1 / 41

Protecting Yourself from Virtual Threats

Protecting Yourself from Virtual Threats . Who We Are. 2008 LLHS Graduates BBA with a focus in Operations/Marketing MBA in Marketing and MIS BBA with a focus in Accounting MAACT with a focus in Information Assuranc e. Internet Safety . Student Internet Usage. Internet Safety .

wray
Télécharger la présentation

Protecting Yourself from Virtual Threats

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Yourself from Virtual Threats

  2. Who We Are • 2008 LLHS Graduates • BBA with a focus in Operations/Marketing • MBA in Marketing and MIS • BBA with a focus in Accounting • MAACT with a focus in Information Assurance

  3. Internet Safety

  4. Student Internet Usage

  5. Internet Safety

  6. Protect Yourself from Online Predators • 1 in 5 teenagers ages 10 to 17 have received unwanted sexual solicitation online • Predators utilize the Internet to target teenagers • By posting personal information about yourself, you are providing them with what they need to start a conversation.

  7. Protecting Your Identity from Predators • It is important to protect your personal identity by not posting or listing any information that an individual can use to locate you or gather too much information on you. • This includes: • Posting Pictures (partying pictures, provocative pictures, etc.) • Listing personal information (phone number, address, interests, etc.) • Listing information about your whereabouts (checking in on Facebook, allowing location services on your smart phone, etc.)

  8. Protecting Yourself from Identity Theft • Since 2004, individuals ages 14 to 29 have the rate of identity theft. • This is due to the credit reports of teens and young adults being clean and therefore the fraud takes longer to identify. • How to Protect Yourself: • Use anti-virus software • Use strong passwords • Be cautious when using cloud computing • Be aware of the security of your WIFI • Do not share too much information online

  9. Your Online Reputation • Have you ever Googled yourself? • Look at the information that comes up and determine if you would want other individuals to see it. • Everything that you put online is traceable by universities and potential employers. • This can have an impact on your future and reputation.

  10. How to Avoid Damaging Your Reputation • With employers, universities, and scholarships checking your online print, it is important to make sure it is clean. • You can do this by: • Not posting provocative pictures • Not posting pictures of you taking part in illegal activity (drugs, underage drinking, etc.) • Thinking twice about the comments and statuses that you post about others • Always consider the consequences of what you post!

  11. Not Everything Online is True • It may be difficult to distinguish who is a predator online. • In chat rooms or social networking sites, a predator may appear to be a 16 year old female but is actually a 50 year old male. • Predators use fake information, pictures, and interests to gain your trust and then make contact with you.

  12. Notecard Activity Notecard Activity

  13. Facebook Experiment Notecard Activity

  14. Facebook Experiment

  15. Outcome of FB Experiment Results of Friend Requests How we created the account Created the Profile on October 29th Added a fake picture and cover photo Included education info, contact info, etc. ‘Liked’ things that fit the targeted age group Sent friend requests to 40 LLHS students/alum Out of the 40 requests we sent only ONE student asked if we knew each other

  16. Cyber Bullying

  17. Harm on the Internet • Cyber Bullying • “When a child or teenager is harassed, humiliated, embarrassed, threatened or tormented using digital technology.” • Cyber bulling can only happen between minors. • Cyber Harassment • “When an adult harasses children, teenagers, or other adults.”

  18. Statistics on Cyber-Bullying • Around half of teens have been the victims of cyber bullying • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. • Girls are somewhat more likely than boys to be involved in cyber bullying

  19. Cyber Bullying • Sexting: “sending nude pictures via text message.” • 20% of teenagers admit to engaging in sexting • Messages can be forwarded to unintended recipients • Could be embarrassing if pictures were seen by unintended parties

  20. Jessica Logan

  21. Survey Results Have you, or someone you’ve known, been the victim of cyber-bullying?

  22. How To Protect Yourself • Don’t share personal information or photos • Even if it seems like a good idea at the time! • Make a copy of the message, photo or video • Screen shots • File a report with local police department • Don’t give the bully any reaction

  23. Password Safety

  24. Survey Results

  25. Passwords • “First line of defense against cyber-criminals” • Phishing • “Phishing is a technique of fraudulently obtaining private information.” • Sending E-mails • Making Phone calls • Creating links to false websites

  26. Passwords

  27. Passwords

  28. How to Detect a Phishing Site • Fake websites whose look and feel are almost identical to the legitimate site • Generic greetings • Threats to your account and requests for immediate action • Requests for personal information • Suspicious links • Misspellings and poor grammar

  29. Passwords • Social Engineering Attack • “The art of manipulating people into performing actions to gain confidential information.”

  30. Passwords • Social Engineering • Hackers may probe for information that can lead to your security being compromised • Be careful what information you give out to whom • Mother’s maiden name? • Where you were born? • What was your favorite pet’s name? • Retrieving information from social networking profiles

  31. Survey Results Do friends and family know your passwords?

  32. Passwords • Best Practices • Use unique passwords for each account • Use an app to store passwords • Use long passwords • Use numbers, letters (upper /lower case) and symbols • Updated password recovery settings • Brute Force Attack • Program that guesses passwords by trial-and-error • Weak Password: hours • Strong Password: several years

  33. Brute Force Attack • Most commonly used password: “password” • How long would it take to crack this password that only uses lower case letters? • Approximately 5.5 hours http://www.lockdown.co.uk/?pg=combi • A better alternative: “P@ssw0rd” • How long would it take to crack this password that uses lower and upper case letters, numbers, and special symbols? • Approximately 23 years http://www.lockdown.co.uk/?pg=combi

  34. Worst Passwords of 2012

  35. IT Careers

  36. Students Interested in IT Career

  37. Top 10 Best Jobs of 2012

  38. IT Careers

  39. IT Degrees • BSCS/ MSCS: • Computer Science • Required Math: Calculus l & ll, Linear Algebra, and Statistics • 51 hours in computer logic, programming, and other computer topics • BBA/ MBA: • Management Information Systems • Required Math: Calculus l, Statistics • 15 hours of MIS courses

  40. Employers • Local: • Corporate: http://www.cis.cornell.edu/ics/images/instt-snl.jpg; http://siliconangle.com/files/2011/05/intel-logo.jpg; http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/US-FBI-ShadedSeal.svg/136px-US-FBI-ShadedSeal.svg.png; http://images.fanpop.com/images/image_uploads/Apple-Logo-apple-41156_1024_768.jpg; http://a.abcnews.com/images/Technology/ht_microsoft_cc_120823_wg.jpg; http://face.com/blog/wp-content/uploads/2012/06/503165914_f8a5d293bc_o1.jpg; http://s1.cdn.memeburn.com/wp-content/uploads/google_logo.jpg

  41. Questions?

More Related