Information/Internet Safety. MBA Candidates at UNM Anderson School of Management This is our...

Preview:

Citation preview

Information/Internet Safety

Information/Internet Safety

MBA Candidates at UNM Anderson School of Management

This is our homework

Overview

• Personal Internet Security

• Social Engineering

• Email safeguards

• Passwords

• Mobile Devices

• Social Media

Personal Internet Security

http://www.youtube.com/watch?v=nPR131wMKEo

Personal Internet Security

• Keep anti-virus and anti-malware software up-to-date

• Use a spam filter

• Activate system’s firewall

• Update OS and Browser automatically

• Complex passwords and change frequently

Personal Internet Security

• Physical security

• Unfamiliar links

• Open wi-fi for personal business

• Use privacy and security settings on social networks

• BACK UP! BACK UP! BACK UP!

• WHAT IS THE WEAKEST LINK IN SECURITY?

Email Safeguards

• Spam Filter

• Unfamiliar links

Email Safeguards

Email Safeguards

Email Safeguards

Detecting Spam

•Strange E-mail Addresses

•Misspelt Words

•Don’t Click on Unknown Links

•If it Sounds to Good to be True, it Probably is.

Email Safeguards

y9dd926c24c9@yahoo.com

Passwords

Passwords

• Types of password attacks– Brute Force Attack– Dictionary Attacks

• How to protect against these attacks– Change passwords regularly – Choose a good password

• Which one is better?– password– Pa$3O!d– Pa$3O!dS!

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: password

Password StrengthStandard alphabet set without numbers and no special characters

How long will it take to randomly guess the password? (A.K.A Brut Force Attack)

Example: password

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brut Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password StrengthStandard alphabet set with numbers, special characters, and case sensitive

How long will it take to randomly guess the password? (A.K.A Brute Force Attack)

Example: Pa$s3O!d (password)

Password Strength

• Minimum of 8 characters

• Better not to have any logical sequence– I.E. Pet Names, favorite place, mother’s

maiden name, names, etc.

• If you do use a logical sequence substitute letters with special characters and case sensitive letters– I.E. albuquerque = A1bU9er6u3

• Not sure if it is good?

Password Strength

How long until a brute force attack is successful?•letyouin

7.0 seconds

•letyouandmein2.6 years

•L37$oU!n18.9 hours

•L3t%0u@n6M3!N8,010,363.4 years

Mobile Device Security

Physical Security

•Use a Case

•Buy screen protectors to prevent scratches

•Don’t leave it in extreme temperatures

•Personalize your device

Mobile Device Security

Mobile Device Security

Securing Information

•Use a PIN

•Disable auto complete features & Password memory

•Be careful about what permission apps have

•Backup your data

Social Engineering

Social Engineering

• What is Social Engineering?– “…the art of manipulating people into

performing actions or divulging confidential information.” (Wikipedia)

• Examples? – White Collar– Burn Notice

Social Engineering

Who was the victim?

How could this have been prevented?

http://www.youtube.com/watch?v=cQtQg--PB0k

Social Engineering

• How to protect yourself– Pay attention to what questions you are being

asked– Stop and think about what someone is asking

you to do or divulge– Always follows rules, policy and guidelines– NEED TO KNOW (NTK)

What is Social Engineering?

Social Networking

Social Networking

• Who has a Facebook account?– 1.01 Billion people (1,010,000,000)

• What is the World’s population?– 7.05 Billion people

Social Networking

• Who looks at you posts, statues, and likes?– 1,099,999,999 other Facebook users

• Should we be careful on what we post online?– YES!

Social Networking

• How to protect yourself– Check you security settings

Social Networking

Social Networking

Social Networking

Social Networking

Review

• Personal Internet Security

• Social Engineering

• Email safeguards

• Passwords

• Mobile Devices

• Social Media

Recommended