Transcript ia.unm.edu
Information Security Presentation April 2nd, 2014 7:30am-9:00am Air Force Aerospace Science Class Major F. Larry Zentner, Jr. The Hub of Innovation • UNM is CAE/IAE and CAE/R • CAE/IAE - National Centers of Academic Excellence in Information Assurance Education • CAE/R - National Centers of Academic Excellence in Information Assurance Research Why is this relevant to you? Demographics of Internet Users • U.S. Census Bureau reports that in 2012 74.8% of all households in US carry some form of internet connection – The thing that everyone wants all the time Internet - 94.8% of all US households with a computer use it to connect to the Internet US. Census Bureau Infographic http://www.census.gov/hhes/computer/files/2012/Computer_Use_Infographic_FINAL.pdf The good, the bad and the ugly • The necessity of being connected via computers, tablets, smartphones, PDAs (Personal Digital Assistants- used as learning tools in classrooms, medical diagnosis/drug selection, GPS for cars, underwater divers who plan for breathing gas mixtures and decompression schedules and many more uses) ………… The good, the bad and the ugly • calls for increasing self-awareness when – roaming carefree in the Internet fields (browsing) – telling your friends where you will meet (text messaging via applications such as CacaoTalk, Skype, Facebook messages, WhatsApp) – shooting an email (via Comcast.net, AOL, Gmail) The bad and the ugly – announcing where you are and what you are doing (Google+, Waze Social GPS Maps & Traffic, Life360 – Family Locator) • What does it all mean for me? The more information you exchange on networks (intrawebs or WiFi), the more vulnerable your information becomes The inevitable truth is that risks with your internet use will only increase in the future. Hacked Companies • An undisclosed number of Yahoo’s e-mail accounts were hacked in January, 2014 • Username and passwords were compromised • Hackers were hunting for additional e-mail addresses to send spam and scam e-mails – phishing • Hacking banking and shopping sites is easier – email users use repeated passwords that are recovered/changed by e-mail The good and the bad • The Internet does not discriminate against intent – Hobbyist and professional hackers, even acquaintances who wish to do harm unto others – Law-abiding and with high personal and work ethic citizens – Employees in a company who inadvertently or intentionally send out company information to outsiders Fumbles on Twitter • Chelsea Handler on Oscar-winning movie: "Congratulations #12yearsaslave Go to Africa or buy #ugandabekiddingme http://amzn.to/1de1ka9 #aheadofthecurve #Oscars.“ And "#AngelinaJolie just filed adoption papers #lupitanyongo #Oscars @chelseahandler.” Always be self-aware when online and offline! Origin of risks • Where do risks come from? – Your Wifi and Bluetooth-enabled devices (smartphones, Xbox, printers, laptops) – Your online accounts (Gmail, Amazon) – You In the end, Computer and Internet Security is all about you. Review [1] • Computer security (ex: firewall hardware) VS • Internet security (ex: Antivirus, Internet Security Software Suites, spyware+adware protection, firewall software) Cybersecurity • Evolution from computer security in World War II through Internet security of 1960s and cybersecurity of 1990s and beyond Firewall • How to turn on the Firewall on your home computer (XP/Windows Vista/7/8) http://www.microsoft.com/enus/showcase/details.aspx?uuid=606771cc -ac77-4deb-af3b-185690bd57ff Security News • A major cheating scandal erupted in a high school in Gallup - January, 2014 • A student looked over the shoulder of a teacher and got password to the grade book • A new academic fraud policy will be implemented in 2015 • What more should the high school administration do? Security • First step to your computer security: – [Activity] Passwords 3 min – http://www.google.com/goodtoknow/onlinesafety/passwords/ – Create a password that makes a sense to you and only you and is hard to guess – [Activity] Conclusion Browser Security • Chrome Collusion - helps you visualize with graphs and block invisible websites that track you • Why are your steps tracked while you are browsing? Cookies – not as sweet as you may think http://www.youtube.com/watch?v=zP79Iwm 0xbA Pablos Holman, World Class Hacker and Inventor, TEDxYouth@Midwest, 6:00/17:50 http://www.youtube.com/watch?v=hqKafI7A md8 “All your devices can be hacked” by Avi Rubin, TEDxMidAtlantic, 16:56 http://www.youtube.com/watch?v=metkEeZv HTg All about YOU • Questions? • Contact information: • Alex Seazzu, [email protected]