+ All Categories
Home > Documents > Cybersecurity and a Digital Native Generation That Shares...

Cybersecurity and a Digital Native Generation That Shares...

Date post: 10-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
29
ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved. Headquarters: 1768 Business Center Dr.., # 200, Reston, VA 20190 Office: 703 435 9052 Fax: 703 435 3102 www.indrasoft.com © 2011. All rights reserved. March 7, 2018 Presented by: Paul Wamsted Solution Architect IndraSoft, Inc. ISO 9001-2008 & CMMI Level III Certified, W/O SDB Cybersecurity and a Digital Native Generation That Shares Everything The views expressed in this presentation are those of the author(s) and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S. Government.
Transcript
Page 1: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Headquarters:

1768 Business Center Dr.., # 200, Reston, VA 20190

Office: 703 435 9052 Fax: 703 435 3102

www.indrasoft.com

© 2011. All rights reserved.

March 7, 2018

Presented by:Paul Wamsted

Solution Architect

IndraSoft, Inc.

ISO 9001-2008 & CMMI Level III Certified, W/O SDB

Cybersecurity and a Digital Native Generation That Shares Everything

The views expressed in this presentation are those of the author(s) and do not necessarily reflect the official policy or position of the Air Force, the Department of Defense, or the U.S. Government.

Page 2: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Discussion

•Overview

• Natives Online – Statistics

•Online Threats

•Where Do We Go From Here?

• Conclusion

•Q&A

Page 3: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

• Digital Native: A person that grows upin the digital age, rather than acquiringfamiliarity as an adulto “A Declaration of the Independence of

Cyberspace, ” February 1996

o “Digital Natives, Digital Immigrants,”October 2001

Overview – What are Digital Natives?

“…your own children…they are natives in a world where you will always be immigrants.”

--John Perry Barlow

Page 4: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

• Digital Immigrant: A person thatacquires familiarity with digitalsystems as an adult or later in lifeo Most Policy Makers and Leadership

o The Immigrant “accent”

Overview – What are Digital Natives?

“Digital Immigrants…like all immigrants…adapt to their environment, they always retain, to some degree, their "accent," that is, their foot in the past.”

--Marc Prensky

Page 5: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

• Digital Natives: People who have never known a worldwithout micro/home computing and possibly the Interneto Pre-social web

o Internet required effort to access

• Social Native: People who have grown up in a Web thathave never not been socialo The practical point of the Web for many Social Natives is

collaborative content

o Effortless access to information and sharing socially

Overview – Digital Natives as Social Web Immigrants

Page 6: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

• Digital Natives are Social Immigrants

• We have to work harder to understand what Social Nativesunderstand intuitivelyo Privacy

o Idea ownership

o Communication

Overview – Digital Natives as Social Web Immigrants

Page 7: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Page 8: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Natives Online – Statistics

Page 9: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Usage• Twenty-four percent (24%) of responding teens report going

online “almost constantly.”

•Ninety-two percent (92%) of responding teens report goingonline at least once daily.

• Eighty-eight percent (88%) of reporting teens 13-17 have acell phone, and 90% use them to texto The average teen user sends and receives 30 texts per day, which

does not include app generated messages.

Page 10: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Usage• Seventy-one percent of reporting teens say they use at least

one social network:o Facebook

o Google+

o Instagram

o Twitter

o Snapchat

o Tumblr

Page 11: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Usage and Privacy• According to a Pew Research Center Study of Teens, Social

Media, and Privacy (May 2013):o 91% post photos of themselves online

o 71% post their school name

o 71% post their city/town where they live

o 53% post their email address

o 20% post their cell phone number

o 92% post their real name

o 84% post their interests

o 82% post their birthday

Page 12: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Usage and Privacy• Children under the age of 13 have social media accounts.

o Children’s Online Privacy Protection Act of 1998

o Some estimate as high as 38% of kids on Facebook are under 13

• As reported by The Australian in May 2017, Facebookreported to advertisers that it can identify when teens arefeeling “insecure” or “worthless.”

• Congress cleared the way for ISPs to sell browsing history.o Selling of history was set to be banned in October 2017, but that

action has been rescinded.

Page 13: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Usage and Privacy – An Example

Page 14: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Usage and Privacy - An Example Cont.

Page 15: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Usage and Privacy – An Example Cont.

Page 16: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats

Page 17: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats – Information Leakage

• Sixty-six percent (66%) of active usersof Facebook reported that they didnot know privacy controls existedand/or did not know how to usethem.

• Facebook Graph Search andwww.stalkscan.com

• Accidental leakage of confidentialdatao Kristian Saucier and the US Navy

o Reverse Google Image search

Page 18: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats – Radicalization• Fifty-five percent (55%) of teens have given out personal

information to someone they don’t know, including photosand physical descriptions.

• Sixty-six percent (66%) of active users of Facebook reportedthat they did not know privacy controls existed and/or did notknow how to use them

• Islamic Fundamentalist Terror• According to the Brookings institution, approximately 20% of ISIS

supporters selected English as their primary Twitter language.

• New account creations from ISIS supporters increased from 2 in2008 to over 11,000 accounts in 2014.

Page 19: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats – Radicalization• Equal access to content creation has diluted what is “news.”

o Problems with users determining what is true versus what ispropaganda or hate speech

• Internet communication as an echo chambero It is easy to remove oneself from the marketplace of ideas

• American hate groupso Hate groups, as identified by the Southern Poverty Law Center

(SPLC), use social media similarly to other foreign terrorist groups.

o The average number of likes per hate group posts on twitter haveincreased significantly as exposure has increased.

Page 20: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Page 21: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats – Terror Targeting

•Understand that digital terrorism exists:“…any Muslim who intends to do jihad against the enemyelectronically, is considered in one way or another a mujaheed,as long as he meets the conditions of jihad such as the sincereintention and the goal of serving Islam and defending it, even ifhe is far away from the battlefield” –SITE Intelligence Group,January 2012

Page 22: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Online Threats – Terror Targeting• Facebook has roughly 1.3 billion active accounts

o Terrorists understand the value in this for recruitment.

o Terrorists understand the value in this for “soft” targeting.

• Twitter provides “real time” ability to share information andreach followers.o Accounts are ephemeral

o Accounts can be set up in minutes

o Accounts can be made widely available▪ Al-Nusra front gained 20,000 followers within 24 hours

Page 23: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Where Do We Go From Here?

Page 24: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Where Do We Go – Education• Adapt Cyber to Social Natives

o More than passwords and firewalls

o Understanding the role the Internet plays in the day-to-day lives of“natives”▪ Asking Social Natives to not engage in Social Web activity is no longer a

possibility.

▪ The Internet is no longer something you turn off.

o Social Media Engineering

Page 25: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Where Do We Go – Education• Teach our own children the basics

o A “do not talk to strangers” campaign for the Digital Age is anoutmoded concept.

o Start online security concerns young; children access the Internet,in some form, at the average age of 3.

• Advocate for New Student Curriculumso Make safe technology use a core part of all elementary

curriculums.

o Stop treating technology as a separate concept from othersubjects.

Page 26: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Where Do We Go – Social Media as Predictor• Social Media Image

o Understand that social media image is not indicative ofperformance capability

o Understand social natives do not compartmentalize use of socialmedia

• Behavior Has Not Fundamentally Changedo Understand that social native behavior is not fundamentally

different from that of other generationso Think about things from your own past that would preclude you

from holding a job or a clearanceo Although these occurrences are more shareable today, they are just as

frequent

Page 27: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Where Do We Go – Privacy vs Obscurity•What is Obscurity?

• Recognize the value of social media obscurity for futureinteractions.o We naturally rely on obscurity rather than privacy.

o Rethink the “well, it was posted online…” defense of privacyinvasions.

o Understanding context.

• Rethinking Public/Private nature of communication

•Obscurity as a design strategy for social media and socialcomponents, building in the ability to natively obscureinformation

Page 28: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Conclusion

• Social Natives and Digital Natives are not created equal.

• Constant Internet access and social web communication isnot going away.

• The Social Web offers tremendous opportunities, but it alsocarries threats.

•We have to advocate now on how we will prepare for a post-Social Web workforce.

•We have to work to change our notions of Internetinteraction and understand that it is now part of public life.

Page 29: Cybersecurity and a Digital Native Generation That Shares ...isc2chapter-middlega.org/.../0935_Digital_Natives... · 3/7/2018  · •Digital Natives: People who have never known

ISO 9001-2008 & CMMI Level III Certified, W/O SDB © 2011. All rights reserved.

Next Steps/Action Items/Closing Thoughts

Any Questions?


Recommended