information assurance outreach. overview survey results password security e-mail safety internet...

22
Information Assurance Outreach

Upload: berniece-mason

Post on 23-Dec-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Information Assurance Outreach

Page 2: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Overview

• Survey Results

• Password Security

• E-mail Safety

• Internet Privacy

• Social Media Privacy and Safety

• Technology Demonstration

Page 3: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Survey Results

Have you ever communicated with someone you haven’t met face-to-face?

Page 4: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Survey Results

Have you ever answered personal questions about your age, gender or location in e-mail, IM or online chat?

Have you ever answered questions or given out information such as your phone number, address, social security number, etc. over the internet?

Page 5: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Password Management

• In 2009, an 18-year-old hacker used a dictionary attack to gain access to an administrator’s account on Twitter.

• He used an automated password-guesser that would guess common English words.– The password was “happiness.”

• He used the administrator’s account to gain access to other accounts including Barack Obama’s account by resetting the account passwords..

Page 6: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Password Management

• Passwords should be strong, unique, and difficult to guess.

• A strong password should be at least 8-10 characters long and multiple character types.– Lowercase letters– Uppercase letters– Numbers– Special characters

• A different password should be used for each account to prevent an attacker from gaining access to multiple accounts.

Page 7: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Creating a Strong Password

• Start with a sentence that has at least 8 words.– reading is the most enjoyable thing to do

• Substitute numbers for words.– reading is the most enjoyable thing 2 do

• Use the first letter of each word in the sentence to create a new word.– ritmet2d

• Add some upper case letters.– Ritmet2D

• Substitute special characters that look like or remind you of letters.– R!tmet2D

Page 8: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Email Security

• Email accounts are common attack targets.• In 2011, a man was arrested for hacking the email accounts

of celebrities to steal their private photos and confidential documents.

• He gained access to the email accounts of Mila Kunis, Scarlet Johansson, Renee Olstead and dozens of other celebrities.

• He used publically available information to correctly answer the security questions needed to reset the passwords.

• He collected numerous private photographs, business contracts, letters, driver’s license information, and social security numbers.

Page 9: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Email Security

• Use different usernames for each email address.

• Use different for each email account• If the identity of the sender cannot be

verified, you should consider deleting the email without opening it.

• You should never open a links or attachment from a person that you do not know.

Page 10: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Using Links

• It is possible for someone to create links with misleading names.

• People create these fake links in order to obtain private information such as a password or banking information.

• In 2013, an employee at a European company was tricked into providing the password for the company’s bank account.– Lost over $160,000

Page 11: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Phishing

http://www.youtube.com/watch?v=K8lWLwuiDwk

Page 12: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Online Predators

• An 11-year-old girl ran away from home and went to Florence with

a 23-year-old man she met on the internet.

• Julie decided to run-away from home to be with Tim (a much older

man).  Julie was found three-weeks later, Tim was arrested and is

now serving 25-years in prison.  Tim sent Julie a letter from prison

blaming her for his incarceration and threatened to kill her. 

• People can be forced into things they don’t want to do.

• Kidnapped

• Slavery

Page 13: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Internet Privacy

• Certain information should not be shared on the Internet.– Name

– Age

– Gender

– Address

– Telephone Number

– Social Security Number

• You should never meet with a stranger that you meet online.

Page 14: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Even Smart Kids Make Mistakes

http://www.youtube.com/watch?v=zPbm478fD5M

Page 15: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Can I get hacked?

• Celebirties twitter acounts get hacked all the time!– Justin Beiber– Alec Baldwin– Donald Trump– One Direction’s singer Niall Horan

Page 16: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Social Media

• Protect your information through security settings• Almost anyone can see your profile information once you

are 18– Facebook provides extra security for minors

• Bully Block• Make sure Google (or other search engines) can’t link

people to your profile.• Block app invites.• Other social media sites have similar security settings,

make sure you use them!

Page 17: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Social Networking

Page 18: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Social Networking

Page 19: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Social Networking

Page 20: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Social Media Attacks

http://video.foxbusiness.com/v/2209766731001/

Page 21: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Demonstration

• By visiting a vulnerable web page with an internet browser, hackers can use your webcam to watch you.

• How can you protect yourself?– Disable webcam when not using it. – Turn off your computer after each use. – Close your laptop.

Page 22: Information Assurance Outreach. Overview Survey Results Password Security E-mail Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration

Questions?