Security Authorization Smartphone Security Code Smartphone App Biometric Security 4/10/2019 Copyright © Carl M. Burnett

28 Password Managers PC Magazine Best Password Managers for 2019
RANK PROGRAM COST 1 – Editor Choice Dashlane 3 Free / Premium - $5/M / Plus - $10/M 2– Editor Choice Keeper Password Manager & Digital Vault Free / Express - $2/m / Advanced - $5/M / Pro $15/M 3 RoboForm Everywhere 7 Free / Indiv - $23.88/Y / Family - $47.75 /Y 4 LastPass 3.0 Families (6) - $4/M 5 LastPass 3.0 Premium $2/M 6 Zoho Vault Free / $0.9 per user per month 7 Sticky Password 7 Free / 14.99/Y 8 Intuitive Password 2.9 9 Keeper Password Manager & Digital Vault 8 Personal $2.50/M / Family $5/M 10 Norton Identity Safe Free 11 my1login 4/10/2019 Copyright © Carl M. Burnett

29 How to Protect Your Digital Identity & Privacy
What security measures can I take to protect my digital identity? Destroy Tracking Cookies De-identification Implement DO-NOT -TRACK Do Not Accept Third-Party Cookies Anonymous Searching Eliminate Device Fingerprinting Destroy Click-Stream Data Use a Password Policy 4/10/2019 Copyright © Carl M. Burnett

30 How to Protect Your Digital Identity & Privacy
What are companies responsibilities to protect my digital information? Communications Act of 1934 Section 222 (As amended, 47 U.S.C. 222) U.S. Telecommunications Act of 1996 Granted the Federal Communications Commission (FCC) authority Title 47, Chapter I, Subchapter B, Part 64, Subpart U Customer Proprietary Network Information (CPNI) 4/10/2019 Copyright © Carl M. Burnett

31 How to Protect Your Digital Identity & Privacy
What are companies responsibilities to protect my digital information? Customer Proprietary Network Information (CPNI) Only covers voice communications. (Not Internet communications) Limits the information which carriers may provide to third-party marketing firms. Must first secure affirmative consent of their customers. Defines when and how customer service representatives may share call details. Creates new notification and reporting obligations for carriers (including identity verification procedures). Verification process must MATCH what is shown with the company placing the call. 4/10/2019 Copyright © Carl M. Burnett

32 How to Protect Your Digital Identity & Privacy
What are companies responsibilities to protect my digital information? Customer Proprietary Network Information (CPNI) Opt-Out Procedures Verizon opt-out - call (866) SBC-Ameritech opt-out - call (800) Sprint – Opt-In Program T-Mobile – Opt-Out - call  AT&T – Opt-Out Link Comcast XFINITY Additional Opt-Out of Information 4/10/2019 Copyright © Carl M. Burnett

33 What about Internet Communication?
4/10/2019 Copyright © Carl M. Burnett

34 Internet Communication
FCC changed the Telecom Rules in 2016: Internet Communications to include VOIP Reclassified ISP’s to “Common Carriers” U.S. Telecommunications Act of 1996 would apply. CPNI laws would then apply to Internet communication in 2017. 4/10/2019 Copyright © Carl M. Burnett

35 CPNI Laws and Internet Communication
Election in October 2016 – Change Administration March 21, 2017 – Senate approves to kill the implementation of FCC Broadband Privacy Rules – Vote (50-48) March 28 , 2017 – House approves to kill the implementation of FCC Broadband Privacy Rules – Vote ( ) April 3 , 2017 – President Signs JR 34 nullifying the FCC Broadband Privacy Rules - Directed that the FCC can never make that “rule” again. 4/10/2019 Copyright © Carl M. Burnett

36 How can I Protect my Digital Privacy?
VPNs VPNs CC 4/10/2019 Copyright © Carl M. Burnett

37 What about Privacy Controls?
4/10/2019 Copyright © Carl M. Burnett

38 Tech Defaults Tech Defaults 4/10/2019
Copyright © Carl M. Burnett

39 Privacy Controls Facebook Twitter Google Microsoft Apple LinkedIn
Yahoo Amazon TV’s - STB Cellphone Providers Verizon (See Yahoo) AT&T T-Mobile Sprint WiFi Routers 4/10/2019 Copyright © Carl M. Burnett

40 Facebook Privacy Controls
Technolicious Facebook Privacy Guide Facebook Privacy Basics Data Policy Posts Apps Profile Advanced Privacy Controls Timeline and tagging options Manage blocking Customize app privacy Apps, websites and Platforms Apps others use Ad Settings 4/10/2019 Copyright © Carl M. Burnett

41 Twitter Privacy Controls
Privacy Policy & Data Controls Privacy Settings Personalization and Data settings gPost Article on Twitter Controls 4/10/2019 Copyright © Carl M. Burnett

42 Google Privacy Settings
Google Privacy Policies Security Checkup Privacy Checkup My Activity Data Takeout PC Magazine Google Privacy Article 4/10/2019 Copyright © Carl M. Burnett

43 Microsoft Privacy Controls
Privacy at Microsoft Privacy Dashboard 4/10/2019 Copyright © Carl M. Burnett

44 Apple Privacy Controls
Apple Privacy Policies Manage Your Privacy – By Device Touch ID Face ID 4/10/2019 Copyright © Carl M. Burnett

45 LinkedIn Privacy Controls
LinkedIn Privacy Settings Account Privacy Ads Communications 4/10/2019 Copyright © Carl M. Burnett

46 Yahoo Privacy Controls
Oath - Verizon AOL Yahoo Tumblr MapQuest Oath Privacy Controls 4/10/2019 Copyright © Carl M. Burnett

47 Amazon Privacy Controls
Amazon Privacy Notice Your Profile Wish Lists Customer Reviews Amazon Prime 4/10/2019 Copyright © Carl M. Burnett

48 TV’s – STB Privacy Guidelines
Set Top Box (STB) Disable interactive services Limit ad tracking Opt out 4/10/2019 Copyright © Carl M. Burnett

49 Cellphone Providers Privacy Controls
Verizon (See Yahoo) AT&T – Privacy Policy / Smart Controls T-Mobile – Privacy Statement / Protecting your Privacy Sprint – Privacy Policy / Profile & Opt Out 4/10/2019 Copyright © Carl M. Burnett

50 WiFi Routers Change you defaults Turn Off Wireless Router Broadcasting
Admin Name: Password: Turn Off Wireless Router Broadcasting Use MAC Addressing 4/10/2019 Copyright © Carl M. Burnett

51 Stopping Robocalls - Text - Phone Scams
Don't answer calls from unknown numbers. If you answer such a call, hang up immediately. Be aware: Caller ID showing a "local" number does not necessarily mean it is a local caller. If you answer the phone and the caller - or a recording - asks you to hit a button to stop getting the calls, you should just hang up. Do not respond to any questions, especially those that can be answered with "Yes." Never give out personal information: account numbers Social Security numbers mother's maiden names Passwords other identifying information in response to unexpected calls or if you are at all suspicious. If you get an inquiry from someone who says they represent a company or a government agency, hang up and call the phone number on your account statement, in the phone book, or on the company's or government agency's website to verify the authenticity of the request. You will usually get a written statement in the mail before you get a phone call from a legitimate source, particularly if the caller is asking for a payment. 4/10/2019 Copyright © Carl M. Burnett

52 Stopping Robocalls - Text - Phone Scams
Use a voice mail account password. Contact your phone company about call blocking tools. Use robocall-blocking technology Register your number on the Do Not Call List. File a complaint with the FCC. 4/10/2019 Copyright © Carl M. Burnett

53 Robocall Blocker Apps Android iOS Call Blocker Free
Master call blocker Safest Call Blocker Should I Answer? Blacklist Plus Truecaller iOS Call Controls (iOS) ... Whoscall (iOS) ... Truecaller (iOS) ... Avast Call Blocker – Spam Blocking $$ Mr. Number (iOS) YouMail $$ 4/10/2019 Copyright © Carl M. Burnett

54 PC Magazine “Best of 2019” The Best Free Password Managers of 2019
The Best Antivirus Protection of 2019 The Best Ransomware Protection of 2019 The Best Online Backup Services of 2019 The Best Backup Software of 2019 The Best Data Recovery Software of 2019 The Best VPN Services of 2019 The Best Smart Home Security Systems of 2019 The Best Medical Alert Systems of 2019 4/10/2019 Copyright © Carl M. Burnett

55 Privacy Legislation & Regulation
CC 4/10/2019 Copyright © Carl M. Burnett

56 Is Electronic Data Tangible Property?
In Nutigen (2007), Digitech (2012), and Burnett (2018) The Court of Appeals for the Federal Circuit (CAFC) held: “electronic data is non-tangible property” and is “not real”. On Dec 3, 2018 the U.S. Supreme Court let the CAFC holding stand as law. (Case No Burnett v. Panasonic) CAFC decision - Federal legal holding that electronic data is: Inadmissible as tangible property under Federal Rules of Evidence. Your personal electronic data “non-tangible property”. Cannot be used to prosecute cybercrimes. 4/10/2019 Copyright © Carl M. Burnett

57 GDPR GDPR CC 4/10/2019 Copyright © Carl M. Burnett

58 Review Explain Digital Security & Privacy. Define Digital Assets.
Identify Threats to your Digital Assets. Define Digital Identity and Privacy. Identify Threats to your Digital Identity and Privacy. Identify measures you can take to protect: Your Digital Assets Your Digital Identity Your Digital Privacy 4/10/2019 Copyright © Carl M. Burnett

59 Class Evaluation WD&CE LLI Course Evaluation Form
Course Name: Digital Security and Privacy Course CRN: 35149  Course Start Date: March 19, 2018 Course Instructor: Carl Burnett 4/10/2019 Copyright © Carl M. Burnett


Download ppt "Digital Security & Privacy"

Similar presentations


Ads by Google