19
Protecting Yourself Online (Information Assurance)

Protecting Yourself Online (Information Assurance)

Embed Size (px)

Citation preview

Page 1: Protecting Yourself Online (Information Assurance)

Protecting Yourself Online(Information Assurance)

Page 2: Protecting Yourself Online (Information Assurance)

Information Assurance

• Definition (IA): The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

• Assurance – a positive declaration designed to give confidence

• Accounting – Profession in auditing is about assuring financial information of companies.

Page 3: Protecting Yourself Online (Information Assurance)

Internet Safety

• What is internet safety?– “is the knowledge of maximizing the user's

personal safety and security risks on private information and property associated with using the internet.”

Page 4: Protecting Yourself Online (Information Assurance)

Internet Safety• Creating personal safety through knowledge on

– Social Media• Facebook, Twitter, Instagram, etc..

– Internet Use • Public Wi-Fi networks

– Passwords• Strength of password, Vulnerabilities

– Internet Links• Untrusted, Unsure?

– Email• Spam Attachments, Viruses

Page 5: Protecting Yourself Online (Information Assurance)

Trouble on Social MediaHeadline: Superintendent tweets farm animal noises about top state official 

Page 6: Protecting Yourself Online (Information Assurance)

Social Media

• How many students actively use Facebook, Twitter, Instagram, or any other social network?

• What kind of information are you putting on these sites?– Name – Address– Phone Number– Email– Job– Family Members– Birthdate

Page 7: Protecting Yourself Online (Information Assurance)

Facebook

• How can Facebook help protect you from theft or scams?

Page 8: Protecting Yourself Online (Information Assurance)

• Think You’re Still Safe?

• Who posts pictures from a smartphone?

http://www.youtube.com/watch?v=NcuwDQS1Uw0

Page 9: Protecting Yourself Online (Information Assurance)

Free Wi-Fi!

• What are you really connecting to?– http://www.youtube.com/watch?v=o0xkdVqh974

Page 10: Protecting Yourself Online (Information Assurance)

FREE Wi-Fi!

• Are you putting yourself at risk by using free Wi-Fi at places that offer it?

• What’s wrong with free Wi-Fi?– Wireshark– Stealing your information through an

unsecured wireless network• 95% of Wi-Fi traffic data is unencrypted

Page 11: Protecting Yourself Online (Information Assurance)

Wireshark

• What is Wireshark?– “is a network packet analyzer. A network packet

analyzer will try to capture network packets and tries to display that packet data as detailed as possible.”

Page 12: Protecting Yourself Online (Information Assurance)

PasswordsRecognize any of these?

An 18 year old boy gained access to a Twitter Staff

members account allowing him special administrative access.

Page 13: Protecting Yourself Online (Information Assurance)

Passwords

• What is a good password? – Use the internet to help determine strength.

• http://www.passwordmeter.com

– Who thinks they have a good password? – Tips

• Try not to use simple words • Use combination of characters • Use a saying and create an acronym• Try to use more than one password

Page 14: Protecting Yourself Online (Information Assurance)

Untrusted Links

• IF YOU AREN’T SURE DON’T CLICK– MacKeeper

Page 15: Protecting Yourself Online (Information Assurance)

Email Spam• Spam Email is unwanted email sent by an automatic

messaging software on the internet.

• What happens if you click on the links?– You can be sent to a phishing website that is hosting malware

– Malware can be installed on your computer without your knowledge• If either of the above occur, your computer has a high chance of being infected with a

virus• Your information can be stolen if it’s not properly protected

Page 16: Protecting Yourself Online (Information Assurance)

Mobile Spam• Spam has been increasingly growing

through text messages and mobile phones– The messages claim you have won a prize and you

just need to click the link– Sometimes the messages have no clear message at

all

Page 17: Protecting Yourself Online (Information Assurance)

Viruses You Can Obtain

• Malware

• AdWare

• Trojan

• Worms

• Denial of Service

Page 18: Protecting Yourself Online (Information Assurance)

Unseen Dangers

http://www.welivesecurity.com/2012/04/23/qr-codes-and-nfc-chips-preview-and-authorize-should-be-default/

Page 19: Protecting Yourself Online (Information Assurance)

•Questions?