information security network and mobile security n.
Skip this Video
Loading SlideShow in 5 Seconds..
Information Security -Network and Mobile Security PowerPoint Presentation
Download Presentation
Information Security -Network and Mobile Security

Information Security -Network and Mobile Security

8 Vues Download Presentation
Télécharger la présentation

Information Security -Network and Mobile Security

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. InformationSecurity-NetworkandMobileSecurity MS in Information Systems and Assurance

  2. Information Assurance

  3. Survey Highlights • 61% of you prefer using mobile device to surf the Internet. • 46% of you spend 2 hours or less daily on mobile device. • 42% of you indicate they have lost their mobile devices before. • 39% of you never change passwords and 6% change 3 times a year. • 64% of you have used unsecured network. • 27% of you will keep using even if the app would collect personal information

  4. A Brief History of the World

  5. Historical hackers • Profile: • Male • Between 14 and 34 years of age • Computer addicted • No permanent girlfriend No Commercial Interest !!!

  6. World’s Greatest Teenage Hackers • James Kosta: The 13-Year-Old Who Hacked Everything • Matthew Weigman: The 14-Year-Old Who Hacked SWAT • Jonathan James: The 15-Year-Old Who Hacked NASA • Richard Pryce: The 16-Year-Old Who Hacked the Pentagon

  7. SSL (Secure Socket Layer)

  8. Tips for Safe Browsing Do use a secure network Do not enter usernames and password on sites that do not use HTTPS. Close your browser after leaving secure sites.

  9. Wi-Fi Networks

  10. Technology Demo: WireShark Captures packets in real time and display them in human-readable format Includes filters, color-coding and other features that let you dig deep into network traffic and inspect individual packets.

  11. Smartphone Risks • Increase mobility → Increased exposure • Easily lost or stolen • device, content, identity • Susceptible to threats and attacks • App-based, Web-based, SMS/Text message-based

  12. What if you were Donald Trumps’ secretary…? On March 17, 2017, a laptop containing Trump Tower floor plans and information on the Clinton investigation was stolen from the car of a Secret Service agent. What would you do? Get everything back in 24 hours, If not, you’re fired !!!

  13. Quick Response Codes OR Code – Wait Before You Scan! • Speaking of mobile devices and the web, a relatively new development is the “Quick Response” or “QR” code, the little square dot-like bar codes that are meant to be photographed by mobile devices as a convenient way of taking your mobile device to a particular location online (or giving folks a phone number, text, etc.) • Quick, what do those barcodes say, eh?

  14. Mobile APPS- Security Risk Concerns • McDonald's App Leaks Details of 2.2 Million Customers: A vulnerable application used by millions of McDonald’s customers in India was recently found to leak personal information on its users. • Google removed 132 Android apps from its store after researchers found that their HTML code contained hidden, malicious iframes.

  15. Social Problems • There aren’t always solutions to all of these problems • Humans will continue to be tricked into giving out information they shouldn’t • So, the best that can be done is to implement a wide variety of solutions and more closely monitor who has access to what network resources and information.

  16. Best Security Practices • Password protect Passcode protect Pass swipe protect?

  17. Best Security Practices cont. • Install Security Software • Anti-virus and anti-malware available for mobile devices • Keep your apps up-to-date • Install a phone finder app • Enroll in a backup program • Set device to wipe contents after specified number of failed login attempts

  18. Best Security Practices cont. • When installing apps • Take time to read the small print • What information does the app require access to? • Where are you downloading the app from? • Is it the app store location set by default on the phone?

  19. Best Security Practices cont. • Know where your device is at all times • Be mindful of how you use your device • Follow same guidelines as you do for your computer • Double check URLs for accuracy • Don’t open suspicious links • Make sure the Website is secure before giving any personal data

  20. Lost or Stolen? • Treat as if your purse or wallet • File a report with law enforcement • Contact your service vendor to cancel your service and report your device missing • If you have a backup/wipe program, contact your vendor to have them wipe the device

  21. Key Points • Password/Passcode protect your device • Lock your device • Use anti-virus software • Sync/back up your data • Install a phone finder app