Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Welcome to Security Awareness MonthHosted by the Office of Information Technology
October 2017
1
WEL
CO
ME
Prevent, Plan, and Prepare
We live in a world that is more connected than ever before. The Internet touches almost all
aspects of everyone’s daily life.
National Cyber Security Awareness Month (NCSAM) is designed to raise awareness in all of us, about cyber security and increase the resiliency of the Nation in the event of a cyber incident.
Cyber security is critically important to us as a University with massive amounts of sensitive information to protect.
And…cyber security is important anyone who uses a device that connects them to the internet. That might be your phone or your computer…but it also includes your bank, your medical provider, and the grocery store.
2
What is National Cyber Security Awareness Month?
Cyber Security Touches Everyone
• Do you have a device…any device?
• A smartphone or even a dumb phone?
• A tablet, laptop, desktop?
• Do you use a credit card?
• Do you use an ATM?
• Do you go to the doctor?
• Do you use Wi-Fi?
3
Why is Cyber Security Important to You?
Cybersecurity Touches Everyone
Access to your machine:• for your information• to reach other machines on your network• within your email domain• For malicious mischief
Access to your information:• to gain access to accounts• to manipulate your machine• to steal and reuse your information and identity• to hold your information for ransom
Personal information includes:• SS number• Driver’s license info• Birth date• User names and passwords• Account numbers
4
What are cyber criminalsafter?
Bill BrunsDeputy Director, Student Center
Past Chair, SIU Computing Advisory Committee
5
Pro
tect
Yo
urs
elf
On
line
Protect Yourself
What is “Yourself?”
Protect Your Rights
Protect Your Reputation
Protect Your Legacy
6
Today’s Agenda
Protect Your Rights
7
Digital Rights – United Nations• Online Privacy and Freedom of Expression are extensions
of equal and inalienable rights in the Universal Declaration of Human Rights.
• Governments that disconnect people from the Internet is a violation of international law.
Right to Privacy • Does it exist? Only if you are very diligent.• Don’t inadvertently reveal personal information• Get a throwaway email address.• Online-only friends are not your real friends and may not
even be people• Keep home at home and work at work.
“Ma’am, Put Your Finger Right There”• Fifth Amendment protects what’s in your mind, but not
your DNA or fingerprint (Virginia Circuit Court, 2014)• Mobile Phone Biometrics – iPhone requires PIN after 48
hours of inactivity or after it is turned off.
Bill BrunsDeputy DirectorStudent Center
Protect Yourself
Protect Your Reputation
8
• Perception is truth• Everything can be taken out of context• Once it gets digitized and uploaded, it is
forever• Do not write things in email that you don’t
want published in the newspaper• Positivity begets positivity• Address criticism politely, but don’t feed the
trolls• Do not put things on Facebook that you don’t
want your children and grandchildren to see• Sarcasm does not translate into the written
word• “Oh yes, you’ve been so helpful.”
Bill BrunsDeputy DirectorStudent Center
Protect Yourself
Protect Your Reputation
9
• Mark Zuckerberg tapes his camera and microphone• Privacy, Risk Management or Paranoia?
• Risk Management• Assess your risk• Determine if risk is acceptable or not• Minimize risk
• Update your software• Run and update your antivirus software• Consider a search engine, browser and email
client (for home) that is privacy friendly, like DuckDuckGo, Brave and Thunderbird
• Use an encrypted password manager
Bill BrunsDeputy DirectorStudent Center
Protect Yourself
Protect Your Legacy
10
Google and Facebook• What happens to your account when you die?• Google allows a “Inactive Account Manager”• Facebook allows you to designate a “Legacy Contact”
Music and Digital Books• Your iTunes account, Kindle account and other similar
accounts are not yours. You are paying for a license. Purchases are not transferrable to other people.
• If you want to make sure that you can give your purchased music and books to your heir, back them up to non-DRM files on a local hard drive.
Photos• Keep a local copy in case you also keep things on the cloud. • Do not overwrite the original copy if you make edits
Bill BrunsDeputy DirectorStudent Center
Protect Yourself
To Contact Our Experts
Office of Information Technology, Security websitehttp://oit.siu.edu/infosecurity/
SalukiTech618-453-5155 [email protected]
SalukiTech Service Center, Morris Library—First Floor
Prabha MandaOffice of Information Technology, [email protected]
Mike Reiman, DirectorOffice of Records [email protected]
SIU Carbondale Security Experts and Information
Bill BrunsDeputy Director, Student CenterChair, SIU Computing Advisory Committee
12
Pro
tect
Yo
urs
elf
On
line