information security and you!. information assurance outreach information security online security...
TRANSCRIPT
![Page 1: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/1.jpg)
Information Security and YOU!
![Page 2: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/2.jpg)
Information Assurance Outreach
• Information Security
• Online Security
• Remote Access with Demonstration
• The Cloud
• Social Media Presence
• Social Engineering Attacks
![Page 3: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/3.jpg)
Information Security
What is Information Security?Information security is what we do to protect information from access, use, release, interference, alteration, observation, replication, theft or destruction by others. It refers to information regardless of the form the data may take either electronic, physical, or any other type.
![Page 4: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/4.jpg)
Information Security
Why is Information
Security Important?
Information security is important, because it helps to protect you from the people around you that may wish to do you harm (intentionally or otherwise, and physically or otherwise).
![Page 5: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/5.jpg)
Information Security
Attackers/PreventersAttackers•Identity Thieves•Predators (Stalkers, crazy exes, rapists, child molesters, etc.)•Enemies (Mean girls/boys, competitors, etc.)•NSA•Employers
![Page 6: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/6.jpg)
Information Security
Attackers/PreventersPreventers•Locks•Passwords•Anti-virus/Anti-malware software•Vigilance
![Page 7: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/7.jpg)
Information Security
Information Technology Careers•IT architect and systems manager: $106,000•Information technology project manager: $90,000•Chief information Officer: $87,000•Information technology manager: $84,000•Systems software manager: $82,000•Information technology business analyst: $80,000•Web administrator: $79,000•Network systems and data communications analyst: $76,000•Computer and information systems manager: $72,000•Computer security specialist: $67,000
(Source of mean annual salary information is indeed.com, October 2012)
IA careers have been very lucrative for many. Some of you may even be considering them as you make your college and future plans.
![Page 8: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/8.jpg)
Online Security
Mobile Access to the Internet
• 3G• 4G• Public Wi-fi• Public Computers (ie. Libraries, Internet cafes,
computer labs/pods, etc.)
![Page 9: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/9.jpg)
Online Security
Security on Mobile Devices• Mobile security apps, such as BullGuard
Mobile Security, Lookout Premium and McAfee Mobile Security, may provide some protection to your smartphone or tablet.
• Always remember to lock your phone.
• Update your settings to add security.
• Install anti-virus software to your laptop.
![Page 10: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/10.jpg)
Online Security
Using Public Wi-FiWhen you use public Wi-Fi, you take on the risk of allowing access to your mobile device to anyone accessing the same network.
Suggestions would be to disable broadcasting and auto login, utilize only secure Wi-Fi networks, add mobile security to your device and disable sharing.
![Page 12: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/12.jpg)
Remote Computer Access (mobile access to your home or work computer)
![Page 13: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/13.jpg)
Remote Access
What is Remote Access?Remote access allows you to access your home or work computer from any location (ie. school computer lab, work to home, home to work, grandma’s house, etc.)
![Page 14: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/14.jpg)
Remote Access
Vulnerabilities (and possible solutions)Hackers, Viruses, and Software Bugs
•Patch and update software often•Change the port and other advanced settings•Utilize password protection•Utilize additional security (ie. extra password/pin, etc.)•Lock your home/work computer when not in use•Disable software when you know you won’t need it
![Page 15: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/15.jpg)
Remote Access
Demonstration
![Page 16: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/16.jpg)
The Cloud
![Page 17: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/17.jpg)
The Cloud
The cloud allows users to store all of their documents, videos, music, and pictures on a third-party remote database for free, or at a relatively low cost, depending on the service provider.
![Page 18: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/18.jpg)
The Cloud
![Page 19: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/19.jpg)
The Cloud
![Page 20: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/20.jpg)
The Cloud
• Do not use the cloud to store critical or confidential data
• Use caution when retrieving data from the cloud
• Backup your data
• Create a strong password
• Monitor privacy settings
![Page 21: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/21.jpg)
Email Attachments
• Never open an email attachment from someone you don’t know.
• Be cautious when opening email attachments from someone you know.
• Delete emails from unknown senders without opening attachments
• Contact the sender before opening an attachment to verify its authenticity
![Page 22: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/22.jpg)
Email Attachments
Viruses have the ability to obtain access to a user’s contacts and send an email containing a virus to all of the victim’s contacts.
![Page 23: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/23.jpg)
Phishing Scams
![Page 24: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/24.jpg)
Phishing Scams
![Page 25: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/25.jpg)
Phishing Scam
![Page 26: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/26.jpg)
Social Engineering Attacks
Social engineering is a way for fraudsters to obtain information from you by appealing to the natural trusting nature of most individuals.
![Page 27: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/27.jpg)
Facebook Scams
![Page 28: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/28.jpg)
Posting Information Online
• Be careful what information you make publicly available online
• Social engineers look online to gather potentially sensitive and confidential information
![Page 29: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/29.jpg)
Social Media Presence
• 91% of employers will screen an applicant’s Facebook, Twitter, and LinkedIn account before making a hiring decision.
• Almost 1 out of 5 applicants are not hired due to content found online
![Page 30: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/30.jpg)
Confirming Facebook Friends
![Page 31: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/31.jpg)
Friend Requests
Accepting a friend request from someone you don’t know could expose you to a social engineering attack
If someone you don’t know wants to be your friend on Facebook, this should be a red flag.
![Page 32: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/32.jpg)
Questions?
![Page 33: Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Email Social](https://reader036.vdocuments.us/reader036/viewer/2022062322/56649e405503460f94b32448/html5/thumbnails/33.jpg)
References• http://computer.howstuffworks.com/cloud-computing/cloud-storage.htm• http://www.earthlinksecurity.com/feature/prevention/cloud_vulnerabilities/index.html#axzz2ishQYjAb• http://www.lsu.edu/securityawareness/use_caution_with_e-mail_attachments.html• http://www.samuelmerritt.edu/helpdesk/article_how-avoid-getting-computer-virus-through• http://www.huffingtonpost.com/judy-shapiro/judy-consumer-learns-ther_b_716392.html• http://www.forbes.com/sites/lisaquast/2012/04/23/your-social-media-profile-could-make-or-break-your-next-job-opportunity/• http://voices.yahoo.com/five-reasons-not-accept-facebook-friend-requests-6450792.html• http://en.wikipedia.org/wiki/Information_security• https://www.isc2.org/uploadedFiles/%28ISC%292_Public_Content/2013%20Global%20Information%20Security%20Workforce%20St
udy%20Feb%202013.pdf• http://www.thebestschools.org/blog/2012/10/29/20-online-master-information-technology-it-degree-programs/• http://en.wikipedia.org/wiki/Mobile_security• http://mobile-security-software-review.toptenreviews.com/• http://www.youtube.com/watch?v=w3PKKxsuDk0• http://lifehacker.com/5902654/use-your-home-computer-from-anywhere-a-comprehensive-guide-to-remote-controlling-your-pc• http://www.cnn.com/2013/03/04/tech/web/evernote-hacked/• www.splashtop.com• www.logmein.com• http://www.youtube.com/watch?v=YyrYVZ-oxVQ&list=PLbeu1wP8sqY70Yb5fSRb2a4A0_G6_C2VQ• http://www.youtube.com/watch?v=w3PKKxsuDk0• http://www.youtube.com/watch?v=jXxxLf_B67o• http://www.youtube.com/watch?v=QUY0ZVa3M3E• http://www.youtube.com/watch?v=CqtK32hraaM• http://www.youtube.com/watch?v=MBOeFDl5ZIs