Upload
hilary-henderson
View
220
Download
1
Tags:
Embed Size (px)
Citation preview
Protecting Yourself from Virtual Threats
Who We Are
• 2008 LLHS Graduates
– BBA with a focus in Operations/Marketing– MBA in Marketing and MIS
– BBA with a focus in Accounting– MAACT with a focus in Information Assurance
Internet Safety
Student Internet Usage
16%
20%
18%
1%
26%
19%
Internet Activities
Games
Email/IM
Shopping
Blogs
Social NetworkingOther
Internet Safety
Protect Yourself from Online Predators
• 1 in 5 teenagers ages 10 to 17 have received unwanted sexual solicitation online
• Predators utilize the Internet to target teenagers
• By posting personal information about yourself, you are providing them with what they need to start a conversation.
Protecting Your Identity from Predators
• It is important to protect your personal identity by not posting or listing any information that an individual can use to locate you or gather too much information on you.
• This includes:– Posting Pictures (partying pictures, provocative pictures, etc.)– Listing personal information (phone number, address, interests, etc.)– Listing information about your whereabouts (checking in on
Facebook, allowing location services on your smart phone, etc.)
Protecting Yourself from Identity Theft
• Since 2004, individuals ages 14 to 29 have the rate of identity theft.
• This is due to the credit reports of teens and young adults being clean and therefore the fraud takes longer to identify.
• How to Protect Yourself:– Use anti-virus software– Use strong passwords– Be cautious when
using cloud computing– Be aware of the
security of your WIFI– Do not share too much
information online
Your Online Reputation
• Have you ever Googled yourself?– Look at the information that comes up and
determine if you would want other individuals to see it.
• Everything that you put online is traceable by universities and potential employers. – This can have an impact on your future and
reputation.
How to Avoid Damaging Your Reputation
• With employers, universities, and scholarships checking your online print, it is important to make sure it is clean.
• You can do this by:– Not posting provocative pictures– Not posting pictures of you taking part in illegal
activity (drugs, underage drinking, etc.)– Thinking twice about the comments and statuses
that you post about others– Always consider the consequences of what you
post!
Not Everything Online is True
• It may be difficult to distinguish who is a predator online.
• In chat rooms or social networking sites, a predator may appear to be a 16 year old female but is actually a 50 year old male.
• Predators use fake information, pictures, and interests to gain your trust and then make contact with you.
NOTECARD ACTIVITY
Notecard Activity
NOTECARD ACTIVITY
Facebook Experiment
Facebook Experiment
Outcome of FB Experiment
Results of Friend Requests How we created the account
• Created the Profile on October 29th
• Added a fake picture and cover photo
• Included education info, contact info, etc.
• ‘Liked’ things that fit the targeted age group
• Sent friend requests to 40 LLHS students/alum
Out of the 40 requests we sent only ONE student asked if we knew each other
Cyber Bullying
Harm on the Internet
• Cyber Bullying– “When a child or teenager is harassed,
humiliated, embarrassed, threatened or tormented using digital technology.”
– Cyber bulling can only happen between minors.
• Cyber Harassment – “When an adult harasses children, teenagers,
or other adults.”
Statistics on Cyber-Bullying
• Around half of teens have been the victims of cyber bullying
• Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement
• Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet.
• Girls are somewhat more likely than boys to be involved in cyber bullying
Cyber Bullying
• Sexting: “sending nude pictures via text message.”– 20% of teenagers admit to engaging in sexting
• Messages can be forwarded to unintended recipients
• Could be embarrassing if pictures were seen by unintended parties
Jessica Logan
Survey ResultsHave you, or someone you’ve known,
been the victim of cyber-bullying?
Yes35%
No65%
How To Protect Yourself
• Don’t share personal information or photos– Even if it seems like a good idea at the time!
• Make a copy of the message, photo or video– Screen shots
• File a report with local police department• Don’t give the bully any reaction
Password Safety
Survey Results
Yes48%
No52%
Different Passwords for Different Accounts?
Passwords
• “First line of defense against cyber-criminals”
• Phishing– “Phishing is a technique of fraudulently
obtaining private information.”• Sending E-mails• Making Phone calls• Creating links to false websites
Passwords
Passwords
How to Detect a Phishing Site
• Fake websites whose look and feel are almost identical to the legitimate site– Generic greetings– Threats to your account and requests for
immediate action– Requests for personal information– Suspicious links– Misspellings and poor grammar
Passwords
• Social Engineering Attack– “The art of manipulating people into performing
actions to gain confidential information.”
Passwords
• Social Engineering– Hackers may probe for information that can
lead to your security being compromised• Be careful what information you give out to whom
– Mother’s maiden name?– Where you were born?– What was your favorite pet’s name?
– Retrieving information from social networking profiles
Survey ResultsDo friends and family know your passwords?
Yes68%
No29%
Not Sure3%
Passwords
• Best Practices– Use unique passwords for each account
• Use an app to store passwords– Use long passwords– Use numbers, letters (upper /lower case) and
symbols– Updated password recovery settings
• Brute Force Attack– Program that guesses passwords by trial-and-error– Weak Password: hours – Strong Password: several years
Brute Force Attack
• Most commonly used password: “password”– How long would it take to crack this password
that only uses lower case letters?• Approximately 5.5 hours http://www.lockdown.co.uk/?pg=combi
• A better alternative: “P@ssw0rd”– How long would it take to crack this password
that uses lower and upper case letters, numbers, and special symbols?• Approximately 23 years http://www.lockdown.co.uk/?pg=combi
Worst Passwords of 2012
IT Careers
Students Interested in IT Career
Top 10 Best Jobs of 20121) Nurse
2) Software Developer
3) Pharmacist
4) Medical Assistant
5) Database Administrator
6) Web Developer
7) Computer Systems Analyst
8) Physical Therapist
9) Computer Programmer
10) Occupational Therapist
IT Careers
• Salary: $54,360-$87,790• Write code and develop software applications
Software Developer
• Salary: $41,570-$115,660• Build, organize, and maintain the data of a company
Database Administrator
• Salary: $43,190-$119,940• Design, create, and maintain websitesWeb Developer
• Salary: $48,360-$119,070• Determine technological needs of clients and make
recommendations on system needs
Computer Systems Analyst
• Salary: $40,820-$114,180• Write code to create computer programs
Computer Programmer
IT Degrees
• BSCS/ MSCS:– Computer Science
• Required Math: Calculus l & ll, Linear Algebra, and Statistics
• 51 hours in computer logic, programming, and other computer topics
• BBA/ MBA:– Management Information Systems
• Required Math: Calculus l, Statistics• 15 hours of MIS courses
Employers
• Local:
http://www.cis.cornell.edu/ics/images/instt-snl.jpg; http://siliconangle.com/files/2011/05/intel-logo.jpg; http://upload.wikimedia.org/wikipedia/commons/thumb/7/70/US-FBI-ShadedSeal.svg/136px-US-FBI-ShadedSeal.svg.png; http://images.fanpop.com/images/image_uploads/Apple-Logo-apple-41156_1024_768.jpg; http://a.abcnews.com/images/Technology/ht_microsoft_cc_120823_wg.jpg; http://face.com/blog/wp-content/uploads/2012/06/503165914_f8a5d293bc_o1.jpg; http://s1.cdn.memeburn.com/wp-content/uploads/google_logo.jpg
• Corporate:
Questions?