Transcript Who We Are
Protecting Yourself from Virtual Threats Who We Are • 2008 LLHS Graduates – BBA with a focus in Operations/Marketing – MBA in Marketing and MIS – BBA with a focus in Accounting – MAACT with a focus in Information Assurance Internet Safety Student Internet Usage Internet Activities Games 19% Email/IM 16% 20% 26% Blogs 18% 1% Shopping Social Networking Other Internet Safety Protect Yourself from Online Predators • 1 in 5 teenagers ages 10 to 17 have received unwanted sexual solicitation online • Predators utilize the Internet to target teenagers • By posting personal information about yourself, you are providing them with what they need to start a conversation. Protecting Your Identity from Predators • It is important to protect your personal identity by not posting or listing any information that an individual can use to locate you or gather too much information on you. • This includes: – Posting Pictures (partying pictures, provocative pictures, etc.) – Listing personal information (phone number, address, interests, etc.) – Listing information about your whereabouts (checking in on Facebook, allowing location services on your smart phone, etc.) Protecting Yourself from Identity Theft • Since 2004, individuals • How to Protect ages 14 to 29 have the Yourself: rate of identity theft. – Use anti-virus software – Use strong passwords • This is due to the – Be cautious when credit reports of teens using cloud computing and young adults – Be aware of the being clean and security of your WIFI therefore the fraud – Do not share too much takes longer to identify. information online Your Online Reputation • Have you ever Googled yourself? – Look at the information that comes up and determine if you would want other individuals to see it. • Everything that you put online is traceable by universities and potential employers. – This can have an impact on your future and reputation. How to Avoid Damaging Your Reputation • With employers, universities, and scholarships checking your online print, it is important to make sure it is clean. • You can do this by: – Not posting provocative pictures – Not posting pictures of you taking part in illegal activity (drugs, underage drinking, etc.) – Thinking twice about the comments and statuses that you post about others – Always consider the consequences of what you post! Not Everything Online is True • It may be difficult to distinguish who is a predator online. • In chat rooms or social networking sites, a predator may appear to be a 16 year old female but is actually a 50 year old male. • Predators use fake information, pictures, and interests to gain your trust and then make contact with you. Notecard Activity NOTECARD ACTIVITY Facebook Experiment NOTECARD ACTIVITY Facebook Experiment Outcome of FB Experiment Results of Friend Requests Out of the 40 requests we sent only ONE student asked if we knew each other How we created the account • Created the Profile on October 29th • Added a fake picture and cover photo • Included education info, contact info, etc. • ‘Liked’ things that fit the targeted age group • Sent friend requests to 40 LLHS students/alum Cyber Bullying Harm on the Internet • Cyber Bullying – “When a child or teenager is harassed, humiliated, embarrassed, threatened or tormented using digital technology.” – Cyber bulling can only happen between minors. • Cyber Harassment – “When an adult harasses children, teenagers, or other adults.” Statistics on Cyber-Bullying • Around half of teens have been the victims of cyber bullying • Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement • Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. • Girls are somewhat more likely than boys to be involved in cyber bullying Cyber Bullying • Sexting: “sending nude pictures via text message.” – 20% of teenagers admit to engaging in sexting • Messages can be forwarded to unintended recipients • Could be embarrassing if pictures were seen by unintended parties Jessica Logan Survey Results Have you, or someone you’ve known, been the victim of cyber-bullying? 0% 0% Yes 35% No 65% How To Protect Yourself • Don’t share personal information or photos – Even if it seems like a good idea at the time! • Make a copy of the message, photo or video – Screen shots • File a report with local police department • Don’t give the bully any reaction Password Safety Survey Results Different Passwords for Different Accounts? 0% 0% Yes 48% No 52% Passwords • “First line of defense against cybercriminals” • Phishing – “Phishing is a technique of fraudulently obtaining private information.” • Sending E-mails • Making Phone calls • Creating links to false websites Passwords Passwords How to Detect a Phishing Site • Fake websites whose look and feel are almost identical to the legitimate site – Generic greetings – Threats to your account and requests for immediate action – Requests for personal information – Suspicious links – Misspellings and poor grammar Passwords • Social Engineering Attack – “The art of manipulating people into performing actions to gain confidential information.” Passwords • Social Engineering – Hackers may probe for information that can lead to your security being compromised • Be careful what information you give out to whom – Mother’s maiden name? – Where you were born? – What was your favorite pet’s name? – Retrieving information from social networking profiles Survey Results Do friends and family know your passwords? Not Sure 3% No 29% Yes 68% Passwords • Best Practices – Use unique passwords for each account • Use an app to store passwords – Use long passwords – Use numbers, letters (upper /lower case) and symbols – Updated password recovery settings • Brute Force Attack – Program that guesses passwords by trial-and-error – Weak Password: hours – Strong Password: several years Brute Force Attack • Most commonly used password: “password” – How long would it take to crack this password that only uses lower case letters? • Approximately 5.5 hours http://www.lockdown.co.uk/?pg=combi • A better alternative: “P@ssw0rd” – How long would it take to crack this password that uses lower and upper case letters, numbers, and special symbols? • Approximately 23 years http://www.lockdown.co.uk/?pg=combi Worst Passwords of 2012 IT Careers Students Interested in IT Career Top 10 Best Jobs of 2012 1) Nurse 2) Software Developer 3) Pharmacist 4) Medical Assistant 5) Database Administrator 6) Web Developer 7) Computer Systems Analyst 8) Physical Therapist 9) Computer Programmer 10) Occupational Therapist IT Careers Software Developer Database Administrator Web Developer Computer Systems Analyst Computer Programmer • Salary: $54,360-$87,790 • Write code and develop software applications • Salary: $41,570-$115,660 • Build, organize, and maintain the data of a company • Salary: $43,190-$119,940 • Design, create, and maintain websites • Salary: $48,360-$119,070 • Determine technological needs of clients and make recommendations on system needs • Salary: $40,820-$114,180 • Write code to create computer programs IT Degrees • BSCS/ MSCS: – Computer Science • Required Math: Calculus l & ll, Linear Algebra, and Statistics • 51 hours in computer logic, programming, and other computer topics • BBA/ MBA: – Management Information Systems • Required Math: Calculus l, Statistics • 15 hours of MIS courses Employers • Local: • Corporate: http://www.cis.cornell.edu/ics/images/instt-snl.jpg; http://siliconangle.com/files/2011/05/intel-logo.jpg; http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/US-FBI-ShadedSeal.svg/136px-US-FBI-ShadedSeal.svg.png; http://images.fanpop.com/images/image_uploads/Apple-Logo-apple-41156_1024_768.jpg; http://a.abcnews.com/images/Technology/ht_microsoft_cc_120823_wg.jpg; http://face.com/blog/wpcontent/uploads/2012/06/503165914_f8a5d293bc_o1.jpg; http://s1.cdn.memeburn.com/wp-content/uploads/google_logo.jpg Questions?