1 / 46

Information/Internet Safety

Information/Internet Safety. Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our homework. Overview. Personal Internet Security Social Engineering Email safeguards Passwords Mobile Devices Social Media. Personal Internet Security. Don’t Be

umika
Download Presentation

Information/Internet Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information/Internet Safety

  2. Information/Internet Safety MBA Candidates at UNM Anderson School of Management This is our homework

  3. Overview • Personal Internet Security • Social Engineering • Email safeguards • Passwords • Mobile Devices • Social Media

  4. Personal Internet Security Don’t Be A Billy! http://www.youtube.com/watch?v=nPR131wMKEo

  5. Personal Internet Security • Keep anti-virus and anti-malware software up-to-date • Use a spam filter • Activate system’s firewall • Update OS and Browser automatically • Complex passwords and change frequently

  6. Personal Internet Security • Physical security • Unfamiliar links • Open wi-fi for personal business • Use privacy and security settings on social networks • BACK UP! BACK UP! BACK UP! • WHAT IS THE WEAKEST LINK IN SECURITY?

  7. Email Safeguards • Spam Filter • Unfamiliar links

  8. Email Safeguards Is This Spam?

  9. Email Safeguards Is This Spam?

  10. Email Safeguards Detecting Spam • Strange E-mail Addresses • Misspelt Words • Don’t Click on Unknown Links • If it Sounds to Good to be True, it Probably is.

  11. Email Safeguards y9dd926c24c9@yahoo.com

  12. Passwords

  13. Passwords • Types of password attacks • Brute Force Attack • Dictionary Attacks • How to protect against these attacks • Change passwords regularly • Choose a good password • Which one is better? • password • Pa$3O!d • Pa$3O!dS!

  14. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  15. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  16. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  17. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  18. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  19. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  20. Password Strength Standard alphabet set without numbers and no special characters Example: password How long will it take to randomly guess the password? (A.K.A Brut Force Attack)

  21. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brut Force Attack)

  22. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  23. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  24. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  25. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  26. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  27. Password Strength Standard alphabet set with numbers, special characters, and case sensitive Example: Pa$s3O!d (password) How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

  28. Password Strength • Minimum of 8 characters • Better not to have any logical sequence • I.E. Pet Names, favorite place, mother’s maiden name, names, etc. • If you do use a logical sequence substitute letters with special characters and case sensitive letters • I.E. albuquerque = A1bU9er6u3 • Not sure if it is good?

  29. Password Strength POP QUIZ! How long until a brute force attack is successful? • letyouin 7.0 seconds • letyouandmein 2.6 years • L37$oU!n 18.9 hours • L3t%0u@n6M3!N 8,010,363.4 years

  30. Mobile Device Security

  31. Mobile Device Security Physical Security • Use a Case • Buy screen protectors to prevent scratches • Don’t leave it in extreme temperatures • Personalize your device

  32. Mobile Device Security Securing Information • Use a PIN • Disable auto complete features & Password memory • Be careful about what permission apps have • Backup your data

  33. Social Engineering

  34. Social Engineering • What is Social Engineering? • “…the art of manipulating people into performing actions or divulging confidential information.” (Wikipedia) • Examples? • White Collar • Burn Notice

  35. Social Engineering Who was the victim? How could this have been prevented? http://www.youtube.com/watch?v=cQtQg--PB0k

  36. Social Engineering • How to protect yourself • Pay attention to what questions you are being asked • Stop and think about what someone is asking you to do or divulge • Always follows rules, policy and guidelines • NEED TO KNOW (NTK) What is Social Engineering?

  37. Social Networking

  38. Social Networking • Who has a Facebook account? • 1.01 Billion people (1,010,000,000) • What is the World’s population? • 7.05 Billion people

  39. Social Networking • Who looks at you posts, statues, and likes? • 1,099,999,999 other Facebook users • Should we be careful on what we post online? • YES!

  40. Social Networking • How to protect yourself • Check you security settings

  41. Social Networking DO NOT CHOOSE PUBLIC!

  42. Social Networking BETTER THAN PUBLIC STILL NOT GOOD ENOUGH

  43. Social Networking

  44. Social Networking

  45. Review • Personal Internet Security • Social Engineering • Email safeguards • Passwords • Mobile Devices • Social Media

More Related