Presentation is loading. Please wait.

Presentation is loading. Please wait.

Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE-1303269 Any opinions, findings, conclusions.

Similar presentations


Presentation on theme: "Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE-1303269 Any opinions, findings, conclusions."— Presentation transcript:

1 Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE-1303269 Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation

2 Disaster and You What is your plan for when disaster strikes? -How will you communicate with others ? -Where will you get the information you need to stay safe? -How will you contact family?

3 How Do We Communicate? Mobile phones -Voice calls -Texting Social media sites Others?

4 Damage to cell towers. Damage to the POTS (Plain old telephone service) and cable service equipment. Power outages. Communication Problems from Natural Disasters

5 Man-Made Disasters Physical terrorist acts. Cyber attacks. Failures or errors resulting in Power Outage.

6 What can you do? If communication systems are completely down, not much. Often, though the cellular and Wi-Fi systems are working but become overloaded. -Overloaded with all the emergency personnel utilizing these resources. -Overloaded with a huge surge of the general public attempting to use them. Don’t add to the overload.

7 This is what you can do: Use communication devices sparingly. Text. Switch to VOIP.

8 How can you help before these disasters strike? Know where your devices are. Upon loss of a mobile device, disable until located. -Use a locator app to locate your device. -Power off, if never located.

9 Options of the locator app: Sending a message or playing a sound. Performing remote security measures. -Remote lock. -Remote wipe.

10 Passcode Locking One simple method to protect your mobile device. Many types: -None -Slide -Face Unlock -Pattern -Password -Simple Passcode.

11 Types of Passcode Locks None – removes any other type of passcode lock if one is set. Slide – User slides an icon to unlock the device – this is least secure. Face Unlock - Uses camera to recognize face. Pattern – Locks the device when user slides a finger over the screen in a certain pattern. Same pattern must be used to unlock. Password – Uses a password to unlock the device. Simple Passcode – iOS devices only – 4 digit number.

12 How does this tie into CIP? The smallest actions can make a difference in how we protect individuals, our communities and our entire nation. -Loading a passcode lock. -Locating the mobile device. -Performing various secure techniques.

13 Conclusion The point is: One little crack may be all it takes for someone to do major harm to you, or your family, or something much bigger. We all need to do our part.


Download ppt "Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE-1303269 Any opinions, findings, conclusions."

Similar presentations


Ads by Google