12
Welcome to Security Awareness Month Hosted by the Office of Information Technology October 2017 1 WELCOME

Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Welcome to Security Awareness MonthHosted by the Office of Information Technology

October 2017

1

WEL

CO

ME

Page 2: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Prevent, Plan, and Prepare

We live in a world that is more connected than ever before. The Internet touches almost all

aspects of everyone’s daily life.

National Cyber Security Awareness Month (NCSAM) is designed to raise awareness in all of us, about cyber security and increase the resiliency of the Nation in the event of a cyber incident.

Cyber security is critically important to us as a University with massive amounts of sensitive information to protect.

And…cyber security is important anyone who uses a device that connects them to the internet. That might be your phone or your computer…but it also includes your bank, your medical provider, and the grocery store.

2

What is National Cyber Security Awareness Month?

Page 3: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Cyber Security Touches Everyone

• Do you have a device…any device?

• A smartphone or even a dumb phone?

• A tablet, laptop, desktop?

• Do you use a credit card?

• Do you use an ATM?

• Do you go to the doctor?

• Do you use Wi-Fi?

3

Why is Cyber Security Important to You?

Page 4: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Cybersecurity Touches Everyone

Access to your machine:• for your information• to reach other machines on your network• within your email domain• For malicious mischief

Access to your information:• to gain access to accounts• to manipulate your machine• to steal and reuse your information and identity• to hold your information for ransom

Personal information includes:• SS number• Driver’s license info• Birth date• User names and passwords• Account numbers

4

What are cyber criminalsafter?

Page 5: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Bill BrunsDeputy Director, Student Center

Past Chair, SIU Computing Advisory Committee

5

Pro

tect

Yo

urs

elf

On

line

Page 6: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Protect Yourself

What is “Yourself?”

Protect Your Rights

Protect Your Reputation

Protect Your Legacy

6

Today’s Agenda

Page 7: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Protect Your Rights

7

Digital Rights – United Nations• Online Privacy and Freedom of Expression are extensions

of equal and inalienable rights in the Universal Declaration of Human Rights.

• Governments that disconnect people from the Internet is a violation of international law.

Right to Privacy • Does it exist? Only if you are very diligent.• Don’t inadvertently reveal personal information• Get a throwaway email address.• Online-only friends are not your real friends and may not

even be people• Keep home at home and work at work.

“Ma’am, Put Your Finger Right There”• Fifth Amendment protects what’s in your mind, but not

your DNA or fingerprint (Virginia Circuit Court, 2014)• Mobile Phone Biometrics – iPhone requires PIN after 48

hours of inactivity or after it is turned off.

Bill BrunsDeputy DirectorStudent Center

Protect Yourself

Page 8: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Protect Your Reputation

8

• Perception is truth• Everything can be taken out of context• Once it gets digitized and uploaded, it is

forever• Do not write things in email that you don’t

want published in the newspaper• Positivity begets positivity• Address criticism politely, but don’t feed the

trolls• Do not put things on Facebook that you don’t

want your children and grandchildren to see• Sarcasm does not translate into the written

word• “Oh yes, you’ve been so helpful.”

Bill BrunsDeputy DirectorStudent Center

Protect Yourself

Page 9: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Protect Your Reputation

9

• Mark Zuckerberg tapes his camera and microphone• Privacy, Risk Management or Paranoia?

• Risk Management• Assess your risk• Determine if risk is acceptable or not• Minimize risk

• Update your software• Run and update your antivirus software• Consider a search engine, browser and email

client (for home) that is privacy friendly, like DuckDuckGo, Brave and Thunderbird

• Use an encrypted password manager

Bill BrunsDeputy DirectorStudent Center

Protect Yourself

Page 10: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Protect Your Legacy

10

Google and Facebook• What happens to your account when you die?• Google allows a “Inactive Account Manager”• Facebook allows you to designate a “Legacy Contact”

Music and Digital Books• Your iTunes account, Kindle account and other similar

accounts are not yours. You are paying for a license. Purchases are not transferrable to other people.

• If you want to make sure that you can give your purchased music and books to your heir, back them up to non-DRM files on a local hard drive.

Photos• Keep a local copy in case you also keep things on the cloud. • Do not overwrite the original copy if you make edits

Bill BrunsDeputy DirectorStudent Center

Protect Yourself

Page 11: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

To Contact Our Experts

Office of Information Technology, Security websitehttp://oit.siu.edu/infosecurity/

SalukiTech618-453-5155 [email protected]

SalukiTech Service Center, Morris Library—First Floor

Prabha MandaOffice of Information Technology, [email protected]

Mike Reiman, DirectorOffice of Records [email protected]

SIU Carbondale Security Experts and Information

Page 12: Welcome to Security Awareness Month · Cyber security is critically important to us as a University with massive amounts of sensitive information to protect. And…cyber security

Bill BrunsDeputy Director, Student CenterChair, SIU Computing Advisory Committee

12

Pro

tect

Yo

urs

elf

On

line