Download - Information Security: F rom the Outside In
Transcript
![Page 2: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/2.jpg)
![Page 3: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/3.jpg)
T H E C L O U D . . .
![Page 4: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/4.jpg)
Many people choose passwords
that are based on informationeasily found on social
networkingsites, like birthdays and
anniversaries
*Ironic to choose a password this way for Facebook?
![Page 5: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/5.jpg)
![Page 6: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/6.jpg)
How Would You Prefer to Spend Your Time?
Tax Audit
Root Canal
![Page 7: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/7.jpg)
![Page 8: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/8.jpg)
![Page 9: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/9.jpg)
![Page 10: Information Security: F rom the Outside In](https://reader035.vdocuments.site/reader035/viewer/2022081520/5681613a550346895dd09ab5/html5/thumbnails/10.jpg)
Thank you
Information from the training:http://itso.blogs.rice.edu
Contact Information:[email protected]