1 / 21

Information Security -Network and Mobile Security

Information Security -Network and Mobile Security. MS in Information Systems and Assurance. Information Assurance. Survey Highlights. 61% of you prefer using mobile device to surf the Internet. 46% of you spend 2 hours or less daily on mobile device.

ccabral
Télécharger la présentation

Information Security -Network and Mobile Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. InformationSecurity-NetworkandMobileSecurity MS in Information Systems and Assurance

  2. Information Assurance

  3. Survey Highlights • 61% of you prefer using mobile device to surf the Internet. • 46% of you spend 2 hours or less daily on mobile device. • 42% of you indicate they have lost their mobile devices before. • 39% of you never change passwords and 6% change 3 times a year. • 64% of you have used unsecured network. • 27% of you will keep using even if the app would collect personal information

  4. A Brief History of the World

  5. Historical hackers • Profile: • Male • Between 14 and 34 years of age • Computer addicted • No permanent girlfriend No Commercial Interest !!!

  6. World’s Greatest Teenage Hackers • James Kosta: The 13-Year-Old Who Hacked Everything • Matthew Weigman: The 14-Year-Old Who Hacked SWAT • Jonathan James: The 15-Year-Old Who Hacked NASA • Richard Pryce: The 16-Year-Old Who Hacked the Pentagon

  7. SSL (Secure Socket Layer)

  8. Tips for Safe Browsing Do use a secure network Do not enter usernames and password on sites that do not use HTTPS. Close your browser after leaving secure sites.

  9. Wi-Fi Networks

  10. Technology Demo: WireShark Captures packets in real time and display them in human-readable format Includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.

  11. Smartphone Risks • Increase mobility → Increased exposure • Easily lost or stolen • device, content, identity • Susceptible to threats and attacks • App-based, Web-based, SMS/Text message-based

  12. What if you were Donald Trumps’ secretary…? On March 17, 2017, a laptop containing Trump Tower floor plans and information on the Clinton investigation was stolen from the car of a Secret Service agent. What would you do? Get everything back in 24 hours, If not, you’re fired !!!

  13. Quick Response Codes OR Code – Wait Before You Scan! • Speaking of mobile devices and the web, a relatively new development is the “Quick Response” or “QR” code, the little square dot-like bar codes that are meant to be photographed by mobile devices as a convenient way of taking your mobile device to a particular location online (or giving folks a phone number, text, etc.) • Quick, what do those barcodes say, eh?

  14. Mobile APPS- Security Risk Concerns • McDonald's App Leaks Details of 2.2 Million Customers: A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information on its users. • Google removed 132 Android apps from its store after researchers found that their HTML code contained hidden, malicious iframes.

  15. Social Problems • There aren’t always solutions to all of these problems • Humans will continue to be tricked into giving out information they shouldn’t • So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information.

  16. Best Security Practices • Password protect Passcode protect Pass swipe protect?

  17. Best Security Practices cont. • Install Security Software • Anti-virus and anti-malware available for mobile devices • Keep your apps up-to-date • Install a phone finder app • Enroll in a backup program • Set device to wipe contents after specified number of failed login attempts

  18. Best Security Practices cont. • When installing apps • Take time to read the small print • What information does the app require access to? • Where are you downloading the app from? • Is it the app store location set by default on the phone?

  19. Best Security Practices cont. • Know where your device is at all times • Be mindful of how you use your device • Follow same guidelines as you do for your computer • Double check URLs for accuracy • Don’t open suspicious links • Make sure the Website is secure before giving any personal data

  20. Lost or Stolen? • Treat as if your purse or wallet • File a report with law enforcement • Contact your service vendor to cancel your service and report your device missing • If you have a backup/wipe program, contact your vendor to have them wipe the device

  21. Key Points • Password/Passcode protect your device • Lock your device • Use anti-virus software • Sync/back up your data • Install a phone finder app

More Related