Transcript ia.unm.edu

Information Security
Presentation
April 2nd, 2014
7:30am-9:00am
Air Force Aerospace Science Class
Major F. Larry Zentner, Jr.
The Hub of Innovation
• UNM is CAE/IAE and CAE/R
• CAE/IAE - National Centers of Academic
Excellence in Information Assurance
Education
• CAE/R - National Centers of Academic
Excellence in Information Assurance
Research
Why is this relevant to you?
Demographics of Internet Users
• U.S. Census Bureau reports that in 2012
74.8% of all households in US carry
some form of internet connection
– The thing that everyone wants all the time
Internet - 94.8% of all US households with a
computer use it to connect to the Internet
US. Census Bureau Infographic
http://www.census.gov/hhes/computer/files/2012/Computer_Use_Infographic_FINAL.pdf
The good, the bad and the ugly
• The necessity of being connected via
computers, tablets, smartphones, PDAs
(Personal Digital Assistants- used as
learning tools in classrooms, medical
diagnosis/drug selection, GPS for cars,
underwater divers who plan for breathing
gas mixtures and decompression
schedules and many more uses)
…………
The good, the bad and the ugly
• calls for increasing self-awareness when
– roaming carefree in the Internet fields
(browsing)
– telling your friends where you will meet (text
messaging via applications such as
CacaoTalk, Skype, Facebook messages,
WhatsApp)
– shooting an email (via Comcast.net, AOL,
Gmail)
The bad and the ugly
– announcing where you are and what you
are doing (Google+, Waze Social GPS
Maps & Traffic, Life360 – Family Locator)
• What does it all mean for me?
The more information you exchange on
networks (intrawebs or WiFi), the more
vulnerable your information becomes
The inevitable truth is that risks with your
internet use will only increase in the future.
Hacked Companies
• An undisclosed number of Yahoo’s e-mail
accounts were hacked in January, 2014
• Username and passwords were
compromised
• Hackers were hunting for additional e-mail
addresses to send spam and scam e-mails –
phishing
• Hacking banking and shopping sites is easier
– email users use repeated passwords that
are recovered/changed by e-mail
The good and the bad
• The Internet does not discriminate against
intent
– Hobbyist and professional hackers, even
acquaintances who wish to do harm unto others
– Law-abiding and with high personal and work
ethic citizens
– Employees in a company who inadvertently or
intentionally send out company information to
outsiders
Fumbles on Twitter
• Chelsea Handler on Oscar-winning movie:
"Congratulations #12yearsaslave Go to
Africa or buy #ugandabekiddingme
http://amzn.to/1de1ka9 #aheadofthecurve
#Oscars.“
And "#AngelinaJolie just filed adoption
papers #lupitanyongo #Oscars @chelseahandler.”
Always be self-aware when online and
offline!
Origin of risks
• Where do risks come from?
– Your Wifi and Bluetooth-enabled devices
(smartphones, Xbox, printers, laptops)
– Your online accounts (Gmail, Amazon)
– You
In the end, Computer and Internet
Security is all about you.
Review [1]
• Computer security (ex: firewall hardware)
VS
• Internet security (ex: Antivirus, Internet
Security Software Suites,
spyware+adware protection, firewall
software)
Cybersecurity
• Evolution from computer
security in World War II
through Internet security of
1960s and cybersecurity of
1990s and beyond
Firewall
• How to turn on the Firewall on your home
computer (XP/Windows Vista/7/8)
http://www.microsoft.com/enus/showcase/details.aspx?uuid=606771cc
-ac77-4deb-af3b-185690bd57ff
Security News
• A major cheating scandal erupted in a high
school in Gallup - January, 2014
• A student looked over the shoulder of a
teacher and got password to the grade
book
• A new academic fraud policy will be
implemented in 2015
• What more should the high school
administration do?
Security
• First step to your computer security:
– [Activity] Passwords 3 min
– http://www.google.com/goodtoknow/onlinesafety/passwords/
– Create a password that makes a sense to you
and only you and is hard to guess
– [Activity] Conclusion
Browser Security
• Chrome Collusion - helps you visualize
with graphs and block invisible websites
that track you
• Why are your steps tracked while you are
browsing?
Cookies – not as sweet as you may think
http://www.youtube.com/watch?v=zP79Iwm
0xbA
Pablos Holman, World Class Hacker and
Inventor, TEDxYouth@Midwest, 6:00/17:50
http://www.youtube.com/watch?v=hqKafI7A
md8
“All your devices can be hacked” by Avi
Rubin, TEDxMidAtlantic, 16:56
http://www.youtube.com/watch?v=metkEeZv
HTg
All about YOU
• Questions?
• Contact information:
• Alex Seazzu, [email protected]