information security. what is information security? a. the quality of being secure b. to protect the...

Post on 27-Dec-2015

220 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Information Security

What is Information Security?

A. The quality of being secure

B. To protect the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training, awareness, and technology.

C. The state of being secure

D. I don’t know, you haven’t told me yet

Information Security

• “Defending information from unauthorized access.”

• Bank Accounts, Email, Networks, Devices

• Protecting assets (organizational or personal)

• Who cares?

Target Credit Card Breach

• 98 Million Customers Affected– Credit Card Information– Personal Information

• Emails• Address• Phone Number

• What went wrong?

• Internal Review of Security Systems

A bit of History

• 1930’s/40’s (WWII)

– Computer Security (mainframes)

– Physical

– Permitted Personnel

• 1960’s (Cold War)

– Larry Roberts ARPANET

– Founder of the Internet

• 1970’s/80’s

– Popularity Increased Misuse Increased

– Ethernet

– Department of Defense, Rand Report R-609

Rand Report R-609

• Securing data

• Limiting Random and unauthorized access to that data

• Involving personnel from multiple levels of the organization in matters pertaining to information security

A bit of History Continued…

• 1990’s– Internet was made public

• 2000- Now– Information Security

• Personal Use• National Defense

Today

Risks

• What information can be accessed.

• How your information can be compromised.

Preventative Measures

• How to prevent your information from being compromised.

Approximately how many Global Internet Users are there?

A. 5 million

B. 10 million

C. 2.5 billion

D. 5 billion

Risks

• Accessible to anyone– 2.5 billion internet users

• Identity Theft– MTV Catfish

• Viruses– Virus Protection Software

• Fraud– Online shopping

Social Media

U.S. statistics Class Statistics

Which Celeb’s Refuse to Use Twitter?

A.George Clooney

B.Jennifer Lawrence

C.Tina Fey

D.Mila Kunis

E.All of the above

“It could ruin your career.”http://abcnews.go.com/Entertainment/celebrities-twitter/story?id=20866176#5

Social Media

General Risks

• Who can see it?

• What information?

• Viruses

• Fraud

Your Risks

• Potential employers, family, friends

• Location, age, contact information, etc

• Can access private information

• Credit cards, social security numbers, identity…

Video

• Systematic Guide to Scary Internet Stuff

Which type of program allows for automatic display/download of advertisements?

A. Worms

B. Trojan

C. Spyware

D. Adware

“This” spreads through the transferring of files and infects as many computers as quickly as possible…

A.Worm

B.Spyware

C.Bot

D.Trojan

Preventative Measures

• Strong Passwords• Privacy Settings• Password Protected

Networks• Protected Software • Firewalls

Video

• Mistakes Even Smart Kids Make Online

Passwords

• Simple– Password1

• Easy to Guess– Broncos

• Known date– Birthday

• Using the same password– UNM1– UNM2

What not to do…

Passwords

• What to do…

http://www.youtube.com/watch?v=hYyWgPXfx9U

Summary•  Don't drive in bad

neighborhoods.• If you don't lock your car, it's

vulnerable; if you don't secure your computer, it's vulnerable.

• Reduce your vulnerability, and you reduce the threat.

Social Media is incorporated into each of our daily lives. Be smart, be careful.

top related