Post on 27-Dec-2015
transcript
Information Security
What is Information Security?
A. The quality of being secure
B. To protect the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training, awareness, and technology.
C. The state of being secure
D. I don’t know, you haven’t told me yet
Information Security
• “Defending information from unauthorized access.”
• Bank Accounts, Email, Networks, Devices
• Protecting assets (organizational or personal)
• Who cares?
Target Credit Card Breach
• 98 Million Customers Affected– Credit Card Information– Personal Information
• Emails• Address• Phone Number
• What went wrong?
• Internal Review of Security Systems
A bit of History
• 1930’s/40’s (WWII)
– Computer Security (mainframes)
– Physical
– Permitted Personnel
• 1960’s (Cold War)
– Larry Roberts ARPANET
– Founder of the Internet
• 1970’s/80’s
– Popularity Increased Misuse Increased
– Ethernet
– Department of Defense, Rand Report R-609
Rand Report R-609
• Securing data
• Limiting Random and unauthorized access to that data
• Involving personnel from multiple levels of the organization in matters pertaining to information security
A bit of History Continued…
• 1990’s– Internet was made public
• 2000- Now– Information Security
• Personal Use• National Defense
Today
Risks
• What information can be accessed.
• How your information can be compromised.
Preventative Measures
• How to prevent your information from being compromised.
Approximately how many Global Internet Users are there?
A. 5 million
B. 10 million
C. 2.5 billion
D. 5 billion
Risks
• Accessible to anyone– 2.5 billion internet users
• Identity Theft– MTV Catfish
• Viruses– Virus Protection Software
• Fraud– Online shopping
Social Media
U.S. statistics Class Statistics
Which Celeb’s Refuse to Use Twitter?
A.George Clooney
B.Jennifer Lawrence
C.Tina Fey
D.Mila Kunis
E.All of the above
“It could ruin your career.”http://abcnews.go.com/Entertainment/celebrities-twitter/story?id=20866176#5
Social Media
General Risks
• Who can see it?
• What information?
• Viruses
• Fraud
Your Risks
• Potential employers, family, friends
• Location, age, contact information, etc
• Can access private information
• Credit cards, social security numbers, identity…
Video
• Systematic Guide to Scary Internet Stuff
Which type of program allows for automatic display/download of advertisements?
A. Worms
B. Trojan
C. Spyware
D. Adware
“This” spreads through the transferring of files and infects as many computers as quickly as possible…
A.Worm
B.Spyware
C.Bot
D.Trojan
Preventative Measures
• Strong Passwords• Privacy Settings• Password Protected
Networks• Protected Software • Firewalls
Video
• Mistakes Even Smart Kids Make Online
Passwords
• Simple– Password1
• Easy to Guess– Broncos
• Known date– Birthday
• Using the same password– UNM1– UNM2
What not to do…
Passwords
• What to do…
http://www.youtube.com/watch?v=hYyWgPXfx9U
Summary• Don't drive in bad
neighborhoods.• If you don't lock your car, it's
vulnerable; if you don't secure your computer, it's vulnerable.
• Reduce your vulnerability, and you reduce the threat.
Social Media is incorporated into each of our daily lives. Be smart, be careful.