information security and you!. information assurance outreach information security online security...

33
Information Security and YOU!

Upload: roxanne-thomas

Post on 11-Jan-2016

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security and YOU!

Page 2: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Assurance Outreach

• Information Security

• Online Security

• Remote Access with Demonstration

• The Cloud

• Email

• Social Media Presence

• Social Engineering Attacks

Page 3: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security

What is Information Security?Information security is what we do to protect information from access, use, release, interference, alteration, observation, replication, theft or destruction by others. It refers to information regardless of the form the data may take either electronic, physical, or any other type.

Page 4: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security

Why is Information

Security Important?

Information security is important, because it helps to protect you from the people around you that may wish to do you harm (intentionally or otherwise, and physically or otherwise).

Page 5: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security

Attackers/PreventersAttackers•Identity Thieves•Predators (Stalkers, crazy exes, rapists, child molesters, etc.)•Enemies (Mean girls/boys, competitors, etc.)•NSA•Employers

Page 6: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security

Attackers/PreventersPreventers•Locks•Passwords•Anti-virus/Anti-malware software•Vigilance

Page 7: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Information Security

Information Technology Careers•IT architect and systems manager: $106,000•Information technology project manager: $90,000•Chief information Officer: $87,000•Information technology manager: $84,000•Systems software manager: $82,000•Information technology business analyst: $80,000•Web administrator: $79,000•Network systems and data communications analyst: $76,000•Computer and information systems manager: $72,000•Computer security specialist: $67,000

(Source of mean annual salary information is indeed.com, October 2012)

IA careers have been very lucrative for many. Some of you may even be considering them as you make your college and future plans.

Page 8: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Online Security

Mobile Access to the Internet

• 3G• 4G• Public Wi-fi• Public Computers (ie. Libraries, Internet cafes,

computer labs/pods, etc.)

Page 9: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Online Security

Security on Mobile Devices• Mobile security apps, such as BullGuard

Mobile Security, Lookout Premium and McAfee Mobile Security, may provide some protection to your smartphone or tablet.

• Always remember to lock your phone.

• Update your settings to add security.

• Install anti-virus software to your laptop.

Page 10: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Online Security

Using Public Wi-FiWhen you use public Wi-Fi, you take on the risk of allowing access to your mobile device to anyone accessing the same network.

Suggestions would be to disable broadcasting and auto login, utilize only secure Wi-Fi networks, add mobile security to your device and disable sharing.

Page 11: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

ONLINE SECURITY (cont.)

Page 12: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Remote Computer Access (mobile access to your home or work computer)

Page 13: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Remote Access

What is Remote Access?Remote access allows you to access your home or work computer from any location (ie. school computer lab, work to home, home to work, grandma’s house, etc.)

Page 14: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Remote Access

Vulnerabilities (and possible solutions)Hackers, Viruses, and Software Bugs

•Patch and update software often•Change the port and other advanced settings•Utilize password protection•Utilize additional security (ie. extra password/pin, etc.)•Lock your home/work computer when not in use•Disable software when you know you won’t need it

Page 16: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

The Cloud

Page 17: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

The Cloud

The cloud allows users to store all of their documents, videos, music, and pictures on a third-party remote database for free, or at a relatively low cost, depending on the service provider.

Page 18: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

The Cloud

Page 19: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

The Cloud

Page 20: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

The Cloud

• Do not use the cloud to store critical or confidential data

• Use caution when retrieving data from the cloud

• Backup your data

• Create a strong password

• Monitor privacy settings

Page 21: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Email Attachments

• Never open an email attachment from someone you don’t know.

• Be cautious when opening email attachments from someone you know.

• Delete emails from unknown senders without opening attachments

• Contact the sender before opening an attachment to verify its authenticity

Page 22: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Email Attachments

Viruses have the ability to obtain access to a user’s contacts and send an email containing a virus to all of the victim’s contacts.

Page 23: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Phishing Scams

Page 24: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Phishing Scams

Page 25: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Phishing Scam

Page 26: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Social Engineering Attacks

Social engineering is a way for fraudsters to obtain information from you by appealing to the natural trusting nature of most individuals.

Page 27: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Facebook Scams

Page 28: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Posting Information Online

• Be careful what information you make publicly available online

• Social engineers look online to gather potentially sensitive and confidential information

Page 29: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Social Media Presence

• 91% of employers will screen an applicant’s Facebook, Twitter, and LinkedIn account before making a hiring decision.

• Almost 1 out of 5 applicants are not hired due to content found online

Page 30: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Confirming Facebook Friends

Page 31: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Friend Requests

Accepting a friend request from someone you don’t know could expose you to a social engineering attack

If someone you don’t know wants to be your friend on Facebook, this should be a red flag.

Page 32: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

Questions?

Page 33: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social

References• http://computer.howstuffworks.com/cloud-computing/cloud-storage.htm• http://www.earthlinksecurity.com/feature/prevention/cloud_vulnerabilities/index.html#axzz2ishQYjAb• http://www.lsu.edu/securityawareness/use_caution_with_e-mail_attachments.html• http://www.samuelmerritt.edu/helpdesk/article_how-avoid-getting-computer-virus-through• http://www.huffingtonpost.com/judy-shapiro/judy-consumer-learns-ther_b_716392.html• http://www.forbes.com/sites/lisaquast/2012/04/23/your-social-media-profile-could-make-or-break-your-next-job-opportunity/• http://voices.yahoo.com/five-reasons-not-accept-facebook-friend-requests-6450792.html• http://en.wikipedia.org/wiki/Information_security• https://www.isc2.org/uploadedFiles/%28ISC%292_Public_Content/2013%20Global%20Information%20Security%20Workforce%20St

udy%20Feb%202013.pdf• http://www.thebestschools.org/blog/2012/10/29/20-online-master-information-technology-it-degree-programs/• http://en.wikipedia.org/wiki/Mobile_security• http://mobile-security-software-review.toptenreviews.com/• http://www.youtube.com/watch?v=w3PKKxsuDk0• http://lifehacker.com/5902654/use-your-home-computer-from-anywhere-a-comprehensive-guide-to-remote-controlling-your-pc• http://www.cnn.com/2013/03/04/tech/web/evernote-hacked/• www.splashtop.com• www.logmein.com• http://www.youtube.com/watch?v=YyrYVZ-oxVQ&list=PLbeu1wP8sqY70Yb5fSRb2a4A0_G6_C2VQ• http://www.youtube.com/watch?v=w3PKKxsuDk0• http://www.youtube.com/watch?v=jXxxLf_B67o• http://www.youtube.com/watch?v=QUY0ZVa3M3E• http://www.youtube.com/watch?v=CqtK32hraaM• http://www.youtube.com/watch?v=MBOeFDl5ZIs