lost data results in lost. ….the resources of the office of research support a vigorous effort to...

16
LOST DATA RESULTS IN LOST

Upload: nya-decker

Post on 28-Mar-2015

216 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

LOST DATA

RESULTS IN LOST

Page 2: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

“….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and innovation.”

UNM’s Research Mission – Untapped Potential (May 16, 2012)

• “In this new vision of economic development, business leaders must work with government and with the university to find new solutions. The new world is one of public/private partnerships, and in that world, the most successful outcomes will include UNM.

• “One unique resource we have here in New Mexico is our access to National Laboratories, Los Alamos, Sandia and the Air Force Research Lab. Down I-25, we have the White Sands Test Facility and White Sands Missile Range. These facilities offer us significant opportunities for scientific partnerships. Their proximity also distinguishes us from other research universities.”

The Installation Address of Robert G. Frank, 21st President of the University of New Mexico (November 18, 2012)

Page 3: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

FSO RESPONSIBILITIES• Classified Contracts• Security Clearances• Information Protection (Intellectual Property, Trade Secrets, Classified,

Export Controlled) They don’t only want classified. Unclassified information helps them fill in pieces to the puzzle• Counterintelligence Briefings • Travel Briefings• Visit Requests• Security Training• Ensure your personal information stays personal

Page 4: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

UNIVERSITIES ARE A TOP TARGET TO STEAL U.S. TECHNOLOGY

Technology• Semiconductors• Lasers, Sensors, & Optics• Robotics• UAV’s (Unmanned Aerial Vehicles)• Information Systems• Navigation Systems• Aeronautics• Marine and Space Systems • Cryptography

Areas of Concern• Electrical and Computer Engineering• Chemical and Nuclear Engineering• Manufacturing Engineering• Computer Science• Physics and Astronomy• Biology• Earth and Planetary Sciences• Mathematics

Page 5: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

Your Ideas = Your Future

Losing your research not only has national security implications, but ruins your potential to patent and publish.

Page 6: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

ONLINE THEFT OF INTELLECTUAL PROPERTY

“The greatest transfer of wealth in history is happening and it's happening quietly right now" Cyber Command Chief General Keith Alexder

http://defense.aol.com/2012/07/30/dont-wait-for-cyber-pearl-harbor-russia-and-china-are-stealing/

Page 7: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

250,000 Twitter Accounts Hacked

CNN reports that the Twitter attack follows major security breaches at the New York Times and the Wall Street Journal. Both of those attacks were attributed to Chinese hackers.http://www.networkworld.com/community/blog/chinese-hackers-use-compromised-usa-university-computers-attack-us

Page 8: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

Cyber Warfare

• Defense Secretary Leon Panetta and other senior DoD officials have called cyber-attacks one of the greatest threats to America’s national security, and an area in which the U.S. military is the farthest behind.

• It is becoming increasingly clear that countries like China and Russia have no misgivings about using cyber warfare as a highly effective and inexpensive means to obtain information and improve their national superiority.

• Most people in the U.S. are oblivious to the threat of cyber-attacks and therefore create opportunities for cyber spying and hacking, using weak passwords to protect confidential information and opening documents without knowing the sender.

http://www.policymic.com/articles/3645/cyber-warfare-the-war-america-is-losing/featured_writer

• CYBER CRIME COST CONSUMERS $110 BILLION LAST YEAR!• 6 BILLION email scams sent out monthly!• Remember: YOU HAVE TO DO SOMETHING TO BE ATTACKED

Page 9: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

INDUSTRIAL VS FOREIGN SPIES

Page 11: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

THAN THESE?

KEEP AMERICA’S SECRETS

Page 12: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

International Travel Concerns• If at all possible don’t take laptops and smartphones• Only take data that is necessary for your trip• If you plug thumb drive into another computer overseas, throw it away • Do not install software updates requested by any public Wi-Fi or your

hotel internet• If laptop is stolen report it to local Police and UNM• Ensure IT Dept. examines laptop before plugging back into university

network• Beware of thumb drives• Reasonable suspicion is not needed for customs officials to search a

laptop computer or other personal electronic storage devices at the border.

Page 13: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

SECURITY TIP OF THE DAY

Virus can infect the computer you are using Hacker can obtain every document stored on the computer/network - Research - Personal information

- Email

Page 14: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

LAPTOP SECURITY

http://video.today.msnbc.msn.com/today/50572646/#50572646

Page 15: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

OTHER TRAINING OFFERED

• Cyber Security – Phishing: How Not To Become a Victim of Email Fraud

• Social Networking Security• Laptop and Cell phone Security• International Travel Security• Workplace Violence

Page 16: LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and

CONTACT:

DEB KUIDISMANAGER OF INDUSTRIAL SECURITY /FSO

1717 ROMA, RM. 204505-277-0732

[email protected]://research.unm.edu/industrialsecurity/