Transcript Who We Are

Protecting Yourself from
Virtual Threats
Who We Are
• 2008 LLHS Graduates
– BBA with a focus in Operations/Marketing
– MBA in Marketing and MIS
– BBA with a focus in Accounting
– MAACT with a focus in Information Assurance
Internet Safety
Student Internet Usage
Internet Activities
Games
19%
Email/IM
16%
20%
26%
Blogs
18%
1%
Shopping
Social
Networking
Other
Internet Safety
Protect Yourself from Online Predators
• 1 in 5 teenagers ages 10
to 17 have received
unwanted sexual
solicitation online
• Predators utilize the
Internet to target
teenagers
• By posting personal
information about
yourself, you are providing
them with what they need
to start a conversation.
Protecting Your Identity from Predators
• It is important to protect your personal identity by not posting or listing
any information that an individual can use to locate you or gather too
much information on you.
• This includes:
– Posting Pictures (partying pictures, provocative pictures, etc.)
– Listing personal information (phone number, address, interests, etc.)
– Listing information about your whereabouts (checking in on
Facebook, allowing location services on your smart phone, etc.)
Protecting Yourself from Identity Theft
• Since 2004, individuals • How to Protect
ages 14 to 29 have the
Yourself:
rate of identity theft.
– Use anti-virus software
– Use strong passwords
• This is due to the
– Be cautious when
credit reports of teens
using cloud computing
and young adults
– Be aware of the
being clean and
security of your WIFI
therefore the fraud
– Do not share too much
takes longer to identify.
information online
Your Online Reputation
• Have you ever Googled yourself?
– Look at the information that comes up and
determine if you would want other individuals
to see it.
• Everything that you put online is traceable
by universities and potential employers.
– This can have an impact on your future and
reputation.
How to Avoid Damaging Your Reputation
• With employers, universities, and scholarships
checking your online print, it is important to make sure
it is clean.
• You can do this by:
– Not posting provocative pictures
– Not posting pictures of you taking part in illegal
activity (drugs, underage drinking, etc.)
– Thinking twice about the comments and statuses
that you post about others
– Always consider the consequences of what you
post!
Not Everything Online is True
• It may be difficult to
distinguish who is a predator
online.
• In chat rooms or social
networking sites, a predator
may appear to be a 16 year
old female but is actually a 50
year old male.
• Predators use fake
information, pictures, and
interests to gain your trust and
then make contact with you.
Notecard Activity
NOTECARD ACTIVITY
Facebook Experiment
NOTECARD ACTIVITY
Facebook Experiment
Outcome of FB Experiment
Results of Friend Requests
Out of the 40 requests we sent only ONE
student asked if we knew each other
How we created the account
• Created the Profile on
October 29th
• Added a fake picture and
cover photo
• Included education info,
contact info, etc.
• ‘Liked’ things that fit the
targeted age group
• Sent friend requests to 40
LLHS students/alum
Cyber Bullying
Harm on the Internet
• Cyber Bullying
– “When a child or teenager is harassed,
humiliated, embarrassed, threatened or
tormented using digital technology.”
– Cyber bulling can only happen between
minors.
• Cyber Harassment
– “When an adult harasses children, teenagers,
or other adults.”
Statistics on Cyber-Bullying
• Around half of teens have been the victims of cyber
bullying
• Fewer than 1 in 5 cyber bullying incidents are reported
to law enforcement
• Over 25 percent of adolescents and teens have been
bullied repeatedly through their cell phones or the
Internet.
• Girls are somewhat more likely than boys to be
involved in cyber bullying
Cyber Bullying
• Sexting: “sending nude pictures via text
message.”
– 20% of teenagers admit to engaging in sexting
• Messages can be forwarded to unintended
recipients
• Could be embarrassing if pictures were seen by
unintended parties
Jessica Logan
Survey Results
Have you, or someone you’ve known,
been the victim of cyber-bullying?
0%
0%
Yes
35%
No
65%
How To Protect Yourself
• Don’t share personal information or photos
– Even if it seems like a good idea at the time!
• Make a copy of the message, photo or
video
– Screen shots
• File a report with local police department
• Don’t give the bully any reaction
Password Safety
Survey Results
Different Passwords for Different Accounts?
0%
0%
Yes
48%
No
52%
Passwords
• “First line of defense against cybercriminals”
• Phishing
– “Phishing is a technique of fraudulently
obtaining private information.”
• Sending E-mails
• Making Phone calls
• Creating links to false websites
Passwords
Passwords
How to Detect a Phishing Site
• Fake websites whose look and feel are
almost identical to the legitimate site
– Generic greetings
– Threats to your account and requests for
immediate action
– Requests for personal information
– Suspicious links
– Misspellings and poor grammar
Passwords
• Social Engineering Attack
– “The art of manipulating people into performing
actions to gain confidential information.”
Passwords
• Social Engineering
– Hackers may probe for information that can
lead to your security being compromised
• Be careful what information you give out to whom
– Mother’s maiden name?
– Where you were born?
– What was your favorite pet’s name?
– Retrieving information from social networking
profiles
Survey Results
Do friends and family know your passwords?
Not Sure
3%
No
29%
Yes
68%
Passwords
• Best Practices
– Use unique passwords for each account
• Use an app to store passwords
– Use long passwords
– Use numbers, letters (upper /lower case) and
symbols
– Updated password recovery settings
• Brute Force Attack
– Program that guesses passwords by trial-and-error
– Weak Password: hours
– Strong Password: several years
Brute Force Attack
• Most commonly used password: “password”
– How long would it take to crack this password
that only uses lower case letters?
• Approximately 5.5 hours http://www.lockdown.co.uk/?pg=combi
• A better alternative: “P@ssw0rd”
– How long would it take to crack this password
that uses lower and upper case letters,
numbers, and special symbols?
• Approximately 23 years http://www.lockdown.co.uk/?pg=combi
Worst Passwords of 2012
IT Careers
Students Interested in IT Career
Top 10 Best Jobs of 2012
1) Nurse
2) Software Developer
3) Pharmacist
4) Medical Assistant
5) Database Administrator
6) Web Developer
7) Computer Systems Analyst
8) Physical Therapist
9) Computer Programmer
10) Occupational Therapist
IT Careers
Software
Developer
Database
Administrator
Web Developer
Computer
Systems Analyst
Computer
Programmer
• Salary: $54,360-$87,790
• Write code and develop software applications
• Salary: $41,570-$115,660
• Build, organize, and maintain the data of a company
• Salary: $43,190-$119,940
• Design, create, and maintain websites
• Salary: $48,360-$119,070
• Determine technological needs of clients and make
recommendations on system needs
• Salary: $40,820-$114,180
• Write code to create computer programs
IT Degrees
• BSCS/ MSCS:
– Computer Science
• Required Math: Calculus l & ll, Linear Algebra, and
Statistics
• 51 hours in computer logic, programming, and other
computer topics
• BBA/ MBA:
– Management Information Systems
• Required Math: Calculus l, Statistics
• 15 hours of MIS courses
Employers
• Local:
• Corporate:
http://www.cis.cornell.edu/ics/images/instt-snl.jpg; http://siliconangle.com/files/2011/05/intel-logo.jpg; http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/US-FBI-ShadedSeal.svg/136px-US-FBI-ShadedSeal.svg.png;
http://images.fanpop.com/images/image_uploads/Apple-Logo-apple-41156_1024_768.jpg; http://a.abcnews.com/images/Technology/ht_microsoft_cc_120823_wg.jpg; http://face.com/blog/wpcontent/uploads/2012/06/503165914_f8a5d293bc_o1.jpg; http://s1.cdn.memeburn.com/wp-content/uploads/google_logo.jpg
Questions?